{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:SLGWLJ63U6TKUYMNE222CB4OMW","short_pith_number":"pith:SLGWLJ63","canonical_record":{"source":{"id":"2605.12731","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-12T20:33:33Z","cross_cats_sorted":[],"title_canon_sha256":"9ee5e7ffd9e082430dd659c124009109c67e7e34c2849fa34e9967f5b9f5a4eb","abstract_canon_sha256":"9936e0e510dabb980d7b497573463e426874924892f8a2b1c8f80b0d4632abe3"},"schema_version":"1.0"},"canonical_sha256":"92cd65a7dba7a6aa618d26b5a1078e6589e8f4bad84e3ec10b1542b041316d95","source":{"kind":"arxiv","id":"2605.12731","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12731","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12731v1","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12731","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"pith_short_12","alias_value":"SLGWLJ63U6TK","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"SLGWLJ63U6TKUYMN","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"SLGWLJ63","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:SLGWLJ63U6TKUYMNE222CB4OMW","target":"record","payload":{"canonical_record":{"source":{"id":"2605.12731","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-12T20:33:33Z","cross_cats_sorted":[],"title_canon_sha256":"9ee5e7ffd9e082430dd659c124009109c67e7e34c2849fa34e9967f5b9f5a4eb","abstract_canon_sha256":"9936e0e510dabb980d7b497573463e426874924892f8a2b1c8f80b0d4632abe3"},"schema_version":"1.0"},"canonical_sha256":"92cd65a7dba7a6aa618d26b5a1078e6589e8f4bad84e3ec10b1542b041316d95","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:09:49.242177Z","signature_b64":"+mLza7Te+BidMY1Eu0Hs7tn8YOJjv6nwuFGejB/x3zwfEkgmhLO3PGwj2V53SpsAlohegS/9WJKj6CS6kUibDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"92cd65a7dba7a6aa618d26b5a1078e6589e8f4bad84e3ec10b1542b041316d95","last_reissued_at":"2026-05-18T03:09:49.241418Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:09:49.241418Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.12731","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QS/Lb2X8U2EjQ0KvEZUvy6sy12zDbk4EFaPS46kgu3z+3bqz1p2ClqAPqtf35M5USvvMrrvQzOM3FxfnK2EiAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T10:54:07.685284Z"},"content_sha256":"5695868626ff113aeb178218858f92b5b9355417ee5474ef35e1a2be595e5e51","schema_version":"1.0","event_id":"sha256:5695868626ff113aeb178218858f92b5b9355417ee5474ef35e1a2be595e5e51"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:SLGWLJ63U6TKUYMNE222CB4OMW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Finding a Crab in the C: Assured Translation via Comparative Symbolic Execution","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","headline":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere.","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Caleb Helbling, Graham Leach-Krouse, Michael Crystal","submitted_at":"2026-05-12T20:33:33Z","abstract_excerpt":"Modern high-assurance software systems development favors memory safe languages such as SPARK (ADA) or Rust. However, developers often encounter non-memory safe code (e.g., C) in legacy systems and libraries which would be prohibitively expensive or risky to re-write. In response, developers have begun turning to machine learning/AI systems and other automated code translators. Automated translation comes with its own risks, however. The original and ported code are not precisely the same, semantically - otherwise there would be no point in performing the translation. To reduce these risks, we"},"claims":{"count":3,"items":[{"kind":"strongest_claim","text":"Outside of the flagged differences, the binaries are formally verified to be equivalent. Consequently, the review process guarantees equivalence modulo changes approved by the developer.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That symbolic execution on the compiled binaries can exhaustively detect all semantic differences without missing behaviors or generating unmanageable numbers of spurious differences, and that the binaries faithfully represent the source-level semantics.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"}],"snapshot_sha256":"de24ebd4e451d080b70372b8356d8da1431f0dd2023a102a55497fc1253fade7"},"source":{"id":"2605.12731","kind":"arxiv","version":1},"verdict":{"id":"81dfcb41-2fab-41fb-ad14-c4b0a15a2c25","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-14T19:51:06.929993Z","strongest_claim":"Outside of the flagged differences, the binaries are formally verified to be equivalent. Consequently, the review process guarantees equivalence modulo changes approved by the developer.","one_line_summary":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That symbolic execution on the compiled binaries can exhaustively detect all semantic differences without missing behaviors or generating unmanageable numbers of spurious differences, and that the binaries faithfully represent the source-level semantics.","pith_extraction_headline":""},"references":{"count":17,"sample":[{"doi":"","year":2023,"title":"“Software memory safety,” National Security Agency, Tech. Rep., Apr. 2023. [Online]. Available: https : / / media . defense . gov / 2022 / Nov / 10 / 2003112742/ - 1/ - 1/0/CSI SOFTW ARE MEMORY SAFETY","work_id":"9094472f-c8e2-4a1c-83a9-26dbc9a08afa","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2025,"title":"Memory safe languages: Reducing vulnerabilities in modern software development,","work_id":"b729b3a3-fa29-425e-bc2c-e9014a7b2efc","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2023,"title":"The case for memory safe roadmaps: Why both c-suite executives and technical experts need to take memory safe coding seriously,","work_id":"dd8c1761-1b03-4035-a2d7-8e731aa24c8c","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2024,"title":"Back to building blocks: A path towards secure and measurable software,","work_id":"e7d6cf46-f3cc-4ec0-9277-38370754f9bc","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":null,"title":"Galois and Immunant,C2rust demonstration. [Online]. Available: https://c2rust.com/","work_id":"ea25153f-c624-4981-9c6e-8c545ad67e74","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":17,"snapshot_sha256":"7544235c97d13d661790c31aca87912e5ad5af4f5cf8fd14062657291e27532c","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"81dfcb41-2fab-41fb-ad14-c4b0a15a2c25"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:49Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"T5003Ehj/A/o5hMMX/WGf0cmQHU0AdBf2DTA6SmpleajxWcc7HrJ5QahhRxXEJpSWf9VzuGmz/SJvzus5XNACg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T10:54:07.686484Z"},"content_sha256":"24997d0ea66d19e4ec15bb76658480d6a38a689c139b63ba6ba052d092978c93","schema_version":"1.0","event_id":"sha256:24997d0ea66d19e4ec15bb76658480d6a38a689c139b63ba6ba052d092978c93"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/SLGWLJ63U6TKUYMNE222CB4OMW/bundle.json","state_url":"https://pith.science/pith/SLGWLJ63U6TKUYMNE222CB4OMW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/SLGWLJ63U6TKUYMNE222CB4OMW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T10:54:07Z","links":{"resolver":"https://pith.science/pith/SLGWLJ63U6TKUYMNE222CB4OMW","bundle":"https://pith.science/pith/SLGWLJ63U6TKUYMNE222CB4OMW/bundle.json","state":"https://pith.science/pith/SLGWLJ63U6TKUYMNE222CB4OMW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/SLGWLJ63U6TKUYMNE222CB4OMW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:SLGWLJ63U6TKUYMNE222CB4OMW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9936e0e510dabb980d7b497573463e426874924892f8a2b1c8f80b0d4632abe3","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-12T20:33:33Z","title_canon_sha256":"9ee5e7ffd9e082430dd659c124009109c67e7e34c2849fa34e9967f5b9f5a4eb"},"schema_version":"1.0","source":{"id":"2605.12731","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12731","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12731v1","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12731","created_at":"2026-05-18T03:09:49Z"},{"alias_kind":"pith_short_12","alias_value":"SLGWLJ63U6TK","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"SLGWLJ63U6TKUYMN","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"SLGWLJ63","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:24997d0ea66d19e4ec15bb76658480d6a38a689c139b63ba6ba052d092978c93","target":"graph","created_at":"2026-05-18T03:09:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":3,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"Outside of the flagged differences, the binaries are formally verified to be equivalent. Consequently, the review process guarantees equivalence modulo changes approved by the developer."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That symbolic execution on the compiled binaries can exhaustively detect all semantic differences without missing behaviors or generating unmanageable numbers of spurious differences, and that the binaries faithfully represent the source-level semantics."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere."}],"snapshot_sha256":"de24ebd4e451d080b70372b8356d8da1431f0dd2023a102a55497fc1253fade7"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Modern high-assurance software systems development favors memory safe languages such as SPARK (ADA) or Rust. However, developers often encounter non-memory safe code (e.g., C) in legacy systems and libraries which would be prohibitively expensive or risky to re-write. In response, developers have begun turning to machine learning/AI systems and other automated code translators. Automated translation comes with its own risks, however. The original and ported code are not precisely the same, semantically - otherwise there would be no point in performing the translation. To reduce these risks, we","authors_text":"Caleb Helbling, Graham Leach-Krouse, Michael Crystal","cross_cats":[],"headline":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere.","license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-12T20:33:33Z","title":"Finding a Crab in the C: Assured Translation via Comparative Symbolic Execution"},"references":{"count":17,"internal_anchors":0,"resolved_work":17,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"“Software memory safety,” National Security Agency, Tech. Rep., Apr. 2023. [Online]. Available: https : / / media . defense . gov / 2022 / Nov / 10 / 2003112742/ - 1/ - 1/0/CSI SOFTW ARE MEMORY SAFETY","work_id":"9094472f-c8e2-4a1c-83a9-26dbc9a08afa","year":2023},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"Memory safe languages: Reducing vulnerabilities in modern software development,","work_id":"b729b3a3-fa29-425e-bc2c-e9014a7b2efc","year":2025},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"The case for memory safe roadmaps: Why both c-suite executives and technical experts need to take memory safe coding seriously,","work_id":"dd8c1761-1b03-4035-a2d7-8e731aa24c8c","year":2023},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"Back to building blocks: A path towards secure and measurable software,","work_id":"e7d6cf46-f3cc-4ec0-9277-38370754f9bc","year":2024},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"Galois and Immunant,C2rust demonstration. [Online]. Available: https://c2rust.com/","work_id":"ea25153f-c624-4981-9c6e-8c545ad67e74","year":null}],"snapshot_sha256":"7544235c97d13d661790c31aca87912e5ad5af4f5cf8fd14062657291e27532c"},"source":{"id":"2605.12731","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-14T19:51:06.929993Z","id":"81dfcb41-2fab-41fb-ad14-c4b0a15a2c25","model_set":{"reader":"grok-4.3"},"one_line_summary":"cozy performs comparative symbolic execution on original and translated binaries to flag differences for developer review while proving equivalence elsewhere.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"","strongest_claim":"Outside of the flagged differences, the binaries are formally verified to be equivalent. Consequently, the review process guarantees equivalence modulo changes approved by the developer.","weakest_assumption":"That symbolic execution on the compiled binaries can exhaustively detect all semantic differences without missing behaviors or generating unmanageable numbers of spurious differences, and that the binaries faithfully represent the source-level semantics."}},"verdict_id":"81dfcb41-2fab-41fb-ad14-c4b0a15a2c25"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:5695868626ff113aeb178218858f92b5b9355417ee5474ef35e1a2be595e5e51","target":"record","created_at":"2026-05-18T03:09:49Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9936e0e510dabb980d7b497573463e426874924892f8a2b1c8f80b0d4632abe3","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by-nc-sa/4.0/","primary_cat":"cs.SE","submitted_at":"2026-05-12T20:33:33Z","title_canon_sha256":"9ee5e7ffd9e082430dd659c124009109c67e7e34c2849fa34e9967f5b9f5a4eb"},"schema_version":"1.0","source":{"id":"2605.12731","kind":"arxiv","version":1}},"canonical_sha256":"92cd65a7dba7a6aa618d26b5a1078e6589e8f4bad84e3ec10b1542b041316d95","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"92cd65a7dba7a6aa618d26b5a1078e6589e8f4bad84e3ec10b1542b041316d95","first_computed_at":"2026-05-18T03:09:49.241418Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:09:49.241418Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"+mLza7Te+BidMY1Eu0Hs7tn8YOJjv6nwuFGejB/x3zwfEkgmhLO3PGwj2V53SpsAlohegS/9WJKj6CS6kUibDg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:09:49.242177Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.12731","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:5695868626ff113aeb178218858f92b5b9355417ee5474ef35e1a2be595e5e51","sha256:24997d0ea66d19e4ec15bb76658480d6a38a689c139b63ba6ba052d092978c93"],"state_sha256":"07e4c41c230bdf9a85d475781e2114964c51cbf7be8540762a048ba5cb5b1fc0"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cWEEMpd1vHx+Ssp4fcQazCbZtwGPnlfOuW+V5v8MIqHsU/Bhf4WngRuYBRTPmGB0qDv5t+wNBMPZNAJzubvMAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T10:54:07.691411Z","bundle_sha256":"1891c2e5cb037afbf9a4a937ce1be6aa5922d72d5042a211acf8820f4101ff83"}}