{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:RHGF6SLIPMYH7I37I7BXGSJDZK","short_pith_number":"pith:RHGF6SLI","canonical_record":{"source":{"id":"1801.08535","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-01-24T22:02:40Z","cross_cats_sorted":["cs.LG","cs.SD","eess.AS"],"title_canon_sha256":"1f7dc5a7011881ad4d1df30214c3107d66aadb10b4d9b7cb8c9b35c8cf216c0d","abstract_canon_sha256":"6a6b517b0af1b8c8eed4f1062551db3d1bf210db6b0d73042e1d4b65e32d6b33"},"schema_version":"1.0"},"canonical_sha256":"89cc5f49687b307fa37f47c3734923caa02b6cd90ab9a6942886a34fb2fea18f","source":{"kind":"arxiv","id":"1801.08535","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.08535","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"arxiv_version","alias_value":"1801.08535v3","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.08535","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"pith_short_12","alias_value":"RHGF6SLIPMYH","created_at":"2026-05-18T12:32:50Z"},{"alias_kind":"pith_short_16","alias_value":"RHGF6SLIPMYH7I37","created_at":"2026-05-18T12:32:50Z"},{"alias_kind":"pith_short_8","alias_value":"RHGF6SLI","created_at":"2026-05-18T12:32:50Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:RHGF6SLIPMYH7I37I7BXGSJDZK","target":"record","payload":{"canonical_record":{"source":{"id":"1801.08535","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-01-24T22:02:40Z","cross_cats_sorted":["cs.LG","cs.SD","eess.AS"],"title_canon_sha256":"1f7dc5a7011881ad4d1df30214c3107d66aadb10b4d9b7cb8c9b35c8cf216c0d","abstract_canon_sha256":"6a6b517b0af1b8c8eed4f1062551db3d1bf210db6b0d73042e1d4b65e32d6b33"},"schema_version":"1.0"},"canonical_sha256":"89cc5f49687b307fa37f47c3734923caa02b6cd90ab9a6942886a34fb2fea18f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:11:57.534714Z","signature_b64":"lE81ija5aKJByOTWBHJi7GA5/wHIoTXSqAmf8DGv3yfA4YXFpOvhc9ly6plVkhvA+aDFTrpQssQvNp8iSwEPAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"89cc5f49687b307fa37f47c3734923caa02b6cd90ab9a6942886a34fb2fea18f","last_reissued_at":"2026-05-18T00:11:57.533436Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:11:57.533436Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1801.08535","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:11:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"x6was4v3pA4W6j5OOuzQi9S+yWPkE1tYih5N2UJPFZIlCj+yJ7o2Qfzv5xEU0F51WvYB7oEBRx1GGRg9xcywBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T19:47:07.766996Z"},"content_sha256":"6045b678836a37abbb6d5807ce059ec044c0067b8e76db450ab66db618b4e772","schema_version":"1.0","event_id":"sha256:6045b678836a37abbb6d5807ce059ec044c0067b8e76db450ab66db618b4e772"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:RHGF6SLIPMYH7I37I7BXGSJDZK","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","cs.SD","eess.AS"],"primary_cat":"cs.CR","authors_text":"Carl A. Gunter, Heqing Huang, Kai Chen, Shengzhi Zhang, Xiaofeng Wang, Xiaokang Liu, Xuejing Yuan, Yue Zhao, Yunhui Long, Yuxuan Chen","submitted_at":"2018-01-24T22:02:40Z","abstract_excerpt":"The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since they are either less stealthy (producing noise-like voice commands) or requiring the physical presence of an attack device (using ultrasound). In this paper, we demonstrate that not only are more practical and surreptitious attacks feasible but they can even be automatically constructed. Specifically, we find that the voice commands can be stealthily embedded into songs, which, when "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.08535","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:11:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9SdVSk8v+EQ0isBFzuLhZX94ZbVgGXYPPrUAJfqI40lYb7TC5Xq01sMMX48HPuUeY4pckIs6Mp4o7KT7VJ3bDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T19:47:07.767733Z"},"content_sha256":"ab10179b1279dcd455bf9d4d972b4ea0df464fa78adf05398e1c02238329cf5b","schema_version":"1.0","event_id":"sha256:ab10179b1279dcd455bf9d4d972b4ea0df464fa78adf05398e1c02238329cf5b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/bundle.json","state_url":"https://pith.science/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T19:47:07Z","links":{"resolver":"https://pith.science/pith/RHGF6SLIPMYH7I37I7BXGSJDZK","bundle":"https://pith.science/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/bundle.json","state":"https://pith.science/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RHGF6SLIPMYH7I37I7BXGSJDZK/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:RHGF6SLIPMYH7I37I7BXGSJDZK","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"6a6b517b0af1b8c8eed4f1062551db3d1bf210db6b0d73042e1d4b65e32d6b33","cross_cats_sorted":["cs.LG","cs.SD","eess.AS"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-01-24T22:02:40Z","title_canon_sha256":"1f7dc5a7011881ad4d1df30214c3107d66aadb10b4d9b7cb8c9b35c8cf216c0d"},"schema_version":"1.0","source":{"id":"1801.08535","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.08535","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"arxiv_version","alias_value":"1801.08535v3","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.08535","created_at":"2026-05-18T00:11:57Z"},{"alias_kind":"pith_short_12","alias_value":"RHGF6SLIPMYH","created_at":"2026-05-18T12:32:50Z"},{"alias_kind":"pith_short_16","alias_value":"RHGF6SLIPMYH7I37","created_at":"2026-05-18T12:32:50Z"},{"alias_kind":"pith_short_8","alias_value":"RHGF6SLI","created_at":"2026-05-18T12:32:50Z"}],"graph_snapshots":[{"event_id":"sha256:ab10179b1279dcd455bf9d4d972b4ea0df464fa78adf05398e1c02238329cf5b","target":"graph","created_at":"2026-05-18T00:11:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The popularity of ASR (automatic speech recognition) systems, like Google Voice, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since they are either less stealthy (producing noise-like voice commands) or requiring the physical presence of an attack device (using ultrasound). In this paper, we demonstrate that not only are more practical and surreptitious attacks feasible but they can even be automatically constructed. Specifically, we find that the voice commands can be stealthily embedded into songs, which, when ","authors_text":"Carl A. Gunter, Heqing Huang, Kai Chen, Shengzhi Zhang, Xiaofeng Wang, Xiaokang Liu, Xuejing Yuan, Yue Zhao, Yunhui Long, Yuxuan Chen","cross_cats":["cs.LG","cs.SD","eess.AS"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-01-24T22:02:40Z","title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.08535","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6045b678836a37abbb6d5807ce059ec044c0067b8e76db450ab66db618b4e772","target":"record","created_at":"2026-05-18T00:11:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"6a6b517b0af1b8c8eed4f1062551db3d1bf210db6b0d73042e1d4b65e32d6b33","cross_cats_sorted":["cs.LG","cs.SD","eess.AS"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-01-24T22:02:40Z","title_canon_sha256":"1f7dc5a7011881ad4d1df30214c3107d66aadb10b4d9b7cb8c9b35c8cf216c0d"},"schema_version":"1.0","source":{"id":"1801.08535","kind":"arxiv","version":3}},"canonical_sha256":"89cc5f49687b307fa37f47c3734923caa02b6cd90ab9a6942886a34fb2fea18f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"89cc5f49687b307fa37f47c3734923caa02b6cd90ab9a6942886a34fb2fea18f","first_computed_at":"2026-05-18T00:11:57.533436Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:11:57.533436Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"lE81ija5aKJByOTWBHJi7GA5/wHIoTXSqAmf8DGv3yfA4YXFpOvhc9ly6plVkhvA+aDFTrpQssQvNp8iSwEPAA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:11:57.534714Z","signed_message":"canonical_sha256_bytes"},"source_id":"1801.08535","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6045b678836a37abbb6d5807ce059ec044c0067b8e76db450ab66db618b4e772","sha256:ab10179b1279dcd455bf9d4d972b4ea0df464fa78adf05398e1c02238329cf5b"],"state_sha256":"75e2ad2cf153a6a0a134a5641c0320568badb6b1cbfcd9bf3ece05c2e6a67cb1"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pf3VQlhmqg8Wn+m2nICcywez2v2rHHOSh0Hw0tTKhB0Ju7xgUES4XuBYz8L8DIqgUzs7zCuTFZEYuFJJFJMECw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T19:47:07.771815Z","bundle_sha256":"a740210ca5086d20d5399d4cd473ca4c7b53f1f43e0bd6cc9b3bc596f41c1df6"}}