{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:RRRFEB3RYMQAMFVGUHG6GLMJEH","short_pith_number":"pith:RRRFEB3R","canonical_record":{"source":{"id":"1505.01881","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-05-07T22:24:28Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"1b3c949c2e2f3ff3fa2ca1f7d267658732cc638d131c1e9928b5a0a76ab174fe","abstract_canon_sha256":"e6423f74304924c3ea5e144e21c57b17b2dfb4f278bf2d2a41eb6581409e54ce"},"schema_version":"1.0"},"canonical_sha256":"8c62520771c3200616a6a1cde32d8921cb3d145ecb6c7d3b36601c71e77d84fe","source":{"kind":"arxiv","id":"1505.01881","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.01881","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"arxiv_version","alias_value":"1505.01881v1","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.01881","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"pith_short_12","alias_value":"RRRFEB3RYMQA","created_at":"2026-05-18T12:29:39Z"},{"alias_kind":"pith_short_16","alias_value":"RRRFEB3RYMQAMFVG","created_at":"2026-05-18T12:29:39Z"},{"alias_kind":"pith_short_8","alias_value":"RRRFEB3R","created_at":"2026-05-18T12:29:39Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:RRRFEB3RYMQAMFVGUHG6GLMJEH","target":"record","payload":{"canonical_record":{"source":{"id":"1505.01881","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-05-07T22:24:28Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"1b3c949c2e2f3ff3fa2ca1f7d267658732cc638d131c1e9928b5a0a76ab174fe","abstract_canon_sha256":"e6423f74304924c3ea5e144e21c57b17b2dfb4f278bf2d2a41eb6581409e54ce"},"schema_version":"1.0"},"canonical_sha256":"8c62520771c3200616a6a1cde32d8921cb3d145ecb6c7d3b36601c71e77d84fe","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:16:38.638895Z","signature_b64":"nH/MFSR+AWgR99PImaOb6CUqCmH12jdlh2NTqvENgJMyz1/lzupKf/GiU8UVDc4VYMwcq0++SXkgmGTcFBq7Bw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8c62520771c3200616a6a1cde32d8921cb3d145ecb6c7d3b36601c71e77d84fe","last_reissued_at":"2026-05-18T02:16:38.638297Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:16:38.638297Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1505.01881","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:16:38Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FIER2ws0lqRnwM7U+XWCx5rc50C5LZwb/Z3NvrPBcgqNuw8wUYs/Gd2uPTP5GxKMtvkerJu4CAjh/3OXdnVKBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T18:17:54.970143Z"},"content_sha256":"12af7c60ba197b21ead8bb95ed5ca76d79d2bd8074e099dda3f191af543ba1f6","schema_version":"1.0","event_id":"sha256:12af7c60ba197b21ead8bb95ed5ca76d79d2bd8074e099dda3f191af543ba1f6"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:RRRFEB3RYMQAMFVGUHG6GLMJEH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Data Attacks on Power Grids: Leveraging Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"cs.CR","authors_text":"Deepjyoti Deka, Ross Baldick, Sriram Vishwanath","submitted_at":"2015-05-07T22:24:28Z","abstract_excerpt":"Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks. The adversary achieves its objective by making the estimator incorrectly identify correct measurements as bad data. The proposed attack regime's significance lies in reducing the minimum sizes of successful attacks to more than half of that of undetectable data attacks. Additionally, the attack model is able to construct attacks on systems that are resilient to "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.01881","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:16:38Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5bR40o5QC/1wmC6E+Zev2xEodRtpT6T1biJAbGq3wFIxyR+F/nna9X5188Tq2EZuOJeTB5J1zYoknrPL+tYsCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T18:17:54.970772Z"},"content_sha256":"fdeda4d68beb11e6ef8ffdcbc177f8f6fd241a30ed66fc5ade7e1af95e2ed050","schema_version":"1.0","event_id":"sha256:fdeda4d68beb11e6ef8ffdcbc177f8f6fd241a30ed66fc5ade7e1af95e2ed050"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/bundle.json","state_url":"https://pith.science/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T18:17:54Z","links":{"resolver":"https://pith.science/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH","bundle":"https://pith.science/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/bundle.json","state":"https://pith.science/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RRRFEB3RYMQAMFVGUHG6GLMJEH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:RRRFEB3RYMQAMFVGUHG6GLMJEH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e6423f74304924c3ea5e144e21c57b17b2dfb4f278bf2d2a41eb6581409e54ce","cross_cats_sorted":["cs.SY"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-05-07T22:24:28Z","title_canon_sha256":"1b3c949c2e2f3ff3fa2ca1f7d267658732cc638d131c1e9928b5a0a76ab174fe"},"schema_version":"1.0","source":{"id":"1505.01881","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.01881","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"arxiv_version","alias_value":"1505.01881v1","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.01881","created_at":"2026-05-18T02:16:38Z"},{"alias_kind":"pith_short_12","alias_value":"RRRFEB3RYMQA","created_at":"2026-05-18T12:29:39Z"},{"alias_kind":"pith_short_16","alias_value":"RRRFEB3RYMQAMFVG","created_at":"2026-05-18T12:29:39Z"},{"alias_kind":"pith_short_8","alias_value":"RRRFEB3R","created_at":"2026-05-18T12:29:39Z"}],"graph_snapshots":[{"event_id":"sha256:fdeda4d68beb11e6ef8ffdcbc177f8f6fd241a30ed66fc5ade7e1af95e2ed050","target":"graph","created_at":"2026-05-18T02:16:38Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks. The adversary achieves its objective by making the estimator incorrectly identify correct measurements as bad data. The proposed attack regime's significance lies in reducing the minimum sizes of successful attacks to more than half of that of undetectable data attacks. Additionally, the attack model is able to construct attacks on systems that are resilient to ","authors_text":"Deepjyoti Deka, Ross Baldick, Sriram Vishwanath","cross_cats":["cs.SY"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-05-07T22:24:28Z","title":"Data Attacks on Power Grids: Leveraging Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.01881","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:12af7c60ba197b21ead8bb95ed5ca76d79d2bd8074e099dda3f191af543ba1f6","target":"record","created_at":"2026-05-18T02:16:38Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e6423f74304924c3ea5e144e21c57b17b2dfb4f278bf2d2a41eb6581409e54ce","cross_cats_sorted":["cs.SY"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-05-07T22:24:28Z","title_canon_sha256":"1b3c949c2e2f3ff3fa2ca1f7d267658732cc638d131c1e9928b5a0a76ab174fe"},"schema_version":"1.0","source":{"id":"1505.01881","kind":"arxiv","version":1}},"canonical_sha256":"8c62520771c3200616a6a1cde32d8921cb3d145ecb6c7d3b36601c71e77d84fe","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8c62520771c3200616a6a1cde32d8921cb3d145ecb6c7d3b36601c71e77d84fe","first_computed_at":"2026-05-18T02:16:38.638297Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:16:38.638297Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"nH/MFSR+AWgR99PImaOb6CUqCmH12jdlh2NTqvENgJMyz1/lzupKf/GiU8UVDc4VYMwcq0++SXkgmGTcFBq7Bw==","signature_status":"signed_v1","signed_at":"2026-05-18T02:16:38.638895Z","signed_message":"canonical_sha256_bytes"},"source_id":"1505.01881","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:12af7c60ba197b21ead8bb95ed5ca76d79d2bd8074e099dda3f191af543ba1f6","sha256:fdeda4d68beb11e6ef8ffdcbc177f8f6fd241a30ed66fc5ade7e1af95e2ed050"],"state_sha256":"b3a7d117af0c80a5eb708b6592f537b3fc7c7ab5779a51dc7e889e123572ac1a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1pvAnpFz/I1H1nkrF4vy3bu+fEMQQjksuF/R6PqWcSdMkciCG3Szdi2/jZLzcQddszYxwvfs3r9pwzYIRt6tDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T18:17:54.973691Z","bundle_sha256":"e6d054e4523f8eb3509acee10cfab67634dd9457b5f5e77fbc8e934781737caf"}}