{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:VYUDYNWGRSUTTLXBLWM52LEMPU","short_pith_number":"pith:VYUDYNWG","canonical_record":{"source":{"id":"1608.02339","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-08-08T07:31:40Z","cross_cats_sorted":[],"title_canon_sha256":"64cf6b10a2a1e527062b769f9cd5317f658ff757011232affc85fe3b6e789742","abstract_canon_sha256":"419feb9aa44f7a9478d7ef57b440bcc0e618bec1773b0e46edec7b9d533874e9"},"schema_version":"1.0"},"canonical_sha256":"ae283c36c68ca939aee15d99dd2c8c7d1703c8aa92af1210ed454c913528c925","source":{"kind":"arxiv","id":"1608.02339","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1608.02339","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"arxiv_version","alias_value":"1608.02339v3","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1608.02339","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"pith_short_12","alias_value":"VYUDYNWGRSUT","created_at":"2026-05-18T12:30:48Z"},{"alias_kind":"pith_short_16","alias_value":"VYUDYNWGRSUTTLXB","created_at":"2026-05-18T12:30:48Z"},{"alias_kind":"pith_short_8","alias_value":"VYUDYNWG","created_at":"2026-05-18T12:30:48Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:VYUDYNWGRSUTTLXBLWM52LEMPU","target":"record","payload":{"canonical_record":{"source":{"id":"1608.02339","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-08-08T07:31:40Z","cross_cats_sorted":[],"title_canon_sha256":"64cf6b10a2a1e527062b769f9cd5317f658ff757011232affc85fe3b6e789742","abstract_canon_sha256":"419feb9aa44f7a9478d7ef57b440bcc0e618bec1773b0e46edec7b9d533874e9"},"schema_version":"1.0"},"canonical_sha256":"ae283c36c68ca939aee15d99dd2c8c7d1703c8aa92af1210ed454c913528c925","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:48:54.319878Z","signature_b64":"fje8pYJn9ARqaulP7sNC0QOHHCLE88OjbNiuUJ+DLR5ixYzB65nD2l5aETxDkoDigHB0Dt8cKmgPI17veRPXBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ae283c36c68ca939aee15d99dd2c8c7d1703c8aa92af1210ed454c913528c925","last_reissued_at":"2026-05-18T00:48:54.319005Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:48:54.319005Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1608.02339","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:48:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"M2W2M/YVdaGCxMumSJMt+p8riGrirhE3vQEamY+GQ+lCZ/5edERUZSone2W+KsiLo6rm00ixnBuSBa7IDIKKCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:03:41.198891Z"},"content_sha256":"6eb4948d32b99f44436948bce23d3cc9ad1cfb213f2a7069a66bf7f166dfd9b1","schema_version":"1.0","event_id":"sha256:6eb4948d32b99f44436948bce23d3cc9ad1cfb213f2a7069a66bf7f166dfd9b1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:VYUDYNWGRSUTTLXBLWM52LEMPU","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"SELint: an SEAndroid policy analysis tool","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Elena Reshetova, Filippo Bonazzi, N. Asokan","submitted_at":"2016-08-08T07:31:40Z","abstract_excerpt":"SEAndroid enforcement is now mandatory for Android devices. In order to provide the desired level of security for their products, Android OEMs need to be able to minimize their mistakes in writing SEAndroid policies. However, existing SEAndroid and SELinux tools are not very useful for this purpose. It has been shown that SEAndroid policies found in commercially available devices for multiple manufacturers contain mistakes and redundancies. In this paper we present a new tool, SELint, which aims to help OEMs to produce better SEAndroid policies. SELint is extensible and configurable to suit th"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1608.02339","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:48:54Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nuLZX1uzKXyOonEawwRxP8QjYWxBqe631iG8aw9QoC+T9dnhcQZSadf4x+4rFHWK1005df1Nl9iuIC4jcSQvCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:03:41.199343Z"},"content_sha256":"987d095619dbf498fc777fef9fe4c143e6b6b324bab18c4fb1d024e5e82685e5","schema_version":"1.0","event_id":"sha256:987d095619dbf498fc777fef9fe4c143e6b6b324bab18c4fb1d024e5e82685e5"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/bundle.json","state_url":"https://pith.science/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T22:03:41Z","links":{"resolver":"https://pith.science/pith/VYUDYNWGRSUTTLXBLWM52LEMPU","bundle":"https://pith.science/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/bundle.json","state":"https://pith.science/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/state.json","well_known_bundle":"https://pith.science/.well-known/pith/VYUDYNWGRSUTTLXBLWM52LEMPU/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:VYUDYNWGRSUTTLXBLWM52LEMPU","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"419feb9aa44f7a9478d7ef57b440bcc0e618bec1773b0e46edec7b9d533874e9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-08-08T07:31:40Z","title_canon_sha256":"64cf6b10a2a1e527062b769f9cd5317f658ff757011232affc85fe3b6e789742"},"schema_version":"1.0","source":{"id":"1608.02339","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1608.02339","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"arxiv_version","alias_value":"1608.02339v3","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1608.02339","created_at":"2026-05-18T00:48:54Z"},{"alias_kind":"pith_short_12","alias_value":"VYUDYNWGRSUT","created_at":"2026-05-18T12:30:48Z"},{"alias_kind":"pith_short_16","alias_value":"VYUDYNWGRSUTTLXB","created_at":"2026-05-18T12:30:48Z"},{"alias_kind":"pith_short_8","alias_value":"VYUDYNWG","created_at":"2026-05-18T12:30:48Z"}],"graph_snapshots":[{"event_id":"sha256:987d095619dbf498fc777fef9fe4c143e6b6b324bab18c4fb1d024e5e82685e5","target":"graph","created_at":"2026-05-18T00:48:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"SEAndroid enforcement is now mandatory for Android devices. In order to provide the desired level of security for their products, Android OEMs need to be able to minimize their mistakes in writing SEAndroid policies. However, existing SEAndroid and SELinux tools are not very useful for this purpose. It has been shown that SEAndroid policies found in commercially available devices for multiple manufacturers contain mistakes and redundancies. In this paper we present a new tool, SELint, which aims to help OEMs to produce better SEAndroid policies. SELint is extensible and configurable to suit th","authors_text":"Elena Reshetova, Filippo Bonazzi, N. Asokan","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-08-08T07:31:40Z","title":"SELint: an SEAndroid policy analysis tool"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1608.02339","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6eb4948d32b99f44436948bce23d3cc9ad1cfb213f2a7069a66bf7f166dfd9b1","target":"record","created_at":"2026-05-18T00:48:54Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"419feb9aa44f7a9478d7ef57b440bcc0e618bec1773b0e46edec7b9d533874e9","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2016-08-08T07:31:40Z","title_canon_sha256":"64cf6b10a2a1e527062b769f9cd5317f658ff757011232affc85fe3b6e789742"},"schema_version":"1.0","source":{"id":"1608.02339","kind":"arxiv","version":3}},"canonical_sha256":"ae283c36c68ca939aee15d99dd2c8c7d1703c8aa92af1210ed454c913528c925","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ae283c36c68ca939aee15d99dd2c8c7d1703c8aa92af1210ed454c913528c925","first_computed_at":"2026-05-18T00:48:54.319005Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:48:54.319005Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"fje8pYJn9ARqaulP7sNC0QOHHCLE88OjbNiuUJ+DLR5ixYzB65nD2l5aETxDkoDigHB0Dt8cKmgPI17veRPXBw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:48:54.319878Z","signed_message":"canonical_sha256_bytes"},"source_id":"1608.02339","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6eb4948d32b99f44436948bce23d3cc9ad1cfb213f2a7069a66bf7f166dfd9b1","sha256:987d095619dbf498fc777fef9fe4c143e6b6b324bab18c4fb1d024e5e82685e5"],"state_sha256":"de8f92f08727c738ebb6b5fc9985e3e72d74c7927ad03d8eef39632d89d75e60"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wZh/A/Ui/kNy9vbzwjTZDnavc0amyWCUVkXMOPmtCde/2k1R6jOMK3ye/aLeXqscVcRbR1cT4XENyujSMGZhCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T22:03:41.201623Z","bundle_sha256":"41e23212084368cd9c1e52d194d4006a6e1a2441cac6c81f88053c168976fbc9"}}