首页 > 最新文献

Proceedings of the 6th International Workshop on Trustworthy Embedded Devices最新文献

英文 中文
Looks Good To Me: Authentication for Augmented Reality 我看来不错:增强现实的认证
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995295
Ethan Gaebel, Ning Zhang, W. Lou, Tom Hou
Augmented reality is poised to become a dominant computing paradigm over the next decade. With promises of three-dimensional graphics and interactive interfaces, augmented reality experiences will rival the very best science fiction novels. This breakthrough also brings in unique challenges on how users can authenticate one another to share rich content between augmented reality headsets. Traditional authentication protocols fall short when there is no common central entity or when access to the central authentication server is not available or desirable. Looks Good To Me (LGTM) is an authentication protocol that leverages the unique hardware and context provided with augmented reality headsets to bring innate human trust mechanisms into the digital world to solve authentication in a usable and secure way. LGTM works over point to point wireless communication so users can authenticate one another in a variety of circumstances and is designed with usability at its core, requiring users to perform only two actions: one to initiate and one to confirm. Users intuitively authenticate one another, using seemingly only each other's faces, but under the hood LGTM uses a combination of facial recognition and wireless localization to bootstrap trust from a wireless signal, to a location, to a face, for secure and usable authentication.
未来十年,增强现实将成为一种占主导地位的计算范式。有了三维图形和交互界面的承诺,增强现实体验将与最好的科幻小说相媲美。这一突破也带来了独特的挑战,即用户如何相互验证以在增强现实耳机之间共享丰富的内容。传统的身份验证协议在没有公共中心实体或无法访问或不需要访问中央身份验证服务器时就无法发挥作用。LGTM (Looks Good To Me)是一种身份验证协议,它利用增强现实耳机提供的独特硬件和环境,将人类固有的信任机制带入数字世界,以可用且安全的方式解决身份验证问题。LGTM通过点对点无线通信工作,因此用户可以在各种情况下对彼此进行身份验证,其设计以可用性为核心,只需要用户执行两个操作:一个启动,一个确认。用户直观地相互认证,似乎只使用对方的脸,但在引子下,LGTM使用面部识别和无线定位的组合来引导信任从无线信号到位置,再到人脸,以实现安全和可用的认证。
{"title":"Looks Good To Me: Authentication for Augmented Reality","authors":"Ethan Gaebel, Ning Zhang, W. Lou, Tom Hou","doi":"10.1145/2995289.2995295","DOIUrl":"https://doi.org/10.1145/2995289.2995295","url":null,"abstract":"Augmented reality is poised to become a dominant computing paradigm over the next decade. With promises of three-dimensional graphics and interactive interfaces, augmented reality experiences will rival the very best science fiction novels. This breakthrough also brings in unique challenges on how users can authenticate one another to share rich content between augmented reality headsets. Traditional authentication protocols fall short when there is no common central entity or when access to the central authentication server is not available or desirable. Looks Good To Me (LGTM) is an authentication protocol that leverages the unique hardware and context provided with augmented reality headsets to bring innate human trust mechanisms into the digital world to solve authentication in a usable and secure way. LGTM works over point to point wireless communication so users can authenticate one another in a variety of circumstances and is designed with usability at its core, requiring users to perform only two actions: one to initiate and one to confirm. Users intuitively authenticate one another, using seemingly only each other's faces, but under the hood LGTM uses a combination of facial recognition and wireless localization to bootstrap trust from a wireless signal, to a location, to a face, for secure and usable authentication.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Side-Channel Attacks on Fingerprint Matching Algorithms 指纹匹配算法的侧信道攻击
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995294
Markus Dürmuth, David F. Oswald, Niklas Pastewka
Biometric authentication schemes are frequently used to establish the identity of a user. Often, a trusted hardware device is used to decide if a provided biometric feature is sufficiently close to the features stored by the legitimate user during enrollment. In this paper, we address the question whether the stored features can be extracted with side-channel attacks. We consider several models for types of leakage that are relevant specifically for fingerprint verification, and show results for attacks against the Bozorth3 and a custom matching algorithm. This work shows an interesting path for future research on the susceptibility of biometric algorithms towards side-channel attacks.
生物识别认证方案经常用于建立用户的身份。通常,使用受信任的硬件设备来确定所提供的生物特征是否与合法用户在注册期间存储的特征足够接近。在本文中,我们解决了存储的特征是否可以被侧信道攻击提取的问题。我们考虑了几种与指纹验证专门相关的泄漏类型模型,并显示了针对Bozorth3和自定义匹配算法的攻击结果。这项工作为未来研究生物识别算法对侧信道攻击的易感性提供了一条有趣的途径。
{"title":"Side-Channel Attacks on Fingerprint Matching Algorithms","authors":"Markus Dürmuth, David F. Oswald, Niklas Pastewka","doi":"10.1145/2995289.2995294","DOIUrl":"https://doi.org/10.1145/2995289.2995294","url":null,"abstract":"Biometric authentication schemes are frequently used to establish the identity of a user. Often, a trusted hardware device is used to decide if a provided biometric feature is sufficiently close to the features stored by the legitimate user during enrollment. In this paper, we address the question whether the stored features can be extracted with side-channel attacks. We consider several models for types of leakage that are relevant specifically for fingerprint verification, and show results for attacks against the Bozorth3 and a custom matching algorithm. This work shows an interesting path for future research on the susceptibility of biometric algorithms towards side-channel attacks.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114038514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the Energy Cost of Channel Based Key Agreement 基于信道的密钥协议能源成本研究
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995291
Christopher Huth, René Guillaume, P. Duplys, K. Velmurugan, T. Güneysu
Besides security, energy consumption is a major concern for devices in the Internet of Things (IoT). We compare the energy consumption of two key agreement schemes -- Channel-Based Key Agreement (CBKA) and Elliptic Curve Diffie-Hellman (ECDH) -- in the IoT setting, using Wi-Fi as wireless communication interface. While ECDH is a well-studied protocol, CBKA has received attention only in recent years. Several publications proposed CBKA as a low-energy alternative to ECDH, but they did not address the energy cost of communication. For a fair comparison, we implemented the schemes on a 32-bit ARM Cortex M3-based IoT platform and measured the respective energy consumption for computation and communication. Our results show that the limiting factor for CBKA over Wi-Fi is the energy cost of communication, in particular the cost of acquiring the Received Signal Strength Indicator (RSSI) values. Even in an optimal scenario, CBKA must not measure more than ca. 300 RSSI values to be more energy efficient than ECDH. This is at most 1/5 of RSSI values required by CBKA implementations reported in the literature. As an optimization, we present a refined CBKA protocol which can save up to 25% of the energy compared to existing protocols by exploiting inherent data exchanges for entropy extraction.
除了安全之外,能源消耗是物联网(IoT)设备的主要关注点。我们比较了两种密钥协议方案——基于信道的密钥协议(CBKA)和椭圆曲线Diffie-Hellman (ECDH)——在物联网环境中使用Wi-Fi作为无线通信接口的能耗。虽然ECDH是一种经过充分研究的方案,但CBKA只是在最近几年才受到关注。一些出版物提出CBKA作为ECDH的低能耗替代品,但它们没有解决通信的能源成本问题。为了公平比较,我们在基于32位ARM Cortex m3的物联网平台上实现了这些方案,并测量了各自的计算和通信能耗。我们的研究结果表明,CBKA在Wi-Fi上的限制因素是通信的能量成本,特别是获取接收信号强度指标(RSSI)值的成本。即使在最理想的情况下,CBKA测量的RSSI值也不能超过约300,这样才能比ECDH更节能。这最多是文献中报道的CBKA实现所需RSSI值的1/5。作为优化,我们提出了一种改进的CBKA协议,通过利用固有的数据交换进行熵提取,与现有协议相比,该协议可以节省高达25%的能量。
{"title":"On the Energy Cost of Channel Based Key Agreement","authors":"Christopher Huth, René Guillaume, P. Duplys, K. Velmurugan, T. Güneysu","doi":"10.1145/2995289.2995291","DOIUrl":"https://doi.org/10.1145/2995289.2995291","url":null,"abstract":"Besides security, energy consumption is a major concern for devices in the Internet of Things (IoT). We compare the energy consumption of two key agreement schemes -- Channel-Based Key Agreement (CBKA) and Elliptic Curve Diffie-Hellman (ECDH) -- in the IoT setting, using Wi-Fi as wireless communication interface. While ECDH is a well-studied protocol, CBKA has received attention only in recent years. Several publications proposed CBKA as a low-energy alternative to ECDH, but they did not address the energy cost of communication. For a fair comparison, we implemented the schemes on a 32-bit ARM Cortex M3-based IoT platform and measured the respective energy consumption for computation and communication. Our results show that the limiting factor for CBKA over Wi-Fi is the energy cost of communication, in particular the cost of acquiring the Received Signal Strength Indicator (RSSI) values. Even in an optimal scenario, CBKA must not measure more than ca. 300 RSSI values to be more energy efficient than ECDH. This is at most 1/5 of RSSI values required by CBKA implementations reported in the literature. As an optimization, we present a refined CBKA protocol which can save up to 25% of the energy compared to existing protocols by exploiting inherent data exchanges for entropy extraction.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online Reliability Testing for PUF Key Derivation PUF密钥派生的在线可靠性测试
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995293
Matthias Hiller, Aysun Gurur Önalan, G. Sigl, M. Bossert
Physical Unclonable Functions (PUFs) measure manufacturing variations inside integrated circuits to derive internal secrets during run-time and avoid to store secrets permanently in non-volatile memory. PUF responses are noisy such that they require error correction to generate reliable cryptographic keys. To date, when needed one single key is reproduced in the field and always used, regardless of its reliability. In this work, we compute online reliability information for a reproduced key and perform multiple PUF readout and error correction steps in case of an unreliable result. This permits to choose the most reliable key among multiple derived key candidates with different corrected error patterns. We achieve the same average key error probability from less PUF response bits with this approach. Our proof of concept design for a popular reference scenario uses Differential Sequence Coding (DSC) and a Viterbi decoder with reliability output information. It requires 39% less PUF response bits and 16% less helper data bits than the regular approach without the option for multiple readouts.
物理不可克隆函数(Physical unclable Functions, puf)测量集成电路内部的制造变化,从而在运行过程中获得内部秘密,避免将秘密永久存储在非易失性存储器中。PUF响应是有噪声的,因此它们需要纠错才能生成可靠的加密密钥。迄今为止,当需要时,在字段中复制一个密钥并始终使用,而不管其可靠性如何。在这项工作中,我们计算了一个复制密钥的在线可靠性信息,并在结果不可靠的情况下执行多个PUF读出和纠错步骤。这允许在具有不同修正错误模式的多个派生的候选键中选择最可靠的键。通过这种方法,我们可以从更少的PUF响应位获得相同的平均密钥错误概率。我们对一个流行的参考场景的概念验证设计使用差分序列编码(DSC)和具有可靠输出信息的维特比解码器。与没有多次读出选项的常规方法相比,它需要减少39%的PUF响应位和16%的辅助数据位。
{"title":"Online Reliability Testing for PUF Key Derivation","authors":"Matthias Hiller, Aysun Gurur Önalan, G. Sigl, M. Bossert","doi":"10.1145/2995289.2995293","DOIUrl":"https://doi.org/10.1145/2995289.2995293","url":null,"abstract":"Physical Unclonable Functions (PUFs) measure manufacturing variations inside integrated circuits to derive internal secrets during run-time and avoid to store secrets permanently in non-volatile memory. PUF responses are noisy such that they require error correction to generate reliable cryptographic keys. To date, when needed one single key is reproduced in the field and always used, regardless of its reliability. In this work, we compute online reliability information for a reproduced key and perform multiple PUF readout and error correction steps in case of an unreliable result. This permits to choose the most reliable key among multiple derived key candidates with different corrected error patterns. We achieve the same average key error probability from less PUF response bits with this approach. Our proof of concept design for a popular reference scenario uses Differential Sequence Coding (DSC) and a Viterbi decoder with reliability output information. It requires 39% less PUF response bits and 16% less helper data bits than the regular approach without the option for multiple readouts.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations 闭路电视和视频监控系统的安全:威胁、漏洞、攻击和缓解
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995290
Andrei Costin
Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware and non-trivial firmware. However, most research to date focused mainly on the privacy aspects of such systems, and did not fully address their issues related to cyber-security in general, and visual layer (i.e., imagery semantics) attacks in particular. In this paper, we conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and the privacy risks associated with the development, deployment and use of these systems. We study existing and novel threats, along with their existing or possible countermeasures, and summarize this knowledge into a comprehensive table that can be used in a practical way as a security checklist when assessing cyber-security level of existing or new CCTV designs and deployments. We also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications and the operation of video surveillance systems. We hope the findings in this paper will provide a valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.
视频监控、闭路电视和ip摄像机系统几乎无处不在,对许多组织、企业和用户来说是不可或缺的。他们的主要目的是提供人身安全,增加安全,防止犯罪。它们也变得越来越复杂,包括许多通信手段、嵌入式硬件和重要的固件。然而,迄今为止,大多数研究主要集中在此类系统的隐私方面,并没有完全解决与一般网络安全相关的问题,特别是视觉层(即图像语义)攻击。在本文中,我们根据公开数据,系统地回顾了视频监控、闭路电视和ip摄像机系统中现有的和新的威胁。然后,可以使用这些见解来更好地理解和识别与这些系统的开发、部署和使用相关的安全性和隐私风险。我们研究了现有的和新的威胁,以及它们现有的或可能的对策,并将这些知识总结成一个综合表,在评估现有或新的CCTV设计和部署的网络安全级别时,可以以实际的方式作为安全检查表使用。我们还提供了一套建议和缓解措施,可以帮助提高硬件、固件、网络通信和视频监控系统操作提供的安全和隐私级别。我们希望本文的研究结果将为这些系统所面临的威胁环境提供有价值的知识,并促进进一步的研究,扩大该领域的范围,超越当前的边界。
{"title":"Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations","authors":"Andrei Costin","doi":"10.1145/2995289.2995290","DOIUrl":"https://doi.org/10.1145/2995289.2995290","url":null,"abstract":"Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware and non-trivial firmware. However, most research to date focused mainly on the privacy aspects of such systems, and did not fully address their issues related to cyber-security in general, and visual layer (i.e., imagery semantics) attacks in particular. In this paper, we conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and the privacy risks associated with the development, deployment and use of these systems. We study existing and novel threats, along with their existing or possible countermeasures, and summarize this knowledge into a comprehensive table that can be used in a practical way as a security checklist when assessing cyber-security level of existing or new CCTV designs and deployments. We also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications and the operation of video surveillance systems. We hope the findings in this paper will provide a valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices 第六届可信赖嵌入式设备国际研讨会论文集
Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Xinxin Fan, T. Güneysu
The 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) was held October 28th, 2016 in Hofburg Palace, Vienna, Austria, and has been co-located with the 23rd ACM Conference on Computer and Communications Security (CCS 2016). TrustED 2016 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, ACM CCS 2014, and ACM CCS 2015 (see http://www.trusted-workshop.de for details). The fast and steady developments in sensor technologies, micro-electromechanical systems (MEMS), Internet infrastructure and communication standards have given rise to a new disruptive technology: the Internet of Things (IoT). As a key enabler for building a connected world, IoT allows people and objects in the physical world to interact with each other and create various smart environments in an autonomous manner. It has been estimated that the IoT ecosystem will bring over 28 billion connected autonomous things by 2020. As IoT continues to gain traction and more connected devices come to market, security and privacy will become major concerns. The resource-constrained smart embedded devices in IoT systems as well as the inherent complexity of IoT system architectures have posed new challenges for designing and implementing security and privacy mechanisms for protecting emerging IoT applications. Given the above, major themes of TrustED 2016 include security and privacy aspects of the Internet of Things and in particular of embedded devices as parts of cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field. This year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. Papers co-authored by one PC chair were exclusively handled by the other. The program committee accepted six papers that cover a variety of topics, including Physical Unclonable Functions, side-channel attacks, physical layer security, hardware security, and system security. In addition to the technical program, the workshop featured three internationally highly renowned speakers: Aurelien Francillon, Marcel Medwed, and David Oswald.
第六届可信赖嵌入式设备国际研讨会(TrustED 2016)于2016年10月28日在奥地利维也纳霍夫堡宫举行,并与第23届ACM计算机与通信安全会议(CCS 2016)同期举行。可信2016是该系列之前研讨会的延续,这些研讨会与ESORICS 2011、IEEE安全与隐私2012、ACM CCS 2013、ACM CCS 2014和ACM CCS 2015(详见http://www.trusted-workshop.de)一起举行。传感器技术、微机电系统(MEMS)、互联网基础设施和通信标准的快速稳定发展催生了一种新的颠覆性技术:物联网(IoT)。作为构建互联世界的关键推动者,物联网允许物理世界中的人和物体相互交互,并以自主的方式创建各种智能环境。据估计,到2020年,物联网生态系统将带来超过280亿个连接的自主事物。随着物联网继续获得牵引力和更多连接设备进入市场,安全和隐私将成为主要问题。物联网系统中资源受限的智能嵌入式设备以及物联网系统架构固有的复杂性,为设计和实现保护新兴物联网应用的安全和隐私机制提出了新的挑战。鉴于上述情况,可信2016的主要主题包括物联网的安全和隐私方面,特别是嵌入式设备作为网络物理系统及其环境的一部分。它旨在汇集来自学术界和研究机构、工业界和政府在网络物理系统安全和隐私领域的专家,讨论和调查该领域的问题、挑战和最新的科学和技术发展。今年共提交了12篇论文。每篇论文至少会收到三篇评议,评议之后会有一个在线讨论来决定项目。由一位PC主席共同撰写的论文由另一位专门处理。计划委员会接受了六篇论文,涵盖了各种主题,包括物理不可克隆功能,侧信道攻击,物理层安全,硬件安全和系统安全。除了技术课程外,研讨会还邀请了三位国际知名的演讲者:Aurelien Francillon, Marcel Medwed和David Oswald。
{"title":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","authors":"Mathias Payer, S. Mangard, E. Weippl, S. Katzenbeisser, Xinxin Fan, T. Güneysu","doi":"10.1145/2995289","DOIUrl":"https://doi.org/10.1145/2995289","url":null,"abstract":"The 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) was held October 28th, 2016 in Hofburg Palace, Vienna, Austria, and has been co-located with the 23rd ACM Conference on Computer and Communications Security (CCS 2016). TrustED 2016 is a continuation of previous workshops in this series, which were held in conjunction with ESORICS 2011, IEEE Security & Privacy 2012, ACM CCS 2013, ACM CCS 2014, and ACM CCS 2015 (see http://www.trusted-workshop.de for details). \u0000 \u0000The fast and steady developments in sensor technologies, micro-electromechanical systems (MEMS), Internet infrastructure and communication standards have given rise to a new disruptive technology: the Internet of Things (IoT). As a key enabler for building a connected world, IoT allows people and objects in the physical world to interact with each other and create various smart environments in an autonomous manner. It has been estimated that the IoT ecosystem will bring over 28 billion connected autonomous things by 2020. As IoT continues to gain traction and more connected devices come to market, security and privacy will become major concerns. The resource-constrained smart embedded devices in IoT systems as well as the inherent complexity of IoT system architectures have posed new challenges for designing and implementing security and privacy mechanisms for protecting emerging IoT applications. Given the above, major themes of TrustED 2016 include security and privacy aspects of the Internet of Things and in particular of embedded devices as parts of cyber physical systems and their environments. It aims to bring together experts from academia and research institutes, industry, and government in the field of security and privacy in cyber physical systems to discuss and investigate the problems, challenges, and recent scientific and technological developments in this field. \u0000 \u0000This year, twelve papers have been submitted. Each paper received at least three reviews, which were followed by an online discussion to decide on the program. Papers co-authored by one PC chair were exclusively handled by the other. The program committee accepted six papers that cover a variety of topics, including Physical Unclonable Functions, side-channel attacks, physical layer security, hardware security, and system security. In addition to the technical program, the workshop featured three internationally highly renowned speakers: Aurelien Francillon, Marcel Medwed, and David Oswald.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs 基于锁存器的物理随机数发生器在40nm asic上实现的评估
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995292
N. Torii, Dai Yamamoto, Tsutomu Matsumoto
In the age of the IoT (Internet of Things), a random number generator plays an important role of generating encryption keys and authenticating a piece of an embedded equipment. The random numbers are required to be uniformly distributed statistically and unpredictable. To satisfy the requirements, a physical true random number generator (TR-NG) is used. In this paper, we implement a TRNG using an SR latch on 40 nm CMOS ASIC. This TRNG generates the random number by exclusive ORing (XORing) the outputs of 256 SR latches. We evaluate the random number generated using statistical tests in accordance with BSI AIS 20/31 and using an IID (Independent and Identically Distributed) test, and the entropy estimation in accordance with NIST SP800-90B changing the supply voltage and environmental temperature within its rated values. As a result, the TRNG passed all the tests except in a few cases. From this experiment, we found that the TRNG has a robustness against environmental change. The power consumption is 18.8 micro Watt at 2.5 MHz. This TRNG is suitable for embedded systems to improve security in IoT systems.
在物联网(IoT)时代,随机数生成器在生成加密密钥和对嵌入式设备进行认证方面发挥着重要作用。要求随机数在统计上均匀分布且不可预测。为了满足这些要求,我们使用了物理真随机数生成器(TR-NG)。在本文中,我们在40 nm CMOS ASIC上使用SR锁存器实现了TRNG。这个TRNG通过对256个SR锁存器的输出进行排他的ORing (XORing)来生成随机数。我们根据BSI AIS 20/31和IID(独立和同分布)测试对统计测试产生的随机数进行评估,并根据NIST SP800-90B在其额定值内改变电源电压和环境温度进行熵估计。结果,除了少数情况外,TRNG通过了所有测试。从这个实验中,我们发现TRNG对环境变化具有鲁棒性。2.5 MHz时的功耗为18.8微瓦。该TRNG适用于嵌入式系统,以提高物联网系统的安全性。
{"title":"Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs","authors":"N. Torii, Dai Yamamoto, Tsutomu Matsumoto","doi":"10.1145/2995289.2995292","DOIUrl":"https://doi.org/10.1145/2995289.2995292","url":null,"abstract":"In the age of the IoT (Internet of Things), a random number generator plays an important role of generating encryption keys and authenticating a piece of an embedded equipment. The random numbers are required to be uniformly distributed statistically and unpredictable. To satisfy the requirements, a physical true random number generator (TR-NG) is used. In this paper, we implement a TRNG using an SR latch on 40 nm CMOS ASIC. This TRNG generates the random number by exclusive ORing (XORing) the outputs of 256 SR latches. We evaluate the random number generated using statistical tests in accordance with BSI AIS 20/31 and using an IID (Independent and Identically Distributed) test, and the entropy estimation in accordance with NIST SP800-90B changing the supply voltage and environmental temperature within its rated values. As a result, the TRNG passed all the tests except in a few cases. From this experiment, we found that the TRNG has a robustness against environmental change. The power consumption is 18.8 micro Watt at 2.5 MHz. This TRNG is suitable for embedded systems to improve security in IoT systems.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Wireless Attacks on Automotive Remote Keyless Entry Systems 汽车远程无钥匙进入系统的无线攻击
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995297
David F. Oswald
Modern vehicles rely on a variety of electronic systems and components. One of those components is the vehicle key. Today, a key typically implements at least three functions: mechanical locking with a key blade, the electronic immobilizer to autorise the start of the engine, and the remote keyless entry (RKE) system that allows to wirelessly (un)lock the doors and disable the alarm system. These main components of a vehicle key are shown in Figure 1. For the mechanical part of the vehicle key, it is well known that the key blade can be easily copied and that the locking cylinder can be bypassed with other means (using so-called "decoders" or simply a screwdriver). In contrast, immobilizer and RKE rely on wireless protocols to cryptographically authenticate the vehicle key to the car. Immobilizers employ radio frequency identification (RFID) transponders to carry out a challenge-response protocol over a low-range bidirectional link at a frequency of 125 kHz. In the past, researchers have revealed severe aws in the cryptography and protocols used by immobilizers, leading to the break of the major systems Megamos, Hitag2, and DST40 [7, 6, 1]. In contrast to the immobilizer, the RKE part uses unidirectional communication (the vehicle only receives, the key fob only transmits) over a high-range wireless link with operating distances of tens to one hundred meters. These systems are based on rolling codes, which essentially transmit a counter (that is incremented on each button press) in a cryptographically authenticated manner. Until recently, the security of automotive RKE had been scrutinized to a lesser degree than that of immobilizers, even though vulnerabilities in similar systems have been known since 2008 with the attacks on KeeLoq [3]. Other results reported in the literature include an analytical attack on a single, outdated vehicle [2] and the so-called "RollJam" technique [5], which is based on a combination of replay and selective jamming. In 2016, it was shown that severe aws exist in the RKE systems of major automotive manufacturers [4]. On the one hand, the VWgroup (Volkswagen, Seat, Skoda, Audi) based the security of their RKE system on a few global cryptographic keys, potentially affecting hundreds of million vehicles world-wide. By extracting these global keys from the firmware of electronic controls units (ECUs) once, an adversary is able to create a duplicate of the owner's RKE fob by eavesdropping a single rolling code. The second case study in [4] exposes new cryptographic weaknesses in the Hitag2 cipher when used for RKE. Applying a correlation-based attack, an adversary can recover the 48-bit cryptographic key by eavesdropping four to eight rolling codes and performing a one-minute computation on a standard laptop. Again, this attack affects millions of vehicle world-wide. Manufacturers that used Hitag2 in their RKE system include Alfa Romeo, Peugeot, Lancia, Opel, Renault, and Ford among others. In this keynote talk, we will p
现代车辆依靠各种各样的电子系统和元件。其中一个部件是车辆钥匙。如今,一把钥匙通常至少具有三种功能:带钥匙刀片的机械锁定、自动启动发动机的电子防盗器,以及远程无钥匙进入(RKE)系统,该系统可以无线(un)锁门并禁用警报系统。车辆钥匙的这些主要部件如图1所示。对于车辆钥匙的机械部分,众所周知,钥匙刀片可以很容易地复制,锁定气缸可以通过其他手段绕过(使用所谓的“解码器”或简单的螺丝刀)。相比之下,immobilizer和RKE依靠无线协议对车辆密钥进行加密认证。固定装置采用射频识别(RFID)应答器,在125 kHz的低范围双向链路上执行挑战响应协议。在过去,研究人员已经揭示了锁定者使用的密码和协议中的严重规律,导致主要系统Megamos, Hitag2和DST40被攻破[7,6,1]。与锁止器相比,RKE部分使用单向通信(车辆只接收,密钥卡只发送),通过远距离无线链路,操作距离为几十到一百米。这些系统基于滚动代码,其本质上是以加密身份验证的方式传输计数器(每次按下按钮增加)。直到最近,尽管自2008年KeeLoq攻击以来已经知道了类似系统的漏洞,但对汽车RKE的安全性的审查程度低于固定装置[3]。文献中报道的其他结果包括对单个过时车辆的分析攻击[2]和所谓的“RollJam”技术[5],该技术基于重播和选择性干扰的结合。2016年的研究表明,各大汽车制造商的RKE系统存在严重的法律问题[4]。一方面,大众(Volkswagen)、西雅特(Seat)、斯柯达(Skoda)、奥迪(Audi)等大众集团将其RKE系统的安全性建立在几个全球加密密钥上,这可能会影响全球数亿辆汽车。通过一次从电子控制单元(ecu)的固件中提取这些全局密钥,攻击者能够通过窃听单个滚动代码来创建所有者RKE密钥卡的副本。[4]中的第二个案例研究暴露了用于RKE时Hitag2密码的新加密弱点。应用基于相关性的攻击,攻击者可以通过窃听4到8个滚动代码并在标准笔记本电脑上执行一分钟的计算来恢复48位加密密钥。同样,这种攻击影响了全球数百万辆汽车。在其RKE系统中使用Hitag2的制造商包括阿尔法罗密欧、标致、蓝旗亚、欧宝、雷诺和福特等。在这次主题演讲中,我们将展示[4]的结果,并通过回顾对RKE系统和汽车电子设备的攻击历史,将它们置于更广泛的背景下。
{"title":"Wireless Attacks on Automotive Remote Keyless Entry Systems","authors":"David F. Oswald","doi":"10.1145/2995289.2995297","DOIUrl":"https://doi.org/10.1145/2995289.2995297","url":null,"abstract":"Modern vehicles rely on a variety of electronic systems and components. One of those components is the vehicle key. Today, a key typically implements at least three functions: mechanical locking with a key blade, the electronic immobilizer to autorise the start of the engine, and the remote keyless entry (RKE) system that allows to wirelessly (un)lock the doors and disable the alarm system. These main components of a vehicle key are shown in Figure 1. For the mechanical part of the vehicle key, it is well known that the key blade can be easily copied and that the locking cylinder can be bypassed with other means (using so-called \"decoders\" or simply a screwdriver). In contrast, immobilizer and RKE rely on wireless protocols to cryptographically authenticate the vehicle key to the car. Immobilizers employ radio frequency identification (RFID) transponders to carry out a challenge-response protocol over a low-range bidirectional link at a frequency of 125 kHz. In the past, researchers have revealed severe aws in the cryptography and protocols used by immobilizers, leading to the break of the major systems Megamos, Hitag2, and DST40 [7, 6, 1]. In contrast to the immobilizer, the RKE part uses unidirectional communication (the vehicle only receives, the key fob only transmits) over a high-range wireless link with operating distances of tens to one hundred meters. These systems are based on rolling codes, which essentially transmit a counter (that is incremented on each button press) in a cryptographically authenticated manner. Until recently, the security of automotive RKE had been scrutinized to a lesser degree than that of immobilizers, even though vulnerabilities in similar systems have been known since 2008 with the attacks on KeeLoq [3]. Other results reported in the literature include an analytical attack on a single, outdated vehicle [2] and the so-called \"RollJam\" technique [5], which is based on a combination of replay and selective jamming. In 2016, it was shown that severe aws exist in the RKE systems of major automotive manufacturers [4]. On the one hand, the VWgroup (Volkswagen, Seat, Skoda, Audi) based the security of their RKE system on a few global cryptographic keys, potentially affecting hundreds of million vehicles world-wide. By extracting these global keys from the firmware of electronic controls units (ECUs) once, an adversary is able to create a duplicate of the owner's RKE fob by eavesdropping a single rolling code. The second case study in [4] exposes new cryptographic weaknesses in the Hitag2 cipher when used for RKE. Applying a correlation-based attack, an adversary can recover the 48-bit cryptographic key by eavesdropping four to eight rolling codes and performing a one-minute computation on a standard laptop. Again, this attack affects millions of vehicle world-wide. Manufacturers that used Hitag2 in their RKE system include Alfa Romeo, Peugeot, Lancia, Opel, Renault, and Ford among others. In this keynote talk, we will p","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IoT Security Challenges and Ways Forward 物联网安全挑战和未来之路
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995298
M. Medwed
Today 2.9 billion people, or 40% of the world's population are online. By 2020, at least 40 billion more devices will become smart via embedded processors. The impact of such Internet of Things (IoT) on our society will be extraordinary. It will influence most consumer and business sectors, impact education, healthcare and safety. However, it certainly will also pose a challenge from a security point of view. Not only will the devices themselves become more complex, also the interaction between devices, the networks and the variance in topology will grow. Finally, with increasing amounts of data and assets at stake the incentive for attackers will increase. The costs of cyber attacks in such setting are estimated to reach about 2 trillion USD by 2020. Today, the IoT is just beginning to emerge. Unfortunately, when looking at its security, there is lots of room for improvement. Exploits reported at a steady pace clearly suggest that security is a major challenge when the world wants to successfully switch from an IoT hype to a real IoT deployment. Security, and security risk awareness, insufficiently present in today's consumer and developer mindset, are only a starting point. Once the requirement for strong security is widely accepted, there will be still the economical question of who is going to pay for security and its maintenance. Without enforcing certain standards by means of third party evaluation this problem is expected to be hard to get under control.
如今,全球有29亿人上网,占全球人口的40%。到2020年,至少还有400亿台设备将通过嵌入式处理器变得智能。这种物联网(IoT)对我们社会的影响将是非凡的。它将影响大多数消费者和商业部门,影响教育、医疗保健和安全。然而,从安全的角度来看,它肯定也将构成挑战。不仅设备本身会变得更加复杂,设备之间的交互、网络和拓扑结构的变化也会增加。最后,随着越来越多的数据和资产受到威胁,攻击者的动机也会增加。据估计,到2020年,此类网络攻击造成的损失将达到约2万亿美元。今天,物联网才刚刚开始出现。不幸的是,当考虑到它的安全性时,还有很多改进的空间。稳步增长的漏洞报告清楚地表明,当世界想要成功地从物联网炒作转向真正的物联网部署时,安全是一个主要挑战。安全性和安全性风险意识在今天的消费者和开发人员的思维中还不够充分,这只是一个起点。一旦对强安全的要求被广泛接受,那么谁来支付安全及其维护的经济问题仍然存在。如果不通过第三方评估来强制执行一定的标准,这个问题预计很难得到控制。
{"title":"IoT Security Challenges and Ways Forward","authors":"M. Medwed","doi":"10.1145/2995289.2995298","DOIUrl":"https://doi.org/10.1145/2995289.2995298","url":null,"abstract":"Today 2.9 billion people, or 40% of the world's population are online. By 2020, at least 40 billion more devices will become smart via embedded processors. The impact of such Internet of Things (IoT) on our society will be extraordinary. It will influence most consumer and business sectors, impact education, healthcare and safety. However, it certainly will also pose a challenge from a security point of view. Not only will the devices themselves become more complex, also the interaction between devices, the networks and the variance in topology will grow. Finally, with increasing amounts of data and assets at stake the incentive for attackers will increase. The costs of cyber attacks in such setting are estimated to reach about 2 trillion USD by 2020. Today, the IoT is just beginning to emerge. Unfortunately, when looking at its security, there is lots of room for improvement. Exploits reported at a steady pace clearly suggest that security is a major challenge when the world wants to successfully switch from an IoT hype to a real IoT deployment. Security, and security risk awareness, insufficiently present in today's consumer and developer mindset, are only a starting point. Once the requirement for strong security is widely accepted, there will be still the economical question of who is going to pay for security and its maintenance. Without enforcing certain standards by means of third party evaluation this problem is expected to be hard to get under control.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132902299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? 分析成千上万的固件映像和一些物理设备:下一步是什么?
Pub Date : 2016-10-28 DOI: 10.1145/2995289.2995296
Aurélien Francillon
This talk will make an overview of security problems that have been found with both large scale automated static analysis (within the firmware.re project) and with more focused and more manual dynamic analysis (using the Avatar project). I will then discuss what I think we can do about it and how.
本演讲将概述在大规模自动化静态分析(在固件内)中发现的安全问题。重新项目),以及更集中、更手动的动态分析(使用Avatar项目)。然后我将讨论我认为我们可以做些什么以及如何做。
{"title":"Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?","authors":"Aurélien Francillon","doi":"10.1145/2995289.2995296","DOIUrl":"https://doi.org/10.1145/2995289.2995296","url":null,"abstract":"This talk will make an overview of security problems that have been found with both large scale automated static analysis (within the firmware.re project) and with more focused and more manual dynamic analysis (using the Avatar project). I will then discuss what I think we can do about it and how.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1