{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:Y6RYVXEDSTSRDADDYQCNCZJREE","short_pith_number":"pith:Y6RYVXED","canonical_record":{"source":{"id":"1506.07739","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-06-25T13:11:34Z","cross_cats_sorted":[],"title_canon_sha256":"3635231c17ad8c424018961ac9c0467cf0482d2166fdaf9562b3a5a3d31ccc86","abstract_canon_sha256":"9833476c964c17508e5827cdde38c632c7b90402c0ce756c5a97e979e847fbbb"},"schema_version":"1.0"},"canonical_sha256":"c7a38adc8394e5118063c404d1653121291dcb26c39b2e7db1ebb46db05b058c","source":{"kind":"arxiv","id":"1506.07739","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.07739","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"arxiv_version","alias_value":"1506.07739v2","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.07739","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"pith_short_12","alias_value":"Y6RYVXEDSTSR","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_16","alias_value":"Y6RYVXEDSTSRDADD","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_8","alias_value":"Y6RYVXED","created_at":"2026-05-18T12:29:50Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:Y6RYVXEDSTSRDADDYQCNCZJREE","target":"record","payload":{"canonical_record":{"source":{"id":"1506.07739","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-06-25T13:11:34Z","cross_cats_sorted":[],"title_canon_sha256":"3635231c17ad8c424018961ac9c0467cf0482d2166fdaf9562b3a5a3d31ccc86","abstract_canon_sha256":"9833476c964c17508e5827cdde38c632c7b90402c0ce756c5a97e979e847fbbb"},"schema_version":"1.0"},"canonical_sha256":"c7a38adc8394e5118063c404d1653121291dcb26c39b2e7db1ebb46db05b058c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:37:34.372929Z","signature_b64":"MNTkV4YQxv495Oe01OQQrHVndBQ3dBOv3ne6zgZ1DFjV5CpNXDJl3dnwykhU8AV95LsQmrBiorQ48KqPghZbAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c7a38adc8394e5118063c404d1653121291dcb26c39b2e7db1ebb46db05b058c","last_reissued_at":"2026-05-18T01:37:34.372441Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:37:34.372441Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1506.07739","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:37:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TD6mMvn7KDmzOW6OudGJ7lCK/1o/lrMLzgVFGVdLl4ymMEe4Atz6/xySsY4iCsCKaQxMxik6S6kt4KdtRuebAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:18:05.035716Z"},"content_sha256":"967739c7c663fb7afef8189949b350fa68c318a6a910258adbd8144238b44aa0","schema_version":"1.0","event_id":"sha256:967739c7c663fb7afef8189949b350fa68c318a6a910258adbd8144238b44aa0"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:Y6RYVXEDSTSRDADDYQCNCZJREE","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On Making Emerging Trusted Execution Environments Accessible to Developers","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Brian McGillion, N. Asokan, Thomas Nyman","submitted_at":"2015-06-25T13:11:34Z","abstract_excerpt":"New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. In this paper, we motivate the need for realizing standard TEE interfaces on such emerging TEE architectures and show that this exercise is not straightforward. We report on our on-going work in mapping "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.07739","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:37:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7ohhHeIt577VLbXq57c2ZWYchsBfpEkGcpq1pRIvawgOUZ5JN0fKI77E9O2RFCGPuJTMKD0564fkSWGb9GzkDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:18:05.036329Z"},"content_sha256":"d0be125eecd6ffc9619e062e7dd87aabae49e3d20dd19a97265eec016666c92b","schema_version":"1.0","event_id":"sha256:d0be125eecd6ffc9619e062e7dd87aabae49e3d20dd19a97265eec016666c92b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/bundle.json","state_url":"https://pith.science/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T22:18:05Z","links":{"resolver":"https://pith.science/pith/Y6RYVXEDSTSRDADDYQCNCZJREE","bundle":"https://pith.science/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/bundle.json","state":"https://pith.science/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/state.json","well_known_bundle":"https://pith.science/.well-known/pith/Y6RYVXEDSTSRDADDYQCNCZJREE/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:Y6RYVXEDSTSRDADDYQCNCZJREE","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9833476c964c17508e5827cdde38c632c7b90402c0ce756c5a97e979e847fbbb","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-06-25T13:11:34Z","title_canon_sha256":"3635231c17ad8c424018961ac9c0467cf0482d2166fdaf9562b3a5a3d31ccc86"},"schema_version":"1.0","source":{"id":"1506.07739","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.07739","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"arxiv_version","alias_value":"1506.07739v2","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.07739","created_at":"2026-05-18T01:37:34Z"},{"alias_kind":"pith_short_12","alias_value":"Y6RYVXEDSTSR","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_16","alias_value":"Y6RYVXEDSTSRDADD","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_8","alias_value":"Y6RYVXED","created_at":"2026-05-18T12:29:50Z"}],"graph_snapshots":[{"event_id":"sha256:d0be125eecd6ffc9619e062e7dd87aabae49e3d20dd19a97265eec016666c92b","target":"graph","created_at":"2026-05-18T01:37:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. In this paper, we motivate the need for realizing standard TEE interfaces on such emerging TEE architectures and show that this exercise is not straightforward. We report on our on-going work in mapping ","authors_text":"Brian McGillion, N. Asokan, Thomas Nyman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-06-25T13:11:34Z","title":"On Making Emerging Trusted Execution Environments Accessible to Developers"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.07739","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:967739c7c663fb7afef8189949b350fa68c318a6a910258adbd8144238b44aa0","target":"record","created_at":"2026-05-18T01:37:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9833476c964c17508e5827cdde38c632c7b90402c0ce756c5a97e979e847fbbb","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-06-25T13:11:34Z","title_canon_sha256":"3635231c17ad8c424018961ac9c0467cf0482d2166fdaf9562b3a5a3d31ccc86"},"schema_version":"1.0","source":{"id":"1506.07739","kind":"arxiv","version":2}},"canonical_sha256":"c7a38adc8394e5118063c404d1653121291dcb26c39b2e7db1ebb46db05b058c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c7a38adc8394e5118063c404d1653121291dcb26c39b2e7db1ebb46db05b058c","first_computed_at":"2026-05-18T01:37:34.372441Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:37:34.372441Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"MNTkV4YQxv495Oe01OQQrHVndBQ3dBOv3ne6zgZ1DFjV5CpNXDJl3dnwykhU8AV95LsQmrBiorQ48KqPghZbAA==","signature_status":"signed_v1","signed_at":"2026-05-18T01:37:34.372929Z","signed_message":"canonical_sha256_bytes"},"source_id":"1506.07739","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:967739c7c663fb7afef8189949b350fa68c318a6a910258adbd8144238b44aa0","sha256:d0be125eecd6ffc9619e062e7dd87aabae49e3d20dd19a97265eec016666c92b"],"state_sha256":"703db25d0ed617dc4b19c5ea13f0cb404c192bdf18c62bbfd09071d43e672a1b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fprVjS5rJeZEbfkvRFAzPp1EEF3c+dssXhaP+pqTZQbjADPPSNrAcGkXjZHZfDhGGkyhv1ZUUDSkRona3DW1Dw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T22:18:05.039529Z","bundle_sha256":"f8ff086f13df5bee46e87905b64bdda37ec8b54577828fde4c9acea508a44169"}}