{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2012:YS44BSDRFMI6F5YPRCZI7MTRF7","short_pith_number":"pith:YS44BSDR","schema_version":"1.0","canonical_sha256":"c4b9c0c8712b11e2f70f88b28fb2712ff4b146ae978db97b1626a75239b60495","source":{"kind":"arxiv","id":"1202.5722","version":1},"attestation_state":"computed","paper":{"title":"S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"cs.CR","authors_text":"Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo, Sibin Mohan, Stanley Bak","submitted_at":"2012-02-26T04:36:54Z","abstract_excerpt":"Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that contr"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1202.5722","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2012-02-26T04:36:54Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"768a0882c6f3abf34653ff7a67624259935774f6c65c070e52654eb4218104d8","abstract_canon_sha256":"5bbeca8b65cca2c1560a34e7cd8a6290cf424eb8cf342a1a81992995e25b280a"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:01:24.870261Z","signature_b64":"9zxhBKmk2fxxpJikNH62t9KxkS6QsRUfl8ddK/LLeMAP1sm3gaNt09x0t5IhVGTR8FxT/FOzEPsyoJveLISsAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c4b9c0c8712b11e2f70f88b28fb2712ff4b146ae978db97b1626a75239b60495","last_reissued_at":"2026-05-18T04:01:24.869616Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:01:24.869616Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"cs.CR","authors_text":"Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo, Sibin Mohan, Stanley Bak","submitted_at":"2012-02-26T04:36:54Z","abstract_excerpt":"Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that contr"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1202.5722","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1202.5722","created_at":"2026-05-18T04:01:24.869703+00:00"},{"alias_kind":"arxiv_version","alias_value":"1202.5722v1","created_at":"2026-05-18T04:01:24.869703+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1202.5722","created_at":"2026-05-18T04:01:24.869703+00:00"},{"alias_kind":"pith_short_12","alias_value":"YS44BSDRFMI6","created_at":"2026-05-18T12:27:30.460161+00:00"},{"alias_kind":"pith_short_16","alias_value":"YS44BSDRFMI6F5YP","created_at":"2026-05-18T12:27:30.460161+00:00"},{"alias_kind":"pith_short_8","alias_value":"YS44BSDR","created_at":"2026-05-18T12:27:30.460161+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7","json":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7.json","graph_json":"https://pith.science/api/pith-number/YS44BSDRFMI6F5YPRCZI7MTRF7/graph.json","events_json":"https://pith.science/api/pith-number/YS44BSDRFMI6F5YPRCZI7MTRF7/events.json","paper":"https://pith.science/paper/1202.5722"},"agent_actions":{"view_html":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7","download_json":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7.json","view_paper":"https://pith.science/paper/1202.5722","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1202.5722&json=true","fetch_graph":"https://pith.science/api/pith-number/YS44BSDRFMI6F5YPRCZI7MTRF7/graph.json","fetch_events":"https://pith.science/api/pith-number/YS44BSDRFMI6F5YPRCZI7MTRF7/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7/action/timestamp_anchor","attest_storage":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7/action/storage_attestation","attest_author":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7/action/author_attestation","sign_citation":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7/action/citation_signature","submit_replication":"https://pith.science/pith/YS44BSDRFMI6F5YPRCZI7MTRF7/action/replication_record"}},"created_at":"2026-05-18T04:01:24.869703+00:00","updated_at":"2026-05-18T04:01:24.869703+00:00"}