{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:R4YIVGVCVUZRMNSRNSHEP3HSRL","short_pith_number":"pith:R4YIVGVC","canonical_record":{"source":{"id":"2605.15503","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T00:50:49Z","cross_cats_sorted":[],"title_canon_sha256":"7f52283caca36d22c5f81346b37f05517f098a6e45fd97c68cf8f646369d88f0","abstract_canon_sha256":"aa9f9b05268882ea844c64cb42a29079a8740b4f4e0a6173dcf3be64e10b2f8d"},"schema_version":"1.0"},"canonical_sha256":"8f308a9aa2ad331636516c8e47ecf28aeef62214089ccdd6e219639b670e8f12","source":{"kind":"arxiv","id":"2605.15503","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15503","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15503v1","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.15503","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_12","alias_value":"R4YIVGVCVUZR","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_16","alias_value":"R4YIVGVCVUZRMNSR","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_8","alias_value":"R4YIVGVC","created_at":"2026-05-20T00:01:02Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:R4YIVGVCVUZRMNSRNSHEP3HSRL","target":"record","payload":{"canonical_record":{"source":{"id":"2605.15503","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T00:50:49Z","cross_cats_sorted":[],"title_canon_sha256":"7f52283caca36d22c5f81346b37f05517f098a6e45fd97c68cf8f646369d88f0","abstract_canon_sha256":"aa9f9b05268882ea844c64cb42a29079a8740b4f4e0a6173dcf3be64e10b2f8d"},"schema_version":"1.0"},"canonical_sha256":"8f308a9aa2ad331636516c8e47ecf28aeef62214089ccdd6e219639b670e8f12","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:01:02.028512Z","signature_b64":"5mG6ydj56Y7u/j3rfTEkEugSidmveFL8BFr+E8EHmyNn1LuBy3IpqE4SlvlnLXWA+hR4KgQqLbrKlbMMhHJOBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8f308a9aa2ad331636516c8e47ecf28aeef62214089ccdd6e219639b670e8f12","last_reissued_at":"2026-05-20T00:01:02.027843Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:01:02.027843Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.15503","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"669nBTHFFBGTthNn7uRdMABJ/GhQrpM/bVrfvYsyPOEYs29lG4K++02DymNAiemfidS1Dpg0V/1eMfXZiyKDCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:38:30.237756Z"},"content_sha256":"4225d1a71bca88afeb1b0c1611cdd14a0894ecbd1a187ea3643a21612e8fb7c1","schema_version":"1.0","event_id":"sha256:4225d1a71bca88afeb1b0c1611cdd14a0894ecbd1a187ea3643a21612e8fb7c1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:R4YIVGVCVUZRMNSRNSHEP3HSRL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"uGen: An Agentic Framework for Generating Microarchitectural Attack PoCs","license":"http://creativecommons.org/licenses/by/4.0/","headline":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps.","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Berk Gulmezoglu, Debopriya Roy Dipta, Eduard Marin, Thomas Eisenbarth, Thore Tiemann","submitted_at":"2026-05-15T00:50:49Z","abstract_excerpt":"Microarchitectural attacks continue to evolve, uncovering new exploitation vectors in modern processors. From a defensive perspective, assessing a system's susceptibility to such attacks remains challenging. Developing functional attack implementations is labor-intensive, requires deep microarchitectural expertise, and is highly sensitive to execution environments. Consequently, existing attacks often lack portability, limiting systematic and scalable vulnerability assessment. Recent advances in large language models (LLMs) suggest a potential avenue for lowering these barriers. However, it re"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"In the deployment stage, uGen achieves up to 100% success rate for Spectre-v1 (Claude Sonnet-4) and 80% for Prime+Probe (Qwen3-Coder). Finally, we demonstrate that uGen can generate a successful PoC code with a cost of $1.25 in under four minutes.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That identifying LLM knowledge gaps via systematic study and injecting missing attack primitives through retrieval-augmented multi-agent generation will reliably produce functionally correct and portable PoC code across diverse microarchitectures, vulnerable functions, and execution environments.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"uGen is the first retrieval-augmented multi-agent LLM framework for generating functionally correct microarchitectural attack PoCs, reporting up to 100% success on Spectre-v1 and 80% on Prime+Probe at low cost.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"5b632771682fdf45057aa47e5d3a73d10e7087568424e2013acb525fc9a04ea9"},"source":{"id":"2605.15503","kind":"arxiv","version":1},"verdict":{"id":"2f9ea86b-e36c-4e02-82de-1254f747f53c","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-19T15:42:18.678473Z","strongest_claim":"In the deployment stage, uGen achieves up to 100% success rate for Spectre-v1 (Claude Sonnet-4) and 80% for Prime+Probe (Qwen3-Coder). Finally, we demonstrate that uGen can generate a successful PoC code with a cost of $1.25 in under four minutes.","one_line_summary":"uGen is the first retrieval-augmented multi-agent LLM framework for generating functionally correct microarchitectural attack PoCs, reporting up to 100% success on Spectre-v1 and 80% on Prime+Probe at low cost.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That identifying LLM knowledge gaps via systematic study and injecting missing attack primitives through retrieval-augmented multi-agent generation will reliably produce functionally correct and portable PoC code across diverse microarchitectures, vulnerable functions, and execution environments.","pith_extraction_headline":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps."},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.15503/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"doi_title_agreement","ran_at":"2026-05-19T16:01:17.945972Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_compliance","ran_at":"2026-05-19T15:53:35.279079Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"cited_work_retraction","ran_at":"2026-05-19T14:51:55.783162Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"claim_evidence","ran_at":"2026-05-19T14:21:54.061898Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"shingle_duplication","ran_at":"2026-05-19T13:49:41.853228Z","status":"skipped","version":"0.1.0","findings_count":0},{"name":"citation_quote_validity","ran_at":"2026-05-19T13:49:41.392095Z","status":"skipped","version":"0.1.0","findings_count":0},{"name":"ai_meta_artifact","ran_at":"2026-05-19T13:33:22.640154Z","status":"skipped","version":"1.0.0","findings_count":0}],"snapshot_sha256":"39998492a9d03f660c3ef9fc5df02749857be427fa80571bec4f6baad3d9b94f"},"references":{"count":63,"sample":[{"doi":"","year":2025,"title":"Introducing Claude 4","work_id":"e5a90803-cb0d-4167-800f-88a057d40fdf","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2026,"title":"Anthropic’s transparency hub","work_id":"1b4fa2d6-b48d-4dc6-9480-57b93ff23d62","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2022,"title":"Branch history injection: On the effectiveness of hardware mitigations against cross-privilege Spectre-v2 attacks","work_id":"2b4b87dc-6232-41b0-87fd-3d2224f027f0","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2019,"title":"SMoTherSpectre: Exploiting speculative execution through port contention","work_id":"67ff39a6-33c4-4954-893a-391388caa5d7","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2022,"title":"Rae, Erich Elsen, and Laurent Sifre","work_id":"77ee02e9-b92d-4f5f-9326-dedbf0871170","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":63,"snapshot_sha256":"bc086816435873c02f56135b0baa498420191c78c28dc56165c51d26c21f233d","internal_anchors":5},"formal_canon":{"evidence_count":2,"snapshot_sha256":"9de2db4942412f706fc7d4e154aeec9162269cefd51210d62621bcd9af842722"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"2f9ea86b-e36c-4e02-82de-1254f747f53c"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:01:02Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"irXezkpRqhyxRBBDLjkr+2rP2LigC9+0cwYrzED6hULZdaaNj0xyupXF4enHD/mABss7iI6GmBptLpu5HQAECA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:38:30.238787Z"},"content_sha256":"b3e0a93c1ed4458ea755de0508365c9fb8e48bf2beb02e2df059a03d3942ea62","schema_version":"1.0","event_id":"sha256:b3e0a93c1ed4458ea755de0508365c9fb8e48bf2beb02e2df059a03d3942ea62"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/bundle.json","state_url":"https://pith.science/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T21:38:30Z","links":{"resolver":"https://pith.science/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL","bundle":"https://pith.science/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/bundle.json","state":"https://pith.science/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/R4YIVGVCVUZRMNSRNSHEP3HSRL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:R4YIVGVCVUZRMNSRNSHEP3HSRL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"aa9f9b05268882ea844c64cb42a29079a8740b4f4e0a6173dcf3be64e10b2f8d","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T00:50:49Z","title_canon_sha256":"7f52283caca36d22c5f81346b37f05517f098a6e45fd97c68cf8f646369d88f0"},"schema_version":"1.0","source":{"id":"2605.15503","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.15503","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"arxiv_version","alias_value":"2605.15503v1","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.15503","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_12","alias_value":"R4YIVGVCVUZR","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_16","alias_value":"R4YIVGVCVUZRMNSR","created_at":"2026-05-20T00:01:02Z"},{"alias_kind":"pith_short_8","alias_value":"R4YIVGVC","created_at":"2026-05-20T00:01:02Z"}],"graph_snapshots":[{"event_id":"sha256:b3e0a93c1ed4458ea755de0508365c9fb8e48bf2beb02e2df059a03d3942ea62","target":"graph","created_at":"2026-05-20T00:01:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"In the deployment stage, uGen achieves up to 100% success rate for Spectre-v1 (Claude Sonnet-4) and 80% for Prime+Probe (Qwen3-Coder). Finally, we demonstrate that uGen can generate a successful PoC code with a cost of $1.25 in under four minutes."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That identifying LLM knowledge gaps via systematic study and injecting missing attack primitives through retrieval-augmented multi-agent generation will reliably produce functionally correct and portable PoC code across diverse microarchitectures, vulnerable functions, and execution environments."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"uGen is the first retrieval-augmented multi-agent LLM framework for generating functionally correct microarchitectural attack PoCs, reporting up to 100% success on Spectre-v1 and 80% on Prime+Probe at low cost."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps."}],"snapshot_sha256":"5b632771682fdf45057aa47e5d3a73d10e7087568424e2013acb525fc9a04ea9"},"formal_canon":{"evidence_count":2,"snapshot_sha256":"9de2db4942412f706fc7d4e154aeec9162269cefd51210d62621bcd9af842722"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"doi_title_agreement","ran_at":"2026-05-19T16:01:17.945972Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"doi_compliance","ran_at":"2026-05-19T15:53:35.279079Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"cited_work_retraction","ran_at":"2026-05-19T14:51:55.783162Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"claim_evidence","ran_at":"2026-05-19T14:21:54.061898Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"shingle_duplication","ran_at":"2026-05-19T13:49:41.853228Z","status":"skipped","version":"0.1.0"},{"findings_count":0,"name":"citation_quote_validity","ran_at":"2026-05-19T13:49:41.392095Z","status":"skipped","version":"0.1.0"},{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T13:33:22.640154Z","status":"skipped","version":"1.0.0"}],"endpoint":"/pith/2605.15503/integrity.json","findings":[],"snapshot_sha256":"39998492a9d03f660c3ef9fc5df02749857be427fa80571bec4f6baad3d9b94f","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Microarchitectural attacks continue to evolve, uncovering new exploitation vectors in modern processors. From a defensive perspective, assessing a system's susceptibility to such attacks remains challenging. Developing functional attack implementations is labor-intensive, requires deep microarchitectural expertise, and is highly sensitive to execution environments. Consequently, existing attacks often lack portability, limiting systematic and scalable vulnerability assessment. Recent advances in large language models (LLMs) suggest a potential avenue for lowering these barriers. However, it re","authors_text":"Berk Gulmezoglu, Debopriya Roy Dipta, Eduard Marin, Thomas Eisenbarth, Thore Tiemann","cross_cats":[],"headline":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T00:50:49Z","title":"uGen: An Agentic Framework for Generating Microarchitectural Attack PoCs"},"references":{"count":63,"internal_anchors":5,"resolved_work":63,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"Introducing Claude 4","work_id":"e5a90803-cb0d-4167-800f-88a057d40fdf","year":2025},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"Anthropic’s transparency hub","work_id":"1b4fa2d6-b48d-4dc6-9480-57b93ff23d62","year":2026},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"Branch history injection: On the effectiveness of hardware mitigations against cross-privilege Spectre-v2 attacks","work_id":"2b4b87dc-6232-41b0-87fd-3d2224f027f0","year":2022},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"SMoTherSpectre: Exploiting speculative execution through port contention","work_id":"67ff39a6-33c4-4954-893a-391388caa5d7","year":2019},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"Rae, Erich Elsen, and Laurent Sifre","work_id":"77ee02e9-b92d-4f5f-9326-dedbf0871170","year":2022}],"snapshot_sha256":"bc086816435873c02f56135b0baa498420191c78c28dc56165c51d26c21f233d"},"source":{"id":"2605.15503","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-19T15:42:18.678473Z","id":"2f9ea86b-e36c-4e02-82de-1254f747f53c","model_set":{"reader":"grok-4.3"},"one_line_summary":"uGen is the first retrieval-augmented multi-agent LLM framework for generating functionally correct microarchitectural attack PoCs, reporting up to 100% success on Spectre-v1 and 80% on Prime+Probe at low cost.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"uGen generates functionally correct microarchitectural attack PoCs by using multi-agent retrieval to fill LLM knowledge gaps.","strongest_claim":"In the deployment stage, uGen achieves up to 100% success rate for Spectre-v1 (Claude Sonnet-4) and 80% for Prime+Probe (Qwen3-Coder). Finally, we demonstrate that uGen can generate a successful PoC code with a cost of $1.25 in under four minutes.","weakest_assumption":"That identifying LLM knowledge gaps via systematic study and injecting missing attack primitives through retrieval-augmented multi-agent generation will reliably produce functionally correct and portable PoC code across diverse microarchitectures, vulnerable functions, and execution environments."}},"verdict_id":"2f9ea86b-e36c-4e02-82de-1254f747f53c"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4225d1a71bca88afeb1b0c1611cdd14a0894ecbd1a187ea3643a21612e8fb7c1","target":"record","created_at":"2026-05-20T00:01:02Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"aa9f9b05268882ea844c64cb42a29079a8740b4f4e0a6173dcf3be64e10b2f8d","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-15T00:50:49Z","title_canon_sha256":"7f52283caca36d22c5f81346b37f05517f098a6e45fd97c68cf8f646369d88f0"},"schema_version":"1.0","source":{"id":"2605.15503","kind":"arxiv","version":1}},"canonical_sha256":"8f308a9aa2ad331636516c8e47ecf28aeef62214089ccdd6e219639b670e8f12","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8f308a9aa2ad331636516c8e47ecf28aeef62214089ccdd6e219639b670e8f12","first_computed_at":"2026-05-20T00:01:02.027843Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:01:02.027843Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"5mG6ydj56Y7u/j3rfTEkEugSidmveFL8BFr+E8EHmyNn1LuBy3IpqE4SlvlnLXWA+hR4KgQqLbrKlbMMhHJOBg==","signature_status":"signed_v1","signed_at":"2026-05-20T00:01:02.028512Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.15503","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4225d1a71bca88afeb1b0c1611cdd14a0894ecbd1a187ea3643a21612e8fb7c1","sha256:b3e0a93c1ed4458ea755de0508365c9fb8e48bf2beb02e2df059a03d3942ea62"],"state_sha256":"c6798e3e346dcfb98cff6523b33780115739d2ed624cfcf25a5f0fcc10d64be9"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"InhZNHbj+UndYKrKyypfaLdqqqxk0gm+6LfcKerkqIXbOEho/whFCKftgpddTyQOT0nK7xu+CJy6HE0BeOWHBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T21:38:30.242498Z","bundle_sha256":"1fe6dfbd3625747f2ff87f289c76fd2133edfeadbb8f063d9ce62ac0808e826f"}}