首页 > 最新文献

Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop最新文献

英文 中文
Non-Interactive Cryptographic Access Control for Secure Outsourced Storage 用于安全外包存储的非交互式加密访问控制
Wei Yuan
Traditionally, a CP-ABE scheme includes 4 basic algorithms: Setup, KeyGen, Encrypt, and Decrypt as Figure 1(a). If the data owner wants to change the access policy of data, he/she should download, re-encrypt, and then re-upload a new ciphertext. NIPU-CP-ABE consists of 7 polynomial time algorithms as Figure 1(b): Setup and KeyGen are executed by a trusted center; UpdateKeyGen, Encrypt and PolicyUpdate are executed by the data owner; Decrypt is executed by the data receivers; CiphertextUpdate is executed by a semi-trusted storage platform. If the data owner wants to change the data access policy, he/she can directly generate a public update component (PUC). Then the data access policy can be changed based on PUC and existing ciphertext. That is to say, the ciphertext under a new access policy can be synthesized by the ciphertext under an old policy and a sectional ciphertext under the new access policy. We can simply express the update as: Old CT + PUC → New CT Or say, we have following equivalence relation for policy update: Decrypt + Encrypt ⇔ PolicyUpdate + CiphertextUpdate Obviously, this bring an advantage that the communication times to change data access policy becomes half of traditional reencryption.
传统上,CP-ABE方案包括4种基本算法:Setup、KeyGen、Encrypt和Decrypt,如图1(a)所示。如果数据所有者希望更改数据的访问策略,则需要下载并重新加密,然后重新上传新的密文。NIPU-CP-ABE由7种多项式时间算法组成,如图1(b)所示:Setup和KeyGen由可信中心执行;UpdateKeyGen、Encrypt和PolicyUpdate由数据所有者执行;解密由数据接收者执行;ciphertextuupdate由半可信的存储平台执行。如果数据所有者希望更改数据访问策略,则可以直接生成公共更新组件(public update component, PUC)。然后根据PUC和已有密文修改数据访问策略。也就是说,新访问策略下的密文可以由旧访问策略下的密文和新访问策略下的分段密文合成而成。我们可以简单地将更新表示为:Old CT + PUC→New CT,或者说策略更新有如下等价关系:Decrypt + Encrypt⇔PolicyUpdate + CiphertextUpdate显然,这带来了一个优点,即更改数据访问策略的通信次数减少了传统重加密的一半。
{"title":"Non-Interactive Cryptographic Access Control for Secure Outsourced Storage","authors":"Wei Yuan","doi":"10.1145/3411495.3421367","DOIUrl":"https://doi.org/10.1145/3411495.3421367","url":null,"abstract":"Traditionally, a CP-ABE scheme includes 4 basic algorithms: Setup, KeyGen, Encrypt, and Decrypt as Figure 1(a). If the data owner wants to change the access policy of data, he/she should download, re-encrypt, and then re-upload a new ciphertext. NIPU-CP-ABE consists of 7 polynomial time algorithms as Figure 1(b): Setup and KeyGen are executed by a trusted center; UpdateKeyGen, Encrypt and PolicyUpdate are executed by the data owner; Decrypt is executed by the data receivers; CiphertextUpdate is executed by a semi-trusted storage platform. If the data owner wants to change the data access policy, he/she can directly generate a public update component (PUC). Then the data access policy can be changed based on PUC and existing ciphertext. That is to say, the ciphertext under a new access policy can be synthesized by the ciphertext under an old policy and a sectional ciphertext under the new access policy. We can simply express the update as: Old CT + PUC → New CT Or say, we have following equivalence relation for policy update: Decrypt + Encrypt ⇔ PolicyUpdate + CiphertextUpdate Obviously, this bring an advantage that the communication times to change data access policy becomes half of traditional reencryption.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption 使用客户端加密实现安全的基于web的云服务
Martin Johns, Alexandra Dirksen
The recent years have brought an influx of privacy conscious applications, that enable strong security guarantees for end-users via end-to-end or client-side encryption. Unfortunately, this application paradigm is not easily transferable to web-based cloud applications. The reason for this lies within adversary's enhanced control over client-side computing through application provided JavaScript. In this paper, we propose CryptoMembranes - a set of native client-side components that allow the development of web applications which provide a robust isolation layer between the client-side encrypted user data and the potentially untrusted JavaScript, while maintaining full interoperability with current client-side development practices. In addition, to enable a realistic transition phase, we show how CryptoMembranes can be realized for currently existing web browsers via a standard browser extension.
近年来出现了大量具有隐私意识的应用程序,这些应用程序通过端到端或客户端加密为最终用户提供强大的安全保证。不幸的是,这种应用程序范例不容易转移到基于web的云应用程序中。其原因在于对手通过应用程序提供的JavaScript增强了对客户端计算的控制。在本文中,我们提出了CryptoMembranes——一组本地客户端组件,它允许开发web应用程序,在客户端加密用户数据和潜在的不可信JavaScript之间提供一个健壮的隔离层,同时保持与当前客户端开发实践的完全互操作性。此外,为了实现现实的过渡阶段,我们展示了如何通过标准浏览器扩展为当前现有的web浏览器实现CryptoMembranes。
{"title":"Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption","authors":"Martin Johns, Alexandra Dirksen","doi":"10.1145/3411495.3421364","DOIUrl":"https://doi.org/10.1145/3411495.3421364","url":null,"abstract":"The recent years have brought an influx of privacy conscious applications, that enable strong security guarantees for end-users via end-to-end or client-side encryption. Unfortunately, this application paradigm is not easily transferable to web-based cloud applications. The reason for this lies within adversary's enhanced control over client-side computing through application provided JavaScript. In this paper, we propose CryptoMembranes - a set of native client-side components that allow the development of web applications which provide a robust isolation layer between the client-side encrypted user data and the potentially untrusted JavaScript, while maintaining full interoperability with current client-side development practices. In addition, to enable a realistic transition phase, we show how CryptoMembranes can be realized for currently existing web browsers via a standard browser extension.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123678923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verifpal: Cryptographic Protocol Analysis for the Real World Verifpal:真实世界的加密协议分析
Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing comprehensive formal verification features. In order to achieve this, Verifpal introduces a new, intuitive language for modeling protocols that is easier to write and understand than the languages employed by existing tools. Its formal verification paradigm is also designed explicitly to provide protocol modeling that avoids user error. Verifpal is able to model protocols under an active attacker with unbounded sessions and fresh values, and supports queries for advanced security properties such as forward secrecy or key compromise impersonation. Furthermore, Verifpal's semantics have been formalized within the Coq theorem prover, and Verifpal models can be automatically translated into Coq as well as into ProVerif models for further verification. Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3 as well as the first formal model for the DP-3T pandemic-tracing protocol, which we present in this work. Through Verifpal, we show that advanced verification with formalized semantics and sound logic can exist without any expense towards the convenience of real-world practitioners.
Verifpal是一个新的自动建模框架和加密协议验证器,针对常见的协议规范进行了启发式优化,旨在为现实世界的从业者、学生和工程师提供更好的工作,而不会牺牲全面的形式验证功能。为了实现这一点,Verifpal引入了一种新的、直观的协议建模语言,它比现有工具使用的语言更容易编写和理解。它的正式验证范例也被明确地设计为提供避免用户错误的协议建模。Verifpal能够在具有无界会话和新值的活跃攻击者下对协议进行建模,并支持查询高级安全属性,如前向保密或密钥泄露模拟。此外,Verifpal的语义已经在Coq定理证明器中形式化,并且Verifpal模型可以自动转换为Coq和ProVerif模型,以便进一步验证。Verifpal已经被用于验证Signal、cuttlebutt、TLS 1.3的安全属性,以及我们在本工作中提出的DP-3T流行病追踪协议的第一个正式模型。通过Verifpal,我们展示了具有形式化语义和合理逻辑的高级验证可以存在,而无需为现实世界的从业者提供任何便利。
{"title":"Verifpal: Cryptographic Protocol Analysis for the Real World","authors":"Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari","doi":"10.1145/3411495.3421365","DOIUrl":"https://doi.org/10.1145/3411495.3421365","url":null,"abstract":"Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing comprehensive formal verification features. In order to achieve this, Verifpal introduces a new, intuitive language for modeling protocols that is easier to write and understand than the languages employed by existing tools. Its formal verification paradigm is also designed explicitly to provide protocol modeling that avoids user error. Verifpal is able to model protocols under an active attacker with unbounded sessions and fresh values, and supports queries for advanced security properties such as forward secrecy or key compromise impersonation. Furthermore, Verifpal's semantics have been formalized within the Coq theorem prover, and Verifpal models can be automatically translated into Coq as well as into ProVerif models for further verification. Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3 as well as the first formal model for the DP-3T pandemic-tracing protocol, which we present in this work. Through Verifpal, we show that advanced verification with formalized semantics and sound logic can exist without any expense towards the convenience of real-world practitioners.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128198284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems Tiki-Taka:攻击和防御基于深度学习的入侵检测系统
Chaoyun Zhang, X. Costa, P. Patras
Neural networks are increasingly important in the development of Network Intrusion Detection Systems (NIDS), as they have the potential to achieve high detection accuracy while requiring limited feature engineering. Deep learning-based detectors can be however vulnerable to adversarial examples, by which attackers that may be oblivious to the precise mechanics of the targeted NIDS add subtle perturbations to malicious traffic features, with the aim of evading detection and disrupting critical systems in a cost-effective manner. Defending against such adversarial attacks is therefore of high importance, but requires to address daunting challenges. In this paper, we introduce Tiki-Taka, a general framework for (i) assessing the robustness of state-of-the-art deep learning-based NIDS against adversarial manipulations, and which (ii) incorporates our proposed defense mechanisms to increase the NIDS' resistance to attacks employing such evasion techniques. Specifically, we select five different cutting-edge adversarial attack mechanisms to subvert three popular malicious traffic detectors that employ neural networks. We experiment with a publicly available dataset and consider both one-to-all and one-to-one classification scenarios, i.e., discriminating illicit vs benign traffic and respectively identifying specific types of anomalous traffic among many observed. The results obtained reveal that, under realistic constraints, attackers can evade NIDS with up to 35.7% success rates, by only altering time-based features of the traffic generated. To counteract these weaknesses, we propose three defense mechanisms, namely: model voting ensembling, ensembling adversarial training, and query detection. To the best of our knowledge, our work is the first to propose defenses against adversarial attacks targeting NIDS. We demonstrate that when employing the proposed methods, intrusion detection rates can be improved to nearly 100% against most types of malicious traffic, and attacks with potentially catastrophic consequences (e.g., botnet) can be thwarted. This confirms the effectiveness of our solutions and makes the case for their adoption when designing robust and reliable deep anomaly detectors.
神经网络在网络入侵检测系统(NIDS)的发展中越来越重要,因为它们有可能在需要有限的特征工程的情况下实现高检测精度。然而,基于深度学习的检测器可能容易受到对抗性示例的攻击,攻击者可能会忽略目标NIDS的精确机制,从而对恶意流量特征添加微妙的扰动,目的是以经济有效的方式逃避检测并破坏关键系统。因此,防范这种对抗性攻击非常重要,但需要应对令人生畏的挑战。在本文中,我们介绍了Tiki-Taka,这是一个通用框架,用于(i)评估最先进的基于深度学习的NIDS对对抗性操作的鲁棒性,并且(ii)结合我们提出的防御机制,以增加NIDS对使用此类逃避技术的攻击的抵抗力。具体来说,我们选择了五种不同的尖端对抗性攻击机制来破坏三种使用神经网络的流行恶意流量检测器。我们使用公开可用的数据集进行实验,并考虑一对所有和一对一的分类场景,即区分非法流量与良性流量,并在许多观察到的流量中分别识别特定类型的异常流量。结果表明,在现实的约束条件下,攻击者仅通过改变流量的时间特征,就可以规避NIDS,成功率高达35.7%。为了克服这些弱点,我们提出了三种防御机制,即:模型投票集成、集成对抗训练和查询检测。据我们所知,我们的工作是第一个提出防御针对NIDS的对抗性攻击的研究。我们证明,当采用所提出的方法时,针对大多数类型的恶意流量,入侵检测率可以提高到接近100%,并且可以挫败具有潜在灾难性后果的攻击(例如僵尸网络)。这证实了我们的解决方案的有效性,并在设计强大可靠的深部异常探测器时采用它们。
{"title":"Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems","authors":"Chaoyun Zhang, X. Costa, P. Patras","doi":"10.1145/3411495.3421359","DOIUrl":"https://doi.org/10.1145/3411495.3421359","url":null,"abstract":"Neural networks are increasingly important in the development of Network Intrusion Detection Systems (NIDS), as they have the potential to achieve high detection accuracy while requiring limited feature engineering. Deep learning-based detectors can be however vulnerable to adversarial examples, by which attackers that may be oblivious to the precise mechanics of the targeted NIDS add subtle perturbations to malicious traffic features, with the aim of evading detection and disrupting critical systems in a cost-effective manner. Defending against such adversarial attacks is therefore of high importance, but requires to address daunting challenges. In this paper, we introduce Tiki-Taka, a general framework for (i) assessing the robustness of state-of-the-art deep learning-based NIDS against adversarial manipulations, and which (ii) incorporates our proposed defense mechanisms to increase the NIDS' resistance to attacks employing such evasion techniques. Specifically, we select five different cutting-edge adversarial attack mechanisms to subvert three popular malicious traffic detectors that employ neural networks. We experiment with a publicly available dataset and consider both one-to-all and one-to-one classification scenarios, i.e., discriminating illicit vs benign traffic and respectively identifying specific types of anomalous traffic among many observed. The results obtained reveal that, under realistic constraints, attackers can evade NIDS with up to 35.7% success rates, by only altering time-based features of the traffic generated. To counteract these weaknesses, we propose three defense mechanisms, namely: model voting ensembling, ensembling adversarial training, and query detection. To the best of our knowledge, our work is the first to propose defenses against adversarial attacks targeting NIDS. We demonstrate that when employing the proposed methods, intrusion detection rates can be improved to nearly 100% against most types of malicious traffic, and attacks with potentially catastrophic consequences (e.g., botnet) can be thwarted. This confirms the effectiveness of our solutions and makes the case for their adoption when designing robust and reliable deep anomaly detectors.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization 摘要:一种基于多群粒子群优化的分布式黑盒对抗攻击
Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim
Current adversarial attack methods in black-box settings mainly: (1) rely on transferability approach which requires a substitute model, hence inefficient; or (2) employ a large number of queries for crafting their adversarial examples, hence very likely to be detected and responded by the target system (e.g., AI service provider) due to its high traffic volume. In this paper, we present a black-box adversarial attack based on Multi-Group Particle Swarm Optimization with Random Redistribution (MGRR-PSO) which yields a very high success rate while maintaining a low number of query by launching the attack in a distributed manner. Attacks are executed from multiple nodes, disseminating queries among the nodes, hence reducing the possibility of being recognized by the target system while also increasing scalability. Furthermore, we propose to efficiently remove excessive perturbation (i.e., perturbation pruning) by utilizing again the MGRR-PSO. Overall, we perform five different experiments: comparing our attack's performance with existing algorithms, testing in high-dimensional space using ImageNet dataset, examining our hyperparameters, and testing on real digital attack to Google Cloud Vision. Our attack proves to obtain a 100% success rate for both untargeted and targeted attack on MNIST and CIFAR-10 datasets and able to successfully fool Google Cloud Vision as a proof of the real digital attack with relatively low queries.
目前黑盒环境下的对抗性攻击方法主要有:(1)依赖可转移性方法,需要替代模型,效率低下;或者(2)使用大量的查询来制作他们的对抗性示例,因此很可能被目标系统(例如,人工智能服务提供商)检测到并响应,因为它的高流量。本文提出了一种基于随机再分配的多组粒子群优化(MGRR-PSO)的黑盒对抗攻击方法,该方法通过分布式的方式发起攻击,在保持低查询数的同时获得了很高的成功率。攻击从多个节点执行,在节点之间传播查询,因此降低了被目标系统识别的可能性,同时也提高了可伸缩性。此外,我们建议通过再次利用MGRR-PSO来有效地去除过度的扰动(即扰动修剪)。总体而言,我们执行了五个不同的实验:将我们的攻击性能与现有算法进行比较,使用ImageNet数据集在高维空间进行测试,检查我们的超参数,并在谷歌云视觉的真实数字攻击中进行测试。我们的攻击证明了对MNIST和CIFAR-10数据集的非目标攻击和目标攻击都获得了100%的成功率,并且能够成功地欺骗谷歌云视觉,以相对较低的查询量证明了真正的数字攻击。
{"title":"ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization","authors":"Naufal Suryanto, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, Howon Kim","doi":"10.1145/3411495.3421368","DOIUrl":"https://doi.org/10.1145/3411495.3421368","url":null,"abstract":"Current adversarial attack methods in black-box settings mainly: (1) rely on transferability approach which requires a substitute model, hence inefficient; or (2) employ a large number of queries for crafting their adversarial examples, hence very likely to be detected and responded by the target system (e.g., AI service provider) due to its high traffic volume. In this paper, we present a black-box adversarial attack based on Multi-Group Particle Swarm Optimization with Random Redistribution (MGRR-PSO) which yields a very high success rate while maintaining a low number of query by launching the attack in a distributed manner. Attacks are executed from multiple nodes, disseminating queries among the nodes, hence reducing the possibility of being recognized by the target system while also increasing scalability. Furthermore, we propose to efficiently remove excessive perturbation (i.e., perturbation pruning) by utilizing again the MGRR-PSO. Overall, we perform five different experiments: comparing our attack's performance with existing algorithms, testing in high-dimensional space using ImageNet dataset, examining our hyperparameters, and testing on real digital attack to Google Cloud Vision. Our attack proves to obtain a 100% success rate for both untargeted and targeted attack on MNIST and CIFAR-10 datasets and able to successfully fool Google Cloud Vision as a proof of the real digital attack with relatively low queries.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel GANRED:基于gan的基于缓存侧通道的dnn逆向工程
Yuntao Liu, Ankur Srivastava
In recent years, deep neural networks (DNN) have become an important type of intellectual property due to their high performance on various classification tasks. As a result, DNN stealing attacks have emerged. Many attack surfaces have been exploited, among which cache timing side-channel attacks are hugely problematic because they do not need physical probing or direct interaction with the victim to estimate the DNN model. However, existing cache-side-channel-based DNN reverse engineering attacks rely on analyzing the binary code of the DNN library that must be shared between the attacker and the victim in the main memory. In reality, the DNN library code is often inaccessible because 1) the code is proprietary, or 2) memory sharing has been disabled by the operating system. In our work, we propose GANRED, an attack approach based on the generative adversarial nets (GAN) framework which utilizes cache timing side-channel information to accurately recover the structure of DNNs without memory sharing or code access. The benefit of GANRED is four-fold. 1) There is no need for DNN library code analysis. 2) No shared main memory segment between the victim and the attacker is needed. 3) Our attack locates the exact structure of the victim model, unlike existing attacks which only narrow down the structure search space. 4) Our attack efficiently scales to deeper DNNs, exhibiting only linear growth in the number of layers in the victim DNN.
近年来,深度神经网络(deep neural network, DNN)因其在各种分类任务上的优异性能而成为一种重要的知识产权类型。因此,DNN窃取攻击出现了。许多攻击面已经被利用,其中缓存定时侧信道攻击是非常有问题的,因为它们不需要物理探测或与受害者直接交互来估计DNN模型。然而,现有的基于缓存侧通道的DNN反向工程攻击依赖于分析DNN库的二进制代码,这些代码必须在攻击者和受害者之间共享主内存。实际上,DNN库代码通常是不可访问的,因为1)代码是专有的,或者2)内存共享已被操作系统禁用。在我们的工作中,我们提出了GANRED,一种基于生成对抗网络(GAN)框架的攻击方法,它利用缓存定时侧信道信息来准确地恢复dnn的结构,而无需内存共享或代码访问。GANRED的好处有四倍。1)不需要DNN库代码分析。2)受害者和攻击者之间不需要共享主内存段。3)我们的攻击定位了受害者模型的确切结构,而不是像现有的攻击那样只缩小了结构搜索空间。4)我们的攻击有效地扩展到更深的DNN,受害者DNN的层数仅呈线性增长。
{"title":"GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel","authors":"Yuntao Liu, Ankur Srivastava","doi":"10.1145/3411495.3421356","DOIUrl":"https://doi.org/10.1145/3411495.3421356","url":null,"abstract":"In recent years, deep neural networks (DNN) have become an important type of intellectual property due to their high performance on various classification tasks. As a result, DNN stealing attacks have emerged. Many attack surfaces have been exploited, among which cache timing side-channel attacks are hugely problematic because they do not need physical probing or direct interaction with the victim to estimate the DNN model. However, existing cache-side-channel-based DNN reverse engineering attacks rely on analyzing the binary code of the DNN library that must be shared between the attacker and the victim in the main memory. In reality, the DNN library code is often inaccessible because 1) the code is proprietary, or 2) memory sharing has been disabled by the operating system. In our work, we propose GANRED, an attack approach based on the generative adversarial nets (GAN) framework which utilizes cache timing side-channel information to accurately recover the structure of DNNs without memory sharing or code access. The benefit of GANRED is four-fold. 1) There is no need for DNN library code analysis. 2) No shared main memory segment between the victim and the attacker is needed. 3) Our attack locates the exact structure of the victim model, unlike existing attacks which only narrow down the structure search space. 4) Our attack efficiently scales to deeper DNNs, exhibiting only linear growth in the number of layers in the victim DNN.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121672300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Co-residency Attacks on Containers are Real 对容器的共同驻留攻击是真实存在的
S. Shringarputale, P. Mcdaniel, Kevin R. B. Butler, T. L. Porta
Public clouds are inherently multi-tenant: applications deployed by different parties (including malicious ones) may reside on the same physical machines and share various hardware resources. With the introduction of newer hypervisors, containerization frameworks like Docker, and managed/orchestrated clusters using systems like Kubernetes, cloud providers downplay the feasibility of co-tenant attacks by marketing a belief that applications do not operate on shared hardware. In this paper, we challenge the conventional wisdom that attackers cannot confirm co-residency with a victim application from inside state-of-the-art containers running on virtual machines. We analyze the degree of vulnerability present in containers running on various systems including within a broad range of commercially utilized orchestrators. Our results show that on commercial cloud environments including AWS and Azure, we can obtain over 90% success rates for co-residency detection using real-life workloads. Our investigation confirms that co-residency attacks are a significant concern on containers running on modern orchestration systems.
公共云本质上是多租户的:由不同方(包括恶意方)部署的应用程序可能驻留在相同的物理机器上,并共享各种硬件资源。随着新的管理程序、容器化框架(如Docker)和使用Kubernetes等系统的托管/编排集群的引入,云提供商通过宣传应用程序不会在共享硬件上运行的信念,淡化了共同租户攻击的可行性。在本文中,我们挑战了传统观点,即攻击者无法从运行在虚拟机上的最先进的容器中确认受害者应用程序的共同驻留。我们分析了在各种系统上运行的容器中存在的漏洞程度,包括在广泛的商业使用的编排器中。我们的结果表明,在包括AWS和Azure在内的商业云环境中,我们可以使用实际工作负载获得超过90%的共同驻留检测成功率。我们的调查证实,共同驻留攻击是对运行在现代编排系统上的容器的重大关注。
{"title":"Co-residency Attacks on Containers are Real","authors":"S. Shringarputale, P. Mcdaniel, Kevin R. B. Butler, T. L. Porta","doi":"10.1145/3411495.3421357","DOIUrl":"https://doi.org/10.1145/3411495.3421357","url":null,"abstract":"Public clouds are inherently multi-tenant: applications deployed by different parties (including malicious ones) may reside on the same physical machines and share various hardware resources. With the introduction of newer hypervisors, containerization frameworks like Docker, and managed/orchestrated clusters using systems like Kubernetes, cloud providers downplay the feasibility of co-tenant attacks by marketing a belief that applications do not operate on shared hardware. In this paper, we challenge the conventional wisdom that attackers cannot confirm co-residency with a victim application from inside state-of-the-art containers running on virtual machines. We analyze the degree of vulnerability present in containers running on various systems including within a broad range of commercially utilized orchestrators. Our results show that on commercial cloud environments including AWS and Azure, we can obtain over 90% success rates for co-residency detection using real-life workloads. Our investigation confirms that co-residency attacks are a significant concern on containers running on modern orchestration systems.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"21 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Homomorphic String Search with Constant Multiplicative Depth 常乘深度的同态字符串搜索
Charlotte Bonte, Ilia Iliashenko
String search finds occurrences of patterns in a larger text. This general problem occurs in various application scenarios, f.e. Internet search, text processing, DNA analysis, etc. Using somewhat homomorphic encryption with SIMD packing, we provide an efficient string search protocol that allows to perform a private search in outsourced data with minimal preprocessing. At the base of the string search protocol lies a randomized homomorphic equality circuit whose depth is independent of the pattern length. This circuit not only improves the performance but also increases the practicality of our protocol as it requires the same set of encryption parameters for a wide range of patterns of different lengths. This constant depth algorithm is about 12 times faster than the prior work. It takes about 5 minutes on an average laptop to find the positions of a string with at most 50 UTF-32 characters in a text with 1000 characters. In addition, we provide a method that compresses the search results, thus reducing the communication cost of the protocol. For example, the communication complexity for searching a string with 50 characters in a text of length 10000 is about 347 KB and 13.9 MB for a text with 1000000 characters.
字符串搜索查找较大文本中出现的模式。这一普遍问题出现在各种应用场景中,如互联网搜索、文本处理、DNA分析等。通过使用SIMD封装的某种同态加密,我们提供了一种高效的字符串搜索协议,该协议允许在外包数据中执行私有搜索,只需最少的预处理。字符串搜索协议的基础是一个随机同态等式电路,其深度与模式长度无关。该电路不仅提高了性能,而且增加了协议的实用性,因为它需要对不同长度的大范围模式使用相同的加密参数集。这种恒深度算法比之前的算法快12倍。在一台普通的笔记本电脑上,在1000个字符的文本中找到最多50个UTF-32字符的字符串的位置大约需要5分钟。此外,我们还提供了一种压缩搜索结果的方法,从而降低了协议的通信成本。例如,在长度为10000的文本中搜索50个字符的字符串,通信复杂度约为347 KB,在长度为1000000的文本中搜索50个字符的字符串,通信复杂度约为13.9 MB。
{"title":"Homomorphic String Search with Constant Multiplicative Depth","authors":"Charlotte Bonte, Ilia Iliashenko","doi":"10.1145/3411495.3421361","DOIUrl":"https://doi.org/10.1145/3411495.3421361","url":null,"abstract":"String search finds occurrences of patterns in a larger text. This general problem occurs in various application scenarios, f.e. Internet search, text processing, DNA analysis, etc. Using somewhat homomorphic encryption with SIMD packing, we provide an efficient string search protocol that allows to perform a private search in outsourced data with minimal preprocessing. At the base of the string search protocol lies a randomized homomorphic equality circuit whose depth is independent of the pattern length. This circuit not only improves the performance but also increases the practicality of our protocol as it requires the same set of encryption parameters for a wide range of patterns of different lengths. This constant depth algorithm is about 12 times faster than the prior work. It takes about 5 minutes on an average laptop to find the positions of a string with at most 50 UTF-32 characters in a text with 1000 characters. In addition, we provide a method that compresses the search results, thus reducing the communication cost of the protocol. For example, the communication complexity for searching a string with 50 characters in a text of length 10000 is about 347 KB and 13.9 MB for a text with 1000000 characters.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation 使用加密输入混淆保护分类器免受白盒和黑盒攻击
G. D. Crescenzo, B. Coan, L. Bahler, K. Rohloff, Y. Polyakov, D. Cousins
Machine Learning as a Service (aka MLaaS) and Smart Grid as a Service (aka SGaaS) are expected to grow at a significant rate. Just like most cloud services, MLaaS and SGaaS can be subject to a number of attacks. In this paper, we focus on white-box attacks (informally defined as attacks that try to access some or all internal data or computation used by the service program), and black-box attacks (informally defined as attacks only use input-output access to the attacked service program). We consider a participant model including a setup manager, a cloud server, and one or many data producers. The cloud server runs a machine learning classifier trained on a dataset provided by the setup manager and classifies new input data provided by the data producers. Applications include analytics over data received by distributed sensors, such as, for instance, in a typical SGaaS environment. We propose a new security notion of encrypted-input classifier obfuscation as a set of algorithms that, in the above participant and algorithm model, aims to protect the cloud server's classifier program from both white-box and black-box attacks. This notion builds on cryptographic obfuscation of programs [1], cryptographic obfuscation of classifiers [2], and encrypted-input obfuscation of programs [3]. We model classifiers as a pair of programs: a training program that on input a dataset and secret data values, returns classification parameters, and a classification program that on input classification parameters, and a new input data value, returns a classification result. A typical execution goes as follows. During obfuscation generation, the setup manager randomly chooses a key k and sends a k-based obfuscation of the classifier to the cloud server, and sends to the data producers either k or information to generate k-based input data encryptions. During obfuscation evaluation, the data producers send k-based input data encryptions to the cloud server, which evaluates the obfuscated classifier over the encrypted input data. Here, the goal is to protect the confidentiality of the dataset, the secret data, and the classification parameters. One can obtain a general-purpose encrypted-input classifier obfuscator in two steps: 1) transforming a suitable composition of training and classification algorithms into a single boolean circuit; 2) applying to this circuit the result from saying that [3] a modification of Yao's protocol[4] is an encrypted-input obfuscation of gate values in any polynomial-size boolean circuit. This result is of only theoretical relevance. Towards finding a practically efficient obfuscation of specific classifiers, we note that techniques from [3] can be used to produce an obfuscator for decision trees. Moreover, in recent results we have produced an obfuscator for image matching (i.e., matching an input image to a secret image).
机器学习即服务(MLaaS)和智能电网即服务(SGaaS)预计将以显著的速度增长。就像大多数云服务一样,MLaaS和SGaaS可能会受到许多攻击。在本文中,我们关注白盒攻击(非正式定义为试图访问服务程序使用的部分或全部内部数据或计算的攻击)和黑盒攻击(非正式定义为仅使用对被攻击服务程序的输入-输出访问的攻击)。我们考虑一个参与者模型,包括一个设置管理器、一个云服务器和一个或多个数据生产者。云服务器运行在设置管理器提供的数据集上训练的机器学习分类器,并对数据生产者提供的新输入数据进行分类。应用程序包括对分布式传感器接收的数据进行分析,例如,在典型的SGaaS环境中。我们提出了一种新的加密输入分类器混淆的安全概念,作为一组算法,在上述参与者和算法模型中,旨在保护云服务器的分类器程序免受白盒和黑盒攻击。这个概念建立在程序的加密混淆[1]、分类器的加密混淆[2]和程序的加密输入混淆[3]的基础上。我们将分类器建模为一对程序:一个训练程序输入数据集和秘密数据值,返回分类参数;一个分类程序输入分类参数和新的输入数据值,返回分类结果。典型的执行如下。在混淆生成过程中,设置管理器随机选择一个密钥k并向云服务器发送基于分类器的混淆,然后向数据生产者发送k或信息以生成基于输入的数据加密。在混淆评估期间,数据生产者将基于输入数据的加密发送到云服务器,云服务器在加密的输入数据上评估混淆的分类器。这里的目标是保护数据集、秘密数据和分类参数的机密性。我们可以通过两个步骤获得一个通用的加密输入分类器混淆器:1)将训练和分类算法的合适组合转换成单个布尔电路;2)将[3]对姚协议[4]的修改应用于该电路的结果是,在任何多项式大小的布尔电路中,门值的加密输入混淆。这一结果仅具有理论意义。为了找到一个实际有效的特定分类器的混淆,我们注意到[3]中的技术可以用来为决策树产生一个混淆器。此外,在最近的结果中,我们已经产生了用于图像匹配的混淆器(即将输入图像与秘密图像匹配)。
{"title":"Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation","authors":"G. D. Crescenzo, B. Coan, L. Bahler, K. Rohloff, Y. Polyakov, D. Cousins","doi":"10.1145/3411495.3421369","DOIUrl":"https://doi.org/10.1145/3411495.3421369","url":null,"abstract":"Machine Learning as a Service (aka MLaaS) and Smart Grid as a Service (aka SGaaS) are expected to grow at a significant rate. Just like most cloud services, MLaaS and SGaaS can be subject to a number of attacks. In this paper, we focus on white-box attacks (informally defined as attacks that try to access some or all internal data or computation used by the service program), and black-box attacks (informally defined as attacks only use input-output access to the attacked service program). We consider a participant model including a setup manager, a cloud server, and one or many data producers. The cloud server runs a machine learning classifier trained on a dataset provided by the setup manager and classifies new input data provided by the data producers. Applications include analytics over data received by distributed sensors, such as, for instance, in a typical SGaaS environment. We propose a new security notion of encrypted-input classifier obfuscation as a set of algorithms that, in the above participant and algorithm model, aims to protect the cloud server's classifier program from both white-box and black-box attacks. This notion builds on cryptographic obfuscation of programs [1], cryptographic obfuscation of classifiers [2], and encrypted-input obfuscation of programs [3]. We model classifiers as a pair of programs: a training program that on input a dataset and secret data values, returns classification parameters, and a classification program that on input classification parameters, and a new input data value, returns a classification result. A typical execution goes as follows. During obfuscation generation, the setup manager randomly chooses a key k and sends a k-based obfuscation of the classifier to the cloud server, and sends to the data producers either k or information to generate k-based input data encryptions. During obfuscation evaluation, the data producers send k-based input data encryptions to the cloud server, which evaluates the obfuscated classifier over the encrypted input data. Here, the goal is to protect the confidentiality of the dataset, the secret data, and the classification parameters. One can obtain a general-purpose encrypted-input classifier obfuscator in two steps: 1) transforming a suitable composition of training and classification algorithms into a single boolean circuit; 2) applying to this circuit the result from saying that [3] a modification of Yao's protocol[4] is an encrypted-input obfuscation of gate values in any polynomial-size boolean circuit. This result is of only theoretical relevance. Towards finding a practically efficient obfuscation of specific classifiers, we note that techniques from [3] can be used to produce an obfuscator for decision trees. Moreover, in recent results we have produced an obfuscator for image matching (i.e., matching an input image to a secret image).","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116079749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
bpfbox: Simple Precise Process Confinement with eBPF bpfbox:简单精确的过程约束与eBPF
W. Findlay, Anil Somayaji, David Barrera
Process confinement is a key requirement for workloads in the cloud and in other contexts. Existing process confinement mechanisms on Linux, however, are complex and inflexible because they are implemented using a combination of primitive abstractions (e.g., namespaces, cgroups) and complex security mechanisms (e.g., SELinux, AppArmor) that were designed for purposes beyond basic process confinement. We argue that simple, efficient, and flexible confinement can be better implemented today using eBPF, an emerging technology for safely extending the Linux kernel. We present a proof-of-concept confinement application, bpfbox, that uses less than 2000 lines of kernelspace code and allows for confinement at the userspace function, system call, LSM hook, and kernelspace function boundaries---something that no existing process confinement mechanism can do. Further, it does so using a policy language simple enough to use for ad-hoc confinement purposes. This paper presents the motivation, design, implementation, and benchmarks of bpfbox, including a sample web server confinement policy.
进程限制是云和其他上下文中工作负载的关键需求。然而,Linux上现有的进程限制机制既复杂又不灵活,因为它们是使用基本抽象(例如名称空间、cgroups)和复杂安全机制(例如SELinux、AppArmor)的组合来实现的,而这些机制的设计目的超出了基本的进程限制。我们认为,使用eBPF(一种用于安全扩展Linux内核的新兴技术)可以更好地实现简单、高效和灵活的限制。我们提出了一个概念验证约束应用程序bpfbox,它使用不到2000行内核空间代码,并允许在用户空间函数、系统调用、LSM钩子和内核空间函数边界进行约束——这是现有进程约束机制无法做到的。此外,它使用了一种足够简单的策略语言,可以用于特殊限制目的。本文介绍了bpfbox的动机、设计、实现和基准测试,包括一个示例web服务器限制策略。
{"title":"bpfbox: Simple Precise Process Confinement with eBPF","authors":"W. Findlay, Anil Somayaji, David Barrera","doi":"10.1145/3411495.3421358","DOIUrl":"https://doi.org/10.1145/3411495.3421358","url":null,"abstract":"Process confinement is a key requirement for workloads in the cloud and in other contexts. Existing process confinement mechanisms on Linux, however, are complex and inflexible because they are implemented using a combination of primitive abstractions (e.g., namespaces, cgroups) and complex security mechanisms (e.g., SELinux, AppArmor) that were designed for purposes beyond basic process confinement. We argue that simple, efficient, and flexible confinement can be better implemented today using eBPF, an emerging technology for safely extending the Linux kernel. We present a proof-of-concept confinement application, bpfbox, that uses less than 2000 lines of kernelspace code and allows for confinement at the userspace function, system call, LSM hook, and kernelspace function boundaries---something that no existing process confinement mechanism can do. Further, it does so using a policy language simple enough to use for ad-hoc confinement purposes. This paper presents the motivation, design, implementation, and benchmarks of bpfbox, including a sample web server confinement policy.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1