{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:YLVBOSZEILJK5QHNAKTJ2VIG4X","short_pith_number":"pith:YLVBOSZE","canonical_record":{"source":{"id":"1903.01314","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2019-03-04T15:48:00Z","cross_cats_sorted":["cs.OS"],"title_canon_sha256":"f663dd2fe096a68626d8d30d9f0cf2ab3cf38ff2ffcdae4a49c324e2b8799450","abstract_canon_sha256":"875d0516deb9d5fa166f1fdd77f8140e0b3d9398caf52c623efc910fe586346b"},"schema_version":"1.0"},"canonical_sha256":"c2ea174b2442d2aec0ed02a69d5506e5caf5cc688a847427246403623dcde2c7","source":{"kind":"arxiv","id":"1903.01314","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.01314","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"arxiv_version","alias_value":"1903.01314v1","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.01314","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"pith_short_12","alias_value":"YLVBOSZEILJK","created_at":"2026-05-18T12:33:33Z"},{"alias_kind":"pith_short_16","alias_value":"YLVBOSZEILJK5QHN","created_at":"2026-05-18T12:33:33Z"},{"alias_kind":"pith_short_8","alias_value":"YLVBOSZE","created_at":"2026-05-18T12:33:33Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:YLVBOSZEILJK5QHNAKTJ2VIG4X","target":"record","payload":{"canonical_record":{"source":{"id":"1903.01314","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2019-03-04T15:48:00Z","cross_cats_sorted":["cs.OS"],"title_canon_sha256":"f663dd2fe096a68626d8d30d9f0cf2ab3cf38ff2ffcdae4a49c324e2b8799450","abstract_canon_sha256":"875d0516deb9d5fa166f1fdd77f8140e0b3d9398caf52c623efc910fe586346b"},"schema_version":"1.0"},"canonical_sha256":"c2ea174b2442d2aec0ed02a69d5506e5caf5cc688a847427246403623dcde2c7","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:52:09.114397Z","signature_b64":"fLu1uxJtdOesWzdxd8MPHt7/tKitZ0KU63028N3BNO3KP4MIDb4K1hMRiubiQ/oXw9tZ+NwgrBqg42aZOmwtAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c2ea174b2442d2aec0ed02a69d5506e5caf5cc688a847427246403623dcde2c7","last_reissued_at":"2026-05-17T23:52:09.113867Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:52:09.113867Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1903.01314","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:52:09Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6Vg7RRy3LSYJz8sFzQpkXolv6KhXdZd77F8nc0ZVNgnwxZf8fq6TtxdPEmb3KeTiutdNArAhw2sacX0GfSTaBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T08:12:55.758073Z"},"content_sha256":"c5e47c453fcd1274c0fd88766589d5566a7af0f0b53a44d7a22b6e58df1c1dc8","schema_version":"1.0","event_id":"sha256:c5e47c453fcd1274c0fd88766589d5566a7af0f0b53a44d7a22b6e58df1c1dc8"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:YLVBOSZEILJK5QHNAKTJ2VIG4X","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Denial-of-Service Attacks on Shared Cache in Multicore: Analysis and Prevention","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.OS"],"primary_cat":"cs.AR","authors_text":"Heechul Yun, Michael G Bechtel","submitted_at":"2019-03-04T15:48:00Z","abstract_excerpt":"In this paper we investigate the feasibility of denial-of-service (DoS) attacks on shared caches in multicore platforms. With carefully engineered attacker tasks, we are able to cause more than 300X execution time increases on a victim task running on a dedicated core on a popular embedded multicore platform, regardless of whether we partition its shared cache or not. Based on careful experimentation on real and simulated multicore platforms, we identify an internal hardware structure of a non-blocking cache, namely the cache writeback buffer, as a potential target of shared cache DoS attacks."},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.01314","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:52:09Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fbJE8RNbL+Vl/cW9+gxV1VIAKgR4Jsp3B+wcOvv/7ohcPvsszQurK8D941sNjP+04kYDmOCPbMpblNddYP5nDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T08:12:55.758973Z"},"content_sha256":"4ca15401175a650ea5df8a71e7c855668512793ca0c2ccb0b623ac5a6e722728","schema_version":"1.0","event_id":"sha256:4ca15401175a650ea5df8a71e7c855668512793ca0c2ccb0b623ac5a6e722728"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/bundle.json","state_url":"https://pith.science/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T08:12:55Z","links":{"resolver":"https://pith.science/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X","bundle":"https://pith.science/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/bundle.json","state":"https://pith.science/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YLVBOSZEILJK5QHNAKTJ2VIG4X/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:YLVBOSZEILJK5QHNAKTJ2VIG4X","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"875d0516deb9d5fa166f1fdd77f8140e0b3d9398caf52c623efc910fe586346b","cross_cats_sorted":["cs.OS"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2019-03-04T15:48:00Z","title_canon_sha256":"f663dd2fe096a68626d8d30d9f0cf2ab3cf38ff2ffcdae4a49c324e2b8799450"},"schema_version":"1.0","source":{"id":"1903.01314","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1903.01314","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"arxiv_version","alias_value":"1903.01314v1","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1903.01314","created_at":"2026-05-17T23:52:09Z"},{"alias_kind":"pith_short_12","alias_value":"YLVBOSZEILJK","created_at":"2026-05-18T12:33:33Z"},{"alias_kind":"pith_short_16","alias_value":"YLVBOSZEILJK5QHN","created_at":"2026-05-18T12:33:33Z"},{"alias_kind":"pith_short_8","alias_value":"YLVBOSZE","created_at":"2026-05-18T12:33:33Z"}],"graph_snapshots":[{"event_id":"sha256:4ca15401175a650ea5df8a71e7c855668512793ca0c2ccb0b623ac5a6e722728","target":"graph","created_at":"2026-05-17T23:52:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper we investigate the feasibility of denial-of-service (DoS) attacks on shared caches in multicore platforms. With carefully engineered attacker tasks, we are able to cause more than 300X execution time increases on a victim task running on a dedicated core on a popular embedded multicore platform, regardless of whether we partition its shared cache or not. Based on careful experimentation on real and simulated multicore platforms, we identify an internal hardware structure of a non-blocking cache, namely the cache writeback buffer, as a potential target of shared cache DoS attacks.","authors_text":"Heechul Yun, Michael G Bechtel","cross_cats":["cs.OS"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2019-03-04T15:48:00Z","title":"Denial-of-Service Attacks on Shared Cache in Multicore: Analysis and Prevention"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1903.01314","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c5e47c453fcd1274c0fd88766589d5566a7af0f0b53a44d7a22b6e58df1c1dc8","target":"record","created_at":"2026-05-17T23:52:09Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"875d0516deb9d5fa166f1fdd77f8140e0b3d9398caf52c623efc910fe586346b","cross_cats_sorted":["cs.OS"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AR","submitted_at":"2019-03-04T15:48:00Z","title_canon_sha256":"f663dd2fe096a68626d8d30d9f0cf2ab3cf38ff2ffcdae4a49c324e2b8799450"},"schema_version":"1.0","source":{"id":"1903.01314","kind":"arxiv","version":1}},"canonical_sha256":"c2ea174b2442d2aec0ed02a69d5506e5caf5cc688a847427246403623dcde2c7","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c2ea174b2442d2aec0ed02a69d5506e5caf5cc688a847427246403623dcde2c7","first_computed_at":"2026-05-17T23:52:09.113867Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:52:09.113867Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"fLu1uxJtdOesWzdxd8MPHt7/tKitZ0KU63028N3BNO3KP4MIDb4K1hMRiubiQ/oXw9tZ+NwgrBqg42aZOmwtAQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:52:09.114397Z","signed_message":"canonical_sha256_bytes"},"source_id":"1903.01314","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c5e47c453fcd1274c0fd88766589d5566a7af0f0b53a44d7a22b6e58df1c1dc8","sha256:4ca15401175a650ea5df8a71e7c855668512793ca0c2ccb0b623ac5a6e722728"],"state_sha256":"2d58a52e7e76ead4b9519cd6e3a08c05ad15fdec651ce8f8fc755cef742cb5ba"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"dtDV44H3ugld9AOXrEA7+D2e66pTp92PjJghgZf8ly5mPh70hb8/boUfO/QI0yxWGzNszSqpL46vYschSJ/4CA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T08:12:55.762408Z","bundle_sha256":"28b751c62f53b9df97385ae5f4d43cf6ac47d9b2c34561ecac8fb11a2b23a79f"}}