首页 > 最新文献

IET Blockchain最新文献

英文 中文
Security and privacy issues in blockchain and its applications 区块链及其应用中的安全和隐私问题
Pub Date : 2023-10-21 DOI: 10.1049/blc2.12051
Liangmin Wang, Victor S. Sheng, Boris Düdder, Haiqin Wu, Huijuan Zhu

Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.

To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.

In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.

These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation

区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评议。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评审。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,有10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 该框架结合了预训练和微调,使预训练模型(教师)能够有效地适应新的数据分布,提高预测性能。同时,训练一个轻量级模型(学生)来提供抽象和高级的信息。实验结果表明,BlockDetective优于最先进的方法。Gong等人提出了一种名为SCGformer的新方法,旨在检测智能合约中的漏洞。该方法结合了控制流图(CFG)和变压器模型的功能,提高了漏洞检测的准确性和有效性。SCGformer涉及使用智能合约的操作代码(opcodes)构建cfg。通过关注操
{"title":"Security and privacy issues in blockchain and its applications","authors":"Liangmin Wang,&nbsp;Victor S. Sheng,&nbsp;Boris Düdder,&nbsp;Haiqin Wu,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12051","DOIUrl":"10.1049/blc2.12051","url":null,"abstract":"<p>Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.</p><p>To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.</p><p>In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.</p><p>These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation ","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"169-171"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135511811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized trustworthiness score management with smart contracts on the trustlend platform 利用 trustlend 平台上的智能合约进行去中心化可信度评分管理
Pub Date : 2023-10-19 DOI: 10.1049/blc2.12053
Wisnu Uriawan, Youakim Badr, Omar Hasan, Lionel Brunie

The personal lending marketplace, known as Peer-to-Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable trustworthy transactions in the personal lending application. The platform attempts to eliminate or minimize the collateral requirement. The trustworthiness score adds to this platform's variable selection rules and can help lenders decide on reliable candidates as borrowers. The prototype implementing the TrustLend platform based on Ethereum smart contracts that use the trustworthiness score is also described and it is illustrated with a Decentralized Application (DApp) case study and customized smart contracts. The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. Finally, the prototype shows how end-users can easily access loans with reduced collateral without hidden costs and swift transactions.

被称为点对点(P2P)借贷的个人借贷市场在全球范围内不断扩大。然而,向同行提供无需抵押的无担保贷款仍是一项挑战。为了在个人借贷应用中实现值得信赖的交易,我们提出了一个名为 TrustLend 的平台。该平台试图消除或尽量减少抵押要求。可信度评分增加了该平台的变量选择规则,可帮助贷款人决定可靠的借款人候选者。本文还介绍了基于以太坊智能合约的 TrustLend 平台原型,该平台使用了可信度评分,并通过去中心化应用程序(DApp)案例研究和定制的智能合约进行了说明。原型展示了基本功能,并支持借款人、贷款人和推荐人建立建议和批准。最后,原型展示了最终用户如何通过减少抵押品、无隐藏成本和快速交易轻松获得贷款。
{"title":"Decentralized trustworthiness score management with smart contracts on the trustlend platform","authors":"Wisnu Uriawan,&nbsp;Youakim Badr,&nbsp;Omar Hasan,&nbsp;Lionel Brunie","doi":"10.1049/blc2.12053","DOIUrl":"10.1049/blc2.12053","url":null,"abstract":"<p>The personal lending marketplace, known as Peer-to-Peer (P2P) lending, has increased globally. However, providing unsecured loans to peers without requiring collateral remains a challenge. A platform called TrustLend is proposed to enable trustworthy transactions in the personal lending application. The platform attempts to eliminate or minimize the collateral requirement. The trustworthiness score adds to this platform's variable selection rules and can help lenders decide on reliable candidates as borrowers. The prototype implementing the TrustLend platform based on Ethereum smart contracts that use the trustworthiness score is also described and it is illustrated with a Decentralized Application (DApp) case study and customized smart contracts. The prototype demonstrates fundamental features and supports borrowers, lenders, and recommenders in establishing proposals and approvals. Finally, the prototype shows how end-users can easily access loans with reduced collateral without hidden costs and swift transactions.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"59-72"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain‐based user authorization management method for information exchanging of federation of industry and commerce 一种基于区块链的工商联信息交换用户授权管理方法
Pub Date : 2023-10-10 DOI: 10.1049/blc2.12052
Jingqi Yang, Hanqing Li
Abstract The blockchain does not need the central organization to make trust endorsement, which is suitable for large scale information exchange between different regions. In addition, blockchain has the characteristics of decentralization and tamper resistant, so that it no longer needs an intermediary platform. A blockchain‐based user authorization management method is proposed, which applies blockchain as an underlaying security mechanism for distributed user authorization management within a trusted community of a distributed information exchange sites of federation of industry and commerce. This method can ensure the reliability, consistency, and integrity of user authorization information. With this method, an elastic data exchange trusted community can be built between the data owner and the authorized data user according to the data exchange needs to achieve reliable distributed access authorization.
摘要区块链不需要中央机构进行信任背书,适合于不同区域间的大规模信息交换。此外,区块链具有去中心化和防篡改的特性,使其不再需要中介平台。提出了一种基于区块链的用户授权管理方法,该方法将区块链作为分布式工商联信息交换站点可信社区内分布式用户授权管理的底层安全机制。该方法可以保证用户授权信息的可靠性、一致性和完整性。该方法可以根据数据交换的需要,在数据所有者和授权的数据用户之间建立弹性的数据交换信任社区,实现可靠的分布式访问授权。
{"title":"A blockchain‐based user authorization management method for information exchanging of federation of industry and commerce","authors":"Jingqi Yang, Hanqing Li","doi":"10.1049/blc2.12052","DOIUrl":"https://doi.org/10.1049/blc2.12052","url":null,"abstract":"Abstract The blockchain does not need the central organization to make trust endorsement, which is suitable for large scale information exchange between different regions. In addition, blockchain has the characteristics of decentralization and tamper resistant, so that it no longer needs an intermediary platform. A blockchain‐based user authorization management method is proposed, which applies blockchain as an underlaying security mechanism for distributed user authorization management within a trusted community of a distributed information exchange sites of federation of industry and commerce. This method can ensure the reliability, consistency, and integrity of user authorization information. With this method, an elastic data exchange trusted community can be built between the data owner and the authorized data user according to the data exchange needs to achieve reliable distributed access authorization.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136359387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing detection on Ethereum via transaction subgraphs embedding 基于交易子图嵌入的以太坊网络钓鱼检测
Pub Date : 2023-10-04 DOI: 10.1049/blc2.12034
Haifeng Lv, Yong Ding

With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective measures and better solutions. Graph models have been proven to provide abundant information for downstream assignments. In this study, a graph-based embedding classification method is proposed for phishing detection on Ethereum by modeling its transaction records using subgraphs. Initially, the transaction data of normal addresses and an equal number of confirmed phishing addresses are collected through web crawling. Multiple subgraphs using the collected transaction records are constructed, with each subgraph containing a target address and its nearby transaction network. To extract features of the addresses, a modified Graph2Vec model called imgraph2vec is designed, which considers block height, timestamp, and amount of transactions. Finally, the Extreme Gradient Boosting (XGBoost) algorithm is employed to detect phishing and normal addresses. The experimental results show that the proposed method achieves good performance in phishing detection, indicating the effectiveness of imgraph2vec in feature acquisition of transaction networks compared to existing models.

随着区块链技术在金融领域的快速发展,由于网络钓鱼欺诈的增加,区块链的安全性正在受到考验。因此,有必要研究更有效的措施和更好的解决方案。图模型已被证明为下游分配提供了丰富的信息。在本研究中,通过使用子图对以太坊的交易记录进行建模,提出了一种基于图的嵌入分类方法,用于以太坊的网络钓鱼检测。最初,通过网络爬行收集正常地址和相同数量的已确认的网络钓鱼地址的交易数据。使用收集到的交易记录构建多个子图,每个子图包含一个目标地址及其附近的交易网络。为了提取地址的特征,设计了一个称为imgraph2vec的改进Graph2Vec模型,该模型考虑了块高度、时间戳和事务数量。最后,利用极限梯度增强(XGBoost)算法对网络钓鱼和正常地址进行检测。实验结果表明,该方法在网络钓鱼检测中取得了良好的性能,表明了与现有模型相比,该方法在交易网络特征获取方面的有效性。
{"title":"Phishing detection on Ethereum via transaction subgraphs embedding","authors":"Haifeng Lv,&nbsp;Yong Ding","doi":"10.1049/blc2.12034","DOIUrl":"10.1049/blc2.12034","url":null,"abstract":"<p>With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective measures and better solutions. Graph models have been proven to provide abundant information for downstream assignments. In this study, a graph-based embedding classification method is proposed for phishing detection on Ethereum by modeling its transaction records using subgraphs. Initially, the transaction data of normal addresses and an equal number of confirmed phishing addresses are collected through web crawling. Multiple subgraphs using the collected transaction records are constructed, with each subgraph containing a target address and its nearby transaction network. To extract features of the addresses, a modified Graph2Vec model called imgraph2vec is designed, which considers block height, timestamp, and amount of transactions. Finally, the Extreme Gradient Boosting (XGBoost) algorithm is employed to detect phishing and normal addresses. The experimental results show that the proposed method achieves good performance in phishing detection, indicating the effectiveness of imgraph2vec in feature acquisition of transaction networks compared to existing models.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"194-203"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135645045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The offline cash puzzle solved by a local blockchain 本地区块链破解离线现金难题
Pub Date : 2023-09-24 DOI: 10.1049/blc2.12049
Henrique de Carvalho Videira

A major drawback in deploying central bank digital currencies (CBDC) is the offline puzzle, which requires that a CBDC must keep the liquidity provision given by cash, and, simultaneously, avoid double-spending, cloning, and other issues. The puzzle is solved by minting the coins in serial numbers, which are stored on a local blockchain inside a smartphone or EMV card. The local blockchain is strengthened by a two-stage approval architecture that mitigates attacks and enables non-repudiation handling. The coins are protected by hardware keys embedded in the microchip and can be continuously mined by the wallet to enhance security. The coins can be either minted as hot coins, which can be retrieved in case of loss, or minted as cold coins, like physical cash.

部署央行数字货币(CBDC)的一个主要缺点是离线难题,它要求 CBDC 必须保持现金提供的流动性,同时避免重复消费、克隆和其他问题。解决这一难题的办法是按序列号铸造硬币,并将其存储在智能手机或 EMV 卡内的本地区块链上。本地区块链通过两级审批架构得到加强,该架构可减轻攻击并实现不可抵赖性处理。硬币由嵌入微芯片的硬件密钥保护,并可由钱包持续开采,以提高安全性。硬币既可以作为热币铸造,在丢失时可以找回,也可以作为冷币铸造,就像实物现金一样。
{"title":"The offline cash puzzle solved by a local blockchain","authors":"Henrique de Carvalho Videira","doi":"10.1049/blc2.12049","DOIUrl":"10.1049/blc2.12049","url":null,"abstract":"<p>A major drawback in deploying central bank digital currencies (CBDC) is the offline puzzle, which requires that a CBDC must keep the liquidity provision given by cash, and, simultaneously, avoid double-spending, cloning, and other issues. The puzzle is solved by minting the coins in serial numbers, which are stored on a local blockchain inside a smartphone or EMV card. The local blockchain is strengthened by a two-stage approval architecture that mitigates attacks and enables non-repudiation handling. The coins are protected by hardware keys embedded in the microchip and can be continuously mined by the wallet to enhance security. The coins can be either minted as hot coins, which can be retrieved in case of loss, or minted as cold coins, like physical cash.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"43-58"},"PeriodicalIF":0.0,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135926225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChainKeeper: A cross-chain scheme for governing the chain by chain ChainKeeper:一种跨链方案,用于逐链管理
Pub Date : 2023-09-08 DOI: 10.1049/blc2.12047
Yuwei Xu, Ran He, Shengjiang Dai, Yujian Zhang

With the rapid application of consortium chains, supervising these systems has become a challenge for governments. The centralized model fails to deliver supervision services that are both open and transparent. Given the benefits of decentralization, non-tampering, and traceability offered by blockchains, researchers propose the concept of ‘governing the chain by chain’, which involves supervising multiple consortium chains by constructing a blockchain. Under this idea, the cross-chain scheme becomes the key to achieving excellent supervision. Existing studies have shortcomings and cannot meet the requirements of universality, security, and efficiency in cross-chain supervision scenarios. Aiming at the challenges, we propose ChainKeeper, a cross-chain scheme for governing the chain by chain. The innovation of our work lies in three points. First, a modular node proxy program is designed to adapt to various implementations of consortium chains. Second, a verifiable node random selection method is put forward to improve the throughput of cross-chain data transmission. Finally, a verifiable identity threshold signature method is proposed to prevent the cheating behavior of malicious nodes. To verify the universality of ChainKeeper, we built a prototype system on three types of consortium chains. The experimental results show that ChainKeeper can achieve high throughput, outperforming two state-of-the-art cross-chain schemes.

随着联合链的快速应用,监管这些系统已成为政府面临的挑战。集中式监管模式无法提供公开透明的监管服务。考虑到区块链提供的去中心化、不可篡改和可追溯性的好处,研究人员提出了“逐链治理”的概念,即通过构建区块链来监督多个财团链。在这种思想下,跨链方案成为实现卓越监管的关键。现有的研究存在不足,不能满足跨链监管场景下的普适性、安全性和高效性的要求。针对这些挑战,我们提出了一种跨链方案ChainKeeper,用于逐链管理。我们工作的创新在于三点。首先,设计了模块化节点代理程序,以适应财团链的各种实现。其次,提出了一种可验证的节点随机选择方法,提高了跨链数据传输的吞吐量。最后,提出了一种可验证的身份阈值签名方法,以防止恶意节点的欺骗行为。为了验证ChainKeeper的通用性,我们在三种类型的联盟链上构建了原型系统。实验结果表明,ChainKeeper可以实现高吞吐量,优于两种最先进的交叉链方案。
{"title":"ChainKeeper: A cross-chain scheme for governing the chain by chain","authors":"Yuwei Xu,&nbsp;Ran He,&nbsp;Shengjiang Dai,&nbsp;Yujian Zhang","doi":"10.1049/blc2.12047","DOIUrl":"10.1049/blc2.12047","url":null,"abstract":"<p>With the rapid application of consortium chains, supervising these systems has become a challenge for governments. The centralized model fails to deliver supervision services that are both open and transparent. Given the benefits of decentralization, non-tampering, and traceability offered by blockchains, researchers propose the concept of ‘governing the chain by chain’, which involves supervising multiple consortium chains by constructing a blockchain. Under this idea, the cross-chain scheme becomes the key to achieving excellent supervision. Existing studies have shortcomings and cannot meet the requirements of universality, security, and efficiency in cross-chain supervision scenarios. Aiming at the challenges, we propose ChainKeeper, a cross-chain scheme for governing the chain by chain. The innovation of our work lies in three points. First, a modular node proxy program is designed to adapt to various implementations of consortium chains. Second, a verifiable node random selection method is put forward to improve the throughput of cross-chain data transmission. Finally, a verifiable identity threshold signature method is proposed to prevent the cheating behavior of malicious nodes. To verify the universality of ChainKeeper, we built a prototype system on three types of consortium chains. The experimental results show that ChainKeeper can achieve high throughput, outperforming two state-of-the-art cross-chain schemes.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"249-264"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77016801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCGformer: Smart contract vulnerability detection based on control flow graph and transformer SCGformer:基于控制流图和变压器的智能合约漏洞检测
Pub Date : 2023-09-06 DOI: 10.1049/blc2.12046
KeXin Gong, Xiangmei Song, Na Wang, Chunyang Wang, Huijuan Zhu

The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods.

智能合约的安全性一直是区块链的重要问题之一。正如之前的研究表明,智能合约中的漏洞可能导致不可预测的损失。随着智能合约数量的快速增长,越来越多基于机器学习的数据驱动检测技术被提出。然而,一些最先进的方法主要依赖于智能合约的源代码。这些方法受到源代码的开放性和编程语言版本的限制。针对这一问题,本文提出了一种基于变压器的漏洞检测方法,通过构建智能合约操作码(opcodes)的控制流图(CFG)来屏蔽不同版本程序语言的差异。在作者自己收集的数据集上进行了大量的实验来评估所提出方法的有效性。实验结果表明,该方法的漏洞检测准确率达到94.36%,优于现有的漏洞检测方法。
{"title":"SCGformer: Smart contract vulnerability detection based on control flow graph and transformer","authors":"KeXin Gong,&nbsp;Xiangmei Song,&nbsp;Na Wang,&nbsp;Chunyang Wang,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12046","DOIUrl":"10.1049/blc2.12046","url":null,"abstract":"<p>The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"213-221"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72942803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection BlockDetective:用于区块链异常检测的基于gcn的师生框架
Pub Date : 2023-09-05 DOI: 10.1049/blc2.12044
Jinglin Li, Yihang Zhang, Chun Yang

The anonymous and tamper-proof nature of the blockchain poses significant challenges in auditing and regulating the behaviour and data on the chain. Criminal activities and anomalies are frequently changing, and fraudsters are devising new ways to evade detection. Moreover, the high volume and complexity of transactions and asymmetric errors make data classification more challenging. Also, class imbalances and high labelling costs are hindering the development of effective algorithms. In response to these issues, the authors present BlockDetective, a novel framework based on GCN that utilizes student–teacher architecture to detect fraudulent cryptocurrency transactions that are related to money laundering. The authors’ method leverages pre-training and fine-tuning, allowing the pre-trained model (teacher) to adapt better to the new data distribution and enhance the prediction performance while teaching a new, light-weight model (student) that provides abstract and top-level information. The authors’ experimental results show that BlockDetective outperforms state-of-the-art research methods by achieving top-notch performance in detecting fraudulent transactions on the blockchain. This framework can assist regulators and auditors in detecting and preventing fraudulent activities on the blockchain, thereby promoting a more secure and transparent financial system.

区块链的匿名性和防篡改性在审计和监管链上的行为和数据方面提出了重大挑战。犯罪活动和异常情况经常发生变化,诈骗者正在设计新的方法来逃避侦查。此外,事务的高容量和复杂性以及不对称错误使数据分类更具挑战性。此外,阶级不平衡和高标签成本阻碍了有效算法的发展。针对这些问题,作者提出了BlockDetective,这是一个基于GCN的新框架,利用学生-教师架构来检测与洗钱有关的欺诈性加密货币交易。作者的方法利用预训练和微调,允许预训练的模型(教师)更好地适应新的数据分布,提高预测性能,同时教授一个新的轻量级模型(学生),提供抽象和顶层信息。作者的实验结果表明,BlockDetective在检测区块链上的欺诈交易方面取得了一流的性能,超过了最先进的研究方法。该框架可以帮助监管机构和审计人员发现和防止区块链上的欺诈活动,从而促进一个更加安全和透明的金融体系。
{"title":"BlockDetective: A GCN-based student–teacher framework for blockchain anomaly detection","authors":"Jinglin Li,&nbsp;Yihang Zhang,&nbsp;Chun Yang","doi":"10.1049/blc2.12044","DOIUrl":"10.1049/blc2.12044","url":null,"abstract":"<p>The anonymous and tamper-proof nature of the blockchain poses significant challenges in auditing and regulating the behaviour and data on the chain. Criminal activities and anomalies are frequently changing, and fraudsters are devising new ways to evade detection. Moreover, the high volume and complexity of transactions and asymmetric errors make data classification more challenging. Also, class imbalances and high labelling costs are hindering the development of effective algorithms. In response to these issues, the authors present BlockDetective, a novel framework based on GCN that utilizes student–teacher architecture to detect fraudulent cryptocurrency transactions that are related to money laundering. The authors’ method leverages pre-training and fine-tuning, allowing the pre-trained model (teacher) to adapt better to the new data distribution and enhance the prediction performance while teaching a new, light-weight model (student) that provides abstract and top-level information. The authors’ experimental results show that BlockDetective outperforms state-of-the-art research methods by achieving top-notch performance in detecting fraudulent transactions on the blockchain. This framework can assist regulators and auditors in detecting and preventing fraudulent activities on the blockchain, thereby promoting a more secure and transparent financial system.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"204-212"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78749929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An on-chain trading model of real world asset backed digital assets 一个真实世界资产支持数字资产的链上交易模型
Pub Date : 2023-09-05 DOI: 10.1049/blc2.12045
Dongsheng Hou, Wenjing Ma, Wei Zhang, Yixuan Li, Yu Du, Yukun Hao

Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto-native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off-chain and on-chain economic systems, an on-chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on-chain and off-chain components which securely pushes data between smart contracts and Web-APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on-chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.

元宇宙是基于区块链技术的数字价值交互网络,是经济系统的重要组成部分。虽然传统金融行业和加密原生行业都通过利用区块链取得了重大进展,但每个行业的价值流仍然局限于单独的生态系统。为了弥合链下和链上经济系统之间的差距,提出了一种链上交易模型,使用HD密钥派生技术直接上传到链上,而无需通过集中服务进行物联网数据传输。为了改善NFT作为静态资产的现状,提出了一种令牌协议,将每个NFT与唯一的帐户地址绑定。此外,oracle技术与跨链上和链下组件的分散和分布式信任模型相结合,可以安全地在智能合约和web - api之间推送数据。基于基于CFMM算法实现自动做市商的智能合约,开发了去中心化交易模型。基于DAG模型进行并行事务计算,保证了底层区块链的高运行性能和安全标准。最后,开发了真实世界资产支持数字资产的链上交易系统,集成了上述所有关键技术,这些技术对应于虚拟世界中完整经济系统的关键功能。
{"title":"An on-chain trading model of real world asset backed digital assets","authors":"Dongsheng Hou,&nbsp;Wenjing Ma,&nbsp;Wei Zhang,&nbsp;Yixuan Li,&nbsp;Yu Du,&nbsp;Yukun Hao","doi":"10.1049/blc2.12045","DOIUrl":"10.1049/blc2.12045","url":null,"abstract":"<p>Metaverse is a digital value interaction network based on blockchain technology, with an important economic system component. While both traditional financial industries and crypto-native industries have made significant progress by leveraging blockchain, the value stream of each remains limited to separate ecosystems. To bridge this gap between off-chain and on-chain economic systems, an on-chain trading model was proposed using HD key derivation technique for direct uploading onto chains without going through centralized services for IoT data transmission. To improve the current status of NFTs as static assets, a token protocol binding each NFT with a unique account address was proposed. Additionally, oracle technique was leveraged with a decentralized and distributed trust model spanning across on-chain and off-chain components which securely pushes data between smart contracts and Web-APIs. A decentralized trading model was developed based on smart contracts implementing automated market makers according to CFMM algorithm. Parallel transaction computing was executed based on the DAG model to ensure high operational performance and security standards of underlying blockchain. Finally, the on-chain trading system of real world asset backed digital assets was developed integrating all the above key techniques that correspond to crucial functions of a complete economic system in Metaverse.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"315-323"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82429059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts 基于字节码的智能合约重入漏洞综合检测与修复方法
Pub Date : 2023-09-04 DOI: 10.1049/blc2.12043
Zijun Feng, Yuming Feng, Hui He, Weizhe Zhang, Yu Zhang

The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.

智能合约中的重入性漏洞给数字货币经济造成了巨大损失。现有的检测和修复该漏洞的解决方案范围有限,缺乏全面的框架。此外,目前还缺乏有效定位漏洞位置的指导方法。拟议的字节码级方法通过整合检测模块、辅助定位模块和修复模块来应对这些挑战。为了提高检测的准确性,引入了一种使用漏洞特征和基于 BiLSTM-Attention 序列模型的操作码分类方法。为了克服漏洞定位的困难,提出了一种基于数据流和控制流分析的辅助定位方法,使开发人员能够更好地定位漏洞。分析了当前的重入漏洞修复方法,并提出了三种可达模式的策略。字节码重写策略利用了 Trampoline 技术进行修复,而燃料优化方法则减少了字节码生成长度,以优化气体成本。通过广泛的实验验证,确认了所提方法的有效性和优越性,进一步验证了整个框架的可行性。实验结果表明,该框架可增强对智能合约中重入漏洞攻击的防护。
{"title":"A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts","authors":"Zijun Feng,&nbsp;Yuming Feng,&nbsp;Hui He,&nbsp;Weizhe Zhang,&nbsp;Yu Zhang","doi":"10.1049/blc2.12043","DOIUrl":"10.1049/blc2.12043","url":null,"abstract":"<p>The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehensive framework. Additionally, there is currently a lack of guidance methods for effectively pinpointing the location of vulnerabilities. The proposed bytecode-level method addresses these challenges by incorporating a detection module, an auxiliary localization module, and a repair module. An opcode classification method is introduced using vulnerability features and a BiLSTM-Attention-based sequence model to enhance detection accuracy. To overcome difficulties in vulnerability localization, an auxiliary localization method based on data flow and control flow analysis is proposed, enabling developers to better locate vulnerabilities. Current reentrancy vulnerability repair methods are analyzed and strategies for three reachable patterns are proposed. The bytecode rewriting strategy utilizes Trampoline technology for repair, while a fuel optimization method reduces bytecode generation length to optimize gas costs. Through extensive experimental validation, the effectiveness and superiority of the proposed methods are confirmed, further validating the feasibility of the entire framework. Experimental results demonstrate that the framework offers enhanced protection against reentrancy vulnerability attacks in smart contracts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"235-251"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1