{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:Y4ME2GHKF5FWTQJENG6VAMA3PC","short_pith_number":"pith:Y4ME2GHK","canonical_record":{"source":{"id":"1710.07308","kind":"arxiv","version":3},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2017-10-19T18:29:13Z","cross_cats_sorted":["cs.PL"],"title_canon_sha256":"df7f9c0da8a9706f29b523b04ebb73ff2e386edfea58f93d768c328f8c4a8266","abstract_canon_sha256":"82183ab98fb4a170258c686eca503092852eb35a48da2a8c77a0cee957644980"},"schema_version":"1.0"},"canonical_sha256":"c7184d18ea2f4b69c12469bd50301b7896ad8e5b5c7c487766efb5f111b836b9","source":{"kind":"arxiv","id":"1710.07308","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1710.07308","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"arxiv_version","alias_value":"1710.07308v3","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1710.07308","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"pith_short_12","alias_value":"Y4ME2GHKF5FW","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_16","alias_value":"Y4ME2GHKF5FWTQJE","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_8","alias_value":"Y4ME2GHK","created_at":"2026-05-18T12:31:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:Y4ME2GHKF5FWTQJENG6VAMA3PC","target":"record","payload":{"canonical_record":{"source":{"id":"1710.07308","kind":"arxiv","version":3},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2017-10-19T18:29:13Z","cross_cats_sorted":["cs.PL"],"title_canon_sha256":"df7f9c0da8a9706f29b523b04ebb73ff2e386edfea58f93d768c328f8c4a8266","abstract_canon_sha256":"82183ab98fb4a170258c686eca503092852eb35a48da2a8c77a0cee957644980"},"schema_version":"1.0"},"canonical_sha256":"c7184d18ea2f4b69c12469bd50301b7896ad8e5b5c7c487766efb5f111b836b9","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:31:37.718071Z","signature_b64":"QJfjTGEiSsnR4oAE+c8hqtqEbBsnj1iealiVYzitc92M4avWUkegoPVfHG+ETwCsfWA/zZkqxp+jiMv+D2ENDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c7184d18ea2f4b69c12469bd50301b7896ad8e5b5c7c487766efb5f111b836b9","last_reissued_at":"2026-05-18T00:31:37.717527Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:31:37.717527Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1710.07308","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:31:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1VPtqT07+Tp4uKzFqWbAyFTpDU3Kax5A0xLGHCt2ZU7RnidFDOfnbABVyfqN9WlDqwezE9TFlAf/zSSoeyVTAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:49:10.975154Z"},"content_sha256":"48b1d93f673a096aa18219401d466e8ead339953f313ab39f23778a252f02a27","schema_version":"1.0","event_id":"sha256:48b1d93f673a096aa18219401d466e8ead339953f313ab39f23778a252f02a27"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:Y4ME2GHKF5FWTQJENG6VAMA3PC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Formally Secure Compilation of Unsafe Low-Level Components (Extended Abstract)","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.PL"],"primary_cat":"cs.CR","authors_text":"Ana Nora Evans, Andrew Tolmach, Arthur Azevedo de Amorim, Benjamin C. Pierce, Catalin Hritcu, Guglielmo Fachini, Marco Stronati, Th\\'eo Laurent","submitted_at":"2017-10-19T18:29:13Z","abstract_excerpt":"We propose a new formal criterion for secure compilation, providing strong security guarantees for components written in unsafe, low-level languages with C-style undefined behavior. Our criterion goes beyond recent proposals, which protect the trace properties of a single component against an adversarial context, to model dynamic compromise in a system of mutually distrustful components. Each component is protected from all the others until it receives an input that triggers an undefined behavior, causing it to become compromised and attack the remaining uncompromised components. To illustrate"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1710.07308","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:31:37Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xdKcRsUrq/0rigcjQvjBXXFOrXOuATIop4DlcxMQX7mFwAYek56ewAqaD/j4SOUvmqwYGZhuA10eYj/w4MIoAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:49:10.975533Z"},"content_sha256":"5e77f6dd811067bf1ac9e52a88cfd826f56856dbb6120fa07e7b86edcfbd0bb7","schema_version":"1.0","event_id":"sha256:5e77f6dd811067bf1ac9e52a88cfd826f56856dbb6120fa07e7b86edcfbd0bb7"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/bundle.json","state_url":"https://pith.science/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T18:49:10Z","links":{"resolver":"https://pith.science/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC","bundle":"https://pith.science/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/bundle.json","state":"https://pith.science/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/Y4ME2GHKF5FWTQJENG6VAMA3PC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:Y4ME2GHKF5FWTQJENG6VAMA3PC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"82183ab98fb4a170258c686eca503092852eb35a48da2a8c77a0cee957644980","cross_cats_sorted":["cs.PL"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2017-10-19T18:29:13Z","title_canon_sha256":"df7f9c0da8a9706f29b523b04ebb73ff2e386edfea58f93d768c328f8c4a8266"},"schema_version":"1.0","source":{"id":"1710.07308","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1710.07308","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"arxiv_version","alias_value":"1710.07308v3","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1710.07308","created_at":"2026-05-18T00:31:37Z"},{"alias_kind":"pith_short_12","alias_value":"Y4ME2GHKF5FW","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_16","alias_value":"Y4ME2GHKF5FWTQJE","created_at":"2026-05-18T12:31:56Z"},{"alias_kind":"pith_short_8","alias_value":"Y4ME2GHK","created_at":"2026-05-18T12:31:56Z"}],"graph_snapshots":[{"event_id":"sha256:5e77f6dd811067bf1ac9e52a88cfd826f56856dbb6120fa07e7b86edcfbd0bb7","target":"graph","created_at":"2026-05-18T00:31:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We propose a new formal criterion for secure compilation, providing strong security guarantees for components written in unsafe, low-level languages with C-style undefined behavior. Our criterion goes beyond recent proposals, which protect the trace properties of a single component against an adversarial context, to model dynamic compromise in a system of mutually distrustful components. Each component is protected from all the others until it receives an input that triggers an undefined behavior, causing it to become compromised and attack the remaining uncompromised components. To illustrate","authors_text":"Ana Nora Evans, Andrew Tolmach, Arthur Azevedo de Amorim, Benjamin C. Pierce, Catalin Hritcu, Guglielmo Fachini, Marco Stronati, Th\\'eo Laurent","cross_cats":["cs.PL"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2017-10-19T18:29:13Z","title":"Formally Secure Compilation of Unsafe Low-Level Components (Extended Abstract)"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1710.07308","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:48b1d93f673a096aa18219401d466e8ead339953f313ab39f23778a252f02a27","target":"record","created_at":"2026-05-18T00:31:37Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"82183ab98fb4a170258c686eca503092852eb35a48da2a8c77a0cee957644980","cross_cats_sorted":["cs.PL"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2017-10-19T18:29:13Z","title_canon_sha256":"df7f9c0da8a9706f29b523b04ebb73ff2e386edfea58f93d768c328f8c4a8266"},"schema_version":"1.0","source":{"id":"1710.07308","kind":"arxiv","version":3}},"canonical_sha256":"c7184d18ea2f4b69c12469bd50301b7896ad8e5b5c7c487766efb5f111b836b9","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c7184d18ea2f4b69c12469bd50301b7896ad8e5b5c7c487766efb5f111b836b9","first_computed_at":"2026-05-18T00:31:37.717527Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:31:37.717527Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"QJfjTGEiSsnR4oAE+c8hqtqEbBsnj1iealiVYzitc92M4avWUkegoPVfHG+ETwCsfWA/zZkqxp+jiMv+D2ENDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:31:37.718071Z","signed_message":"canonical_sha256_bytes"},"source_id":"1710.07308","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:48b1d93f673a096aa18219401d466e8ead339953f313ab39f23778a252f02a27","sha256:5e77f6dd811067bf1ac9e52a88cfd826f56856dbb6120fa07e7b86edcfbd0bb7"],"state_sha256":"f76b039623d5d37c2b7c6ccd1488d272e53932322e79e3590db78d45e1ff0c3f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"aImxvBtciEIXb5RSkriJfzLqA/2UMPEk5y0A5IqUOnuQ+kwtoyYE+v2s0SLtz0Wz9Cr4fc2N099hWR1F/az5DA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T18:49:10.977611Z","bundle_sha256":"4a58ebc7869310cb348936a733d23a24d0cd1b62b843fe52b0ac413104cd37ee"}}