首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
Generation of Tailored and Confined Datasets for IDS Evaluation in Cyber-Physical Systems 为网络物理系统中的 IDS 评估生成量身定制的限定数据集
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3341211
T. Hutzelmann, Dominik Mauksch, A. Petrovska, Alexander Pretschner
The state-of-the-art evaluation of an Intrusion Detection System (IDS) relies on benchmark datasets composed of the regular system's and potential attackers’ behavior. The datasets are collected once and independently of the IDS under analysis. This paper questions this practice by introducing a methodology to elicit particularly challenging samples to benchmark a given IDS. In detail, we propose (1) six fitness functions quantifying the suitability of individual samples, particularly tailored for safety-critical cyber-physical systems, (2) a scenario-based methodology for attacks on networks to systematically deduce optimal samples in addition to previous datasets, and (3) a respective extension of the standard IDS evaluation methodology. We applied our methodology to two network-based IDSs defending an advanced driver assistance system. Our results indicate that different IDSs show strongly differing characteristics in their edge case classifications and that the original datasets used for evaluation do not include such challenging behavior. In the worst case, this causes a critical undetected attack, as we document for one IDS. Our findings highlight the need to tailor benchmark datasets to the individual IDS in a final evaluation step. Especially the manual investigation of selected samples from edge case classifications by domain experts is vital for assessing the IDSs.
最先进的入侵检测系统(IDS)评估依赖于由常规系统和潜在攻击者行为组成的基准数据集。这些数据集是一次性收集的,与正在分析的 IDS 无关。本文对这种做法提出了质疑,提出了一种方法来获取特别具有挑战性的样本,以对给定的 IDS 进行基准测试。具体而言,我们提出了 (1) 六种适合度函数,用于量化单个样本的适合度,尤其适合安全关键型网络物理系统;(2) 一种基于场景的网络攻击方法,用于在先前数据集的基础上系统地推导出最佳样本;(3) 标准 IDS 评估方法的相应扩展。我们将这一方法应用于两个基于网络的 IDS,以防御一个高级驾驶辅助系统。我们的结果表明,不同的 IDS 在边缘情况分类方面表现出强烈的差异特征,而用于评估的原始数据集并不包含此类挑战行为。在最坏的情况下,这会导致关键的未检测攻击,我们记录了一个 IDS 的情况。我们的研究结果突出表明,在最后的评估步骤中,有必要对基准数据集进行调整,使其适合各个 IDS。尤其是由领域专家对从边缘案例分类中选取的样本进行人工调查,对于评估 IDS 至关重要。
{"title":"Generation of Tailored and Confined Datasets for IDS Evaluation in Cyber-Physical Systems","authors":"T. Hutzelmann, Dominik Mauksch, A. Petrovska, Alexander Pretschner","doi":"10.1109/TDSC.2023.3341211","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3341211","url":null,"abstract":"The state-of-the-art evaluation of an Intrusion Detection System (IDS) relies on benchmark datasets composed of the regular system's and potential attackers’ behavior. The datasets are collected once and independently of the IDS under analysis. This paper questions this practice by introducing a methodology to elicit particularly challenging samples to benchmark a given IDS. In detail, we propose (1) six fitness functions quantifying the suitability of individual samples, particularly tailored for safety-critical cyber-physical systems, (2) a scenario-based methodology for attacks on networks to systematically deduce optimal samples in addition to previous datasets, and (3) a respective extension of the standard IDS evaluation methodology. We applied our methodology to two network-based IDSs defending an advanced driver assistance system. Our results indicate that different IDSs show strongly differing characteristics in their edge case classifications and that the original datasets used for evaluation do not include such challenging behavior. In the worst case, this causes a critical undetected attack, as we document for one IDS. Our findings highlight the need to tailor benchmark datasets to the individual IDS in a final evaluation step. Especially the manual investigation of selected samples from edge case classifications by domain experts is vital for assessing the IDSs.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141713919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Volume-Hiding Range Searchable Symmetric Encryption for Large-Scale Datasets 大规模数据集的卷隐藏范围可搜索对称加密
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335304
Feng Liu, Kaiping Xue, Jinjiang Yang, Jing Zhang, Zixuan Huang, Jian Li, David S. L. Wei
Searchable Symmetric Encryption (SSE) is a valuable cryptographic tool that allows a client to retrieve its outsourced data from an untrusted server via keyword search. Initially, SSE research primarily focused on the efficiency-security trade-off. However, in recent years, attention has shifted towards range queries instead of exact keyword searches, resulting in significant developments in the SSE field. Despite the advancements in SSE schemes supporting range queries, many are susceptible to leakage-abuse attacks due to volumetric profile leakage. Although several schemes exist to prevent volume leakage, these solutions prove inefficient when dealing with large-scale datasets. In this article, we highlight the efficiency-security trade-off for range queries in SSE. Subsequently, we propose a volume-hiding range SSE scheme that ensures efficient operations on extensive datasets. Leveraging the order-weighted inverted index and bitmap structure, our scheme achieves high search efficiency while maintaining the confidentiality of the volumetric profile. To facilitate searching within large-scale datasets, we introduce a partitioning strategy that divides a broad range into disjoint partitions and stores the information in a local binary tree. Through an analysis of the leakage function, we demonstrate the security of our proposed scheme within the ideal/real model simulation paradigm. Our experimental results further validate the practicality of our scheme with real-life large-scale datasets.
可搜索对称加密(SSE)是一种有价值的加密工具,它允许客户通过关键字搜索从不受信任的服务器检索其外包数据。最初,SSE 的研究主要集中在效率与安全的权衡上。然而,近年来,人们的注意力已从精确的关键字搜索转向范围查询,从而推动了 SSE 领域的重大发展。尽管支持范围查询的 SSE 方案取得了进步,但许多方案仍容易因体积特征泄漏而受到滥用泄漏攻击。虽然有几种方案可以防止体积泄漏,但在处理大规模数据集时,这些方案被证明效率低下。在本文中,我们将重点讨论 SSE 中范围查询的效率-安全权衡问题。随后,我们提出了一种体积隐藏范围的 SSE 方案,它能确保在大规模数据集上的高效操作。利用阶次加权倒排索引和位图结构,我们的方案在实现高搜索效率的同时,还能保持体积轮廓的机密性。为了便于在大规模数据集中进行搜索,我们引入了一种分区策略,将广泛的范围划分为不相连的分区,并将信息存储在本地二叉树中。通过对泄漏函数的分析,我们在理想/真实模型模拟范例中证明了我们提出的方案的安全性。我们的实验结果进一步验证了我们的方案在现实生活大规模数据集中的实用性。
{"title":"Volume-Hiding Range Searchable Symmetric Encryption for Large-Scale Datasets","authors":"Feng Liu, Kaiping Xue, Jinjiang Yang, Jing Zhang, Zixuan Huang, Jian Li, David S. L. Wei","doi":"10.1109/TDSC.2023.3335304","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335304","url":null,"abstract":"Searchable Symmetric Encryption (SSE) is a valuable cryptographic tool that allows a client to retrieve its outsourced data from an untrusted server via keyword search. Initially, SSE research primarily focused on the efficiency-security trade-off. However, in recent years, attention has shifted towards range queries instead of exact keyword searches, resulting in significant developments in the SSE field. Despite the advancements in SSE schemes supporting range queries, many are susceptible to leakage-abuse attacks due to volumetric profile leakage. Although several schemes exist to prevent volume leakage, these solutions prove inefficient when dealing with large-scale datasets. In this article, we highlight the efficiency-security trade-off for range queries in SSE. Subsequently, we propose a volume-hiding range SSE scheme that ensures efficient operations on extensive datasets. Leveraging the order-weighted inverted index and bitmap structure, our scheme achieves high search efficiency while maintaining the confidentiality of the volumetric profile. To facilitate searching within large-scale datasets, we introduce a partitioning strategy that divides a broad range into disjoint partitions and stores the information in a local binary tree. Through an analysis of the leakage function, we demonstrate the security of our proposed scheme within the ideal/real model simulation paradigm. Our experimental results further validate the practicality of our scheme with real-life large-scale datasets.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141702453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination FairECom:努力证明电子商务的公平性,反对价格歧视
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334197
Tao Jiang, Xu Yuan, Qiong Cheng, Yulong Shen, Liangmin Wang, J. Ma
Price discrimination has been empirically exposed where e-commercial platforms aim to gain additional profits by charging customers with different prices for the same product/service. This situation becomes even worse in nowadays’ Big Data era, giving the chance for service providers to leverage artificial intelligence technologies to have the deep analysis of personalized patterns, urgently calling for solutions to prevent such discriminated behaviors to protect customers’ rights. This article aims to defend against price discrimination by developing a secure and privacy-preserving solution, provable for e-commerce fairness. Using a newly designed cryptographic accumulator and public bulletin board, our system, called FairECom, allows an auditor (i.e., a customer or third-party auditor) to verify if customers are experiencing price discrimination. In particular, FairECom enables a customer to check if his payment to a product/service is identical to other customers through a privacy-preserving challenge-response protocol, for implementing the price transparency against discrimination. We implement a prototype using an Ethereum-based public bulletin board to conduct the system evaluation. Our evaluation indicates that FairECom can integrate with existing APIs provided by Ethereum and incur acceptable costs when deploying to the e-commercial systems.
价格歧视已被实证揭露出来,即电子商务平台为了获得额外利润,对客户的相同产品/服务收取不同的价格。在当今的大数据时代,这种情况变得更加严重,服务提供商有机会利用人工智能技术对个性化模式进行深入分析,因此迫切需要解决方案来防止这种歧视行为,以保护客户的权益。本文旨在通过开发一种安全、保护隐私、可证明电子商务公平性的解决方案来抵御价格歧视。我们的系统被称为 FairECom,它使用新设计的加密累加器和公共公告板,允许审计员(即客户或第三方审计员)验证客户是否遭遇价格歧视。特别是,FairECom 使客户能够通过一个保护隐私的挑战-响应协议,检查他对产品/服务的付款是否与其他客户相同,从而实现反歧视的价格透明度。我们使用基于以太坊的公共公告板实现了一个原型,以进行系统评估。我们的评估表明,FairECom 可以与以太坊提供的现有应用程序接口集成,并且在部署到电子商务系统时成本可以接受。
{"title":"FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination","authors":"Tao Jiang, Xu Yuan, Qiong Cheng, Yulong Shen, Liangmin Wang, J. Ma","doi":"10.1109/TDSC.2023.3334197","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334197","url":null,"abstract":"Price discrimination has been empirically exposed where e-commercial platforms aim to gain additional profits by charging customers with different prices for the same product/service. This situation becomes even worse in nowadays’ Big Data era, giving the chance for service providers to leverage artificial intelligence technologies to have the deep analysis of personalized patterns, urgently calling for solutions to prevent such discriminated behaviors to protect customers’ rights. This article aims to defend against price discrimination by developing a secure and privacy-preserving solution, provable for e-commerce fairness. Using a newly designed cryptographic accumulator and public bulletin board, our system, called FairECom, allows an auditor (i.e., a customer or third-party auditor) to verify if customers are experiencing price discrimination. In particular, FairECom enables a customer to check if his payment to a product/service is identical to other customers through a privacy-preserving challenge-response protocol, for implementing the price transparency against discrimination. We implement a prototype using an Ethereum-based public bulletin board to conduct the system evaluation. Our evaluation indicates that FairECom can integrate with existing APIs provided by Ethereum and incur acceptable costs when deploying to the e-commercial systems.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141703217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting IvyRedaction:实现原子、一致和负责任的跨链重写
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3339675
Shun Hu, Ming Li, Jiasi Weng, Jia-Nan Liu, Jian Weng, Zhi Li
Blockchain rewriting has become widely explored for addressing data deletion requirements, such as error data deletion, space-saving, and compliance with the “right-to-be-forgotten” rule. However, existing approaches are inadequate for handling cross-chain redaction issues, in facing with the increasing need for inter-chain communication. In particular, transaction rewriting on a blockchain might have relevant effects on the states of other blockchains. The cross-chain interoperability results in inter-chain transactions with more complex dependency relations. The issues pose new challenges to achieve rewriting consistency, for example, ensuring the rewriting of related transactions when a transaction is being modified, and achieve atomic rewriting, whereby two cross-chain transactions must either all, or neither, be processed. This article introduces a cross-chain solution IvyRedaction, with an emphasis on customizing a decentralized intermediary for generating and maintaining global cross-chain redaction states and transaction dependencies. The article proposes a novel cross-chain state mapping method with rollback rules, as well as customized block structures and verification algorithms, to address the aforementioned issues. Proof-of-concept experiments are conducted to demonstrate the feasibility of the proposed framework.
区块链重写已被广泛用于解决数据删除要求,如错误数据删除、节省空间和遵守 "被遗忘权 "规则。然而,面对日益增长的链间交流需求,现有方法不足以处理跨链重写问题。特别是,区块链上的交易改写可能会对其他区块链的状态产生相关影响。跨链互操作性导致链间交易具有更复杂的依赖关系。这些问题对实现重写一致性提出了新的挑战,例如,在修改交易时确保相关交易的重写,以及实现原子重写,即两个跨链交易必须全部处理或都不处理。本文介绍了一种跨链解决方案 IvyRedaction,重点是定制一个去中心化的中介机构,用于生成和维护全局跨链重写状态和事务依赖关系。文章提出了一种带有回滚规则的新型跨链状态映射方法,以及定制的区块结构和验证算法,以解决上述问题。文章进行了概念验证实验,以证明所提框架的可行性。
{"title":"IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting","authors":"Shun Hu, Ming Li, Jiasi Weng, Jia-Nan Liu, Jian Weng, Zhi Li","doi":"10.1109/TDSC.2023.3339675","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3339675","url":null,"abstract":"Blockchain rewriting has become widely explored for addressing data deletion requirements, such as error data deletion, space-saving, and compliance with the “right-to-be-forgotten” rule. However, existing approaches are inadequate for handling cross-chain redaction issues, in facing with the increasing need for inter-chain communication. In particular, transaction rewriting on a blockchain might have relevant effects on the states of other blockchains. The cross-chain interoperability results in inter-chain transactions with more complex dependency relations. The issues pose new challenges to achieve rewriting consistency, for example, ensuring the rewriting of related transactions when a transaction is being modified, and achieve atomic rewriting, whereby two cross-chain transactions must either all, or neither, be processed. This article introduces a cross-chain solution IvyRedaction, with an emphasis on customizing a decentralized intermediary for generating and maintaining global cross-chain redaction states and transaction dependencies. The article proposes a novel cross-chain state mapping method with rollback rules, as well as customized block structures and verification algorithms, to address the aforementioned issues. Proof-of-concept experiments are conducted to demonstrate the feasibility of the proposed framework.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning MODA:异步联合学习中的模型所有权剥夺攻击
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3348204
Xiaoyu Zhang, Shen Lin, Chao Chen, Xiaofeng Chen
Training a deep learning model from scratch requires a great deal of available labeled data, computation resources, and expert knowledge. Thus, the time-consuming and complicated learning procedure catapulted the trained model to valuable intellectual property (IP), spurring interest from attackers in model copyright infringement and stealing. Recently, a new defense approach leverages watermarking techniques to inject watermarks into the training procedure and verify model ownership when necessary. To our best knowledge, there is no research work on model ownership stealing attacks in federated learning, and the existing defense or mitigation methods can not be directly used for federated learning scenarios. In this article, we introduce watermarking neural networks in asynchronous federated learning and propose a novel model privacy attack, dubbed model ownership deprivation attack (MODA). MODA is launched by an inside adversarial participant, targeting occupying and depriving the remaining participants’ (victims) copyright to achieve his maximum profit. The extensive experimental results on five benchmark datasets (MNIST, Fashion-MNIST, GTSRB, SVHN, CIFAR10) show that MODA is highly effective in a two-participant learning scenario with a minor impact on model's performance. When extending MODA into multiple participants scenario, MODA still maintains high attack success rate and classification accuracy. Compared to the state-of-the-art works, MODA has a higher attack success rate than the black-box solution and comparable efficacy with the approach in the white-box scenario.
从零开始训练一个深度学习模型需要大量可用的标注数据、计算资源和专家知识。因此,耗时而复杂的学习过程使训练模型一跃成为有价值的知识产权(IP),激发了攻击者对模型版权侵权和窃取的兴趣。最近,一种新的防御方法利用水印技术在训练过程中注入水印,并在必要时验证模型所有权。据我们所知,目前还没有关于联合学习中模型所有权窃取攻击的研究工作,现有的防御或缓解方法也不能直接用于联合学习场景。本文介绍了异步联合学习中的水印神经网络,并提出了一种新型的模型隐私攻击,即模型所有权剥夺攻击(MODA)。MODA 由内部敌对参与者发起,目标是占领和剥夺其余参与者(受害者)的版权,以实现自己的最大利益。在五个基准数据集(MNIST、Fashion-MNIST、GTSRB、SVHN、CIFAR10)上的大量实验结果表明,MODA 在双参与者学习场景下非常有效,对模型性能的影响很小。当把 MODA 扩展到多人参与场景时,MODA 仍能保持较高的攻击成功率和分类准确率。与最先进的作品相比,MODA 的攻击成功率高于黑盒解决方案,在白盒场景中的功效与黑盒解决方案相当。
{"title":"MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning","authors":"Xiaoyu Zhang, Shen Lin, Chao Chen, Xiaofeng Chen","doi":"10.1109/TDSC.2023.3348204","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3348204","url":null,"abstract":"Training a deep learning model from scratch requires a great deal of available labeled data, computation resources, and expert knowledge. Thus, the time-consuming and complicated learning procedure catapulted the trained model to valuable intellectual property (IP), spurring interest from attackers in model copyright infringement and stealing. Recently, a new defense approach leverages watermarking techniques to inject watermarks into the training procedure and verify model ownership when necessary. To our best knowledge, there is no research work on model ownership stealing attacks in federated learning, and the existing defense or mitigation methods can not be directly used for federated learning scenarios. In this article, we introduce watermarking neural networks in asynchronous federated learning and propose a novel model privacy attack, dubbed model ownership deprivation attack (MODA). MODA is launched by an inside adversarial participant, targeting occupying and depriving the remaining participants’ (victims) copyright to achieve his maximum profit. The extensive experimental results on five benchmark datasets (MNIST, Fashion-MNIST, GTSRB, SVHN, CIFAR10) show that MODA is highly effective in a two-participant learning scenario with a minor impact on model's performance. When extending MODA into multiple participants scenario, MODA still maintains high attack success rate and classification accuracy. Compared to the state-of-the-art works, MODA has a higher attack success rate than the black-box solution and comparable efficacy with the approach in the white-box scenario.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing 论云计算安全关键词搜索和数据共享机制的安全性
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3346795
Cong Li, Xinyu Feng, Qingni Shen, Zhonghai Wu
Nearly all of the previous attribute-based proxy re-encryption (ABPRE) schemes cannot support keyword search and keyword updating without the aid of private key generator (PKG) simultaneously. To resolve this problem, recently in IEEE Transactions on Dependable and Secure Computing (doi: 10.1109/TDSC.2020.2963978), Ge et al. proposed a ciphertext-policy ABPRE scheme with keyword search, dubbed CPAB-KSDS, which supports keyword updating without communicating with PKG. It also achieves indistinguishability against chosen-ciphertext attack (IND-CCA) security and indistinguishability against chosen-keyword attack (IND-CKA) security in the random oracle model. In this paper, we carefully analyze the security of Ge et al.’s CPAB-KSDS scheme and find that they did not give a correct reduction from IND-CKA security of theirs to the underlying cryptographic assumption. Furthermore, we also give a concrete attack on IND-CKA security of the CPAB-KSDS scheme. Therefore, it fails to achieve IND-CKA security they claimed, which is an essential security requirement for the encryption scheme with keyword search.
以往几乎所有基于属性的代理重加密(ABPRE)方案都无法在不借助私钥生成器(PKG)的情况下同时支持关键字搜索和关键字更新。为了解决这个问题,Ge 等人最近在 IEEE Transactions on Dependable and Secure Computing(doi: 10.1109/TDSC.2020.2963978)上提出了一种具有关键字搜索功能的密文策略 ABPRE 方案(称为 CPAB-KSDS),该方案无需与 PKG 通信即可支持关键字更新。它还在随机甲骨文模型中实现了对抗所选密文攻击的不可区分性(IND-CCA)安全性和对抗所选关键字攻击的不可区分性(IND-CKA)安全性。在本文中,我们仔细分析了 Ge 等人的 CPAB-KSDS 方案的安全性,发现他们并没有将其 IND-CKA 安全性正确还原到底层加密假设。此外,我们还给出了对 CPAB-KSDS 方案 IND-CKA 安全性的具体攻击。因此,CPAB-KSDS 未能达到他们声称的 IND-CKA 安全性,而这正是关键词搜索加密方案的基本安全要求。
{"title":"On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing","authors":"Cong Li, Xinyu Feng, Qingni Shen, Zhonghai Wu","doi":"10.1109/TDSC.2023.3346795","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3346795","url":null,"abstract":"Nearly all of the previous attribute-based proxy re-encryption (ABPRE) schemes cannot support keyword search and keyword updating without the aid of private key generator (PKG) simultaneously. To resolve this problem, recently in IEEE Transactions on Dependable and Secure Computing (doi: 10.1109/TDSC.2020.2963978), Ge et al. proposed a ciphertext-policy ABPRE scheme with keyword search, dubbed CPAB-KSDS, which supports keyword updating without communicating with PKG. It also achieves indistinguishability against chosen-ciphertext attack (IND-CCA) security and indistinguishability against chosen-keyword attack (IND-CKA) security in the random oracle model. In this paper, we carefully analyze the security of Ge et al.’s CPAB-KSDS scheme and find that they did not give a correct reduction from IND-CKA security of theirs to the underlying cryptographic assumption. Furthermore, we also give a concrete attack on IND-CKA security of the CPAB-KSDS scheme. Therefore, it fails to achieve IND-CKA security they claimed, which is an essential security requirement for the encryption scheme with keyword search.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks 移动医疗网络中基于绿色物联网的隐私保护和节能型随机森林疾病检测框架
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3347342
Sona Alex, D. Jagalchandran, Deepthi P. Pattathil
The privacy of medical data and resource restrictions in the Internet of Things (IoT) nodes prohibit medical users from utilizing disease detection (DD) services offered by the health cloud in the mobile healthcare network (MHN). Also, health clouds may need the DD procedures to be private. Therefore, the essential requirements for MHN DD services are (i) performing accurate and fast DD without jeopardizing the privacy of health clouds and medical users and (ii) reducing the computational and transmission overhead (energy-consumption) of the green IoT devices while performing privacy-preserving DD. The outsourced privacy-preserving DD is available in the literature based on popular tree-based machine learning schemes such as a random forest. However, these schemes utilize energy-hungry public-key encryption schemes in IoT nodes at medical users for privacy preservation. This work proposes an energy-efficient, fully homomorphic modified Rivest scheme (FHMRS) for the proposed privacy-preserving random forest classification (PRFC). A secure integer comparison protocol is also developed for reducing processing time and energy consumption for users while performing outsourced PRFC. The implementation results and security analysis show that the proposed schemes guarantee better energy efficiency for MHN green IoT devices without compromising privacy than the existing tree-based schemes.
由于医疗数据的隐私性和物联网(IoT)节点的资源限制,医疗用户无法使用移动医疗网络(MHN)中由健康云提供的疾病检测(DD)服务。此外,健康云可能需要疾病检测程序是私有的。因此,MHN DD 服务的基本要求是:(i) 在不损害健康云和医疗用户隐私的情况下执行准确、快速的 DD;(ii) 在执行隐私保护 DD 的同时减少绿色物联网设备的计算和传输开销(能耗)。文献中的外包隐私保护 DD 基于流行的基于树的机器学习方案(如随机森林)。然而,这些方案在医疗用户的物联网节点中使用高能耗的公钥加密方案来保护隐私。本研究为拟议的隐私保护随机森林分类(PRFC)提出了一种高能效、全同态修正里维斯特方案(FHMRS)。此外,还开发了一种安全的整数比较协议,以减少用户在执行外包 PRFC 时的处理时间和能耗。实施结果和安全分析表明,与现有的基于树的方案相比,所提出的方案能保证 MHN 绿色物联网设备具有更好的能效,同时不损害隐私。
{"title":"Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks","authors":"Sona Alex, D. Jagalchandran, Deepthi P. Pattathil","doi":"10.1109/TDSC.2023.3347342","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3347342","url":null,"abstract":"The privacy of medical data and resource restrictions in the Internet of Things (IoT) nodes prohibit medical users from utilizing disease detection (DD) services offered by the health cloud in the mobile healthcare network (MHN). Also, health clouds may need the DD procedures to be private. Therefore, the essential requirements for MHN DD services are (i) performing accurate and fast DD without jeopardizing the privacy of health clouds and medical users and (ii) reducing the computational and transmission overhead (energy-consumption) of the green IoT devices while performing privacy-preserving DD. The outsourced privacy-preserving DD is available in the literature based on popular tree-based machine learning schemes such as a random forest. However, these schemes utilize energy-hungry public-key encryption schemes in IoT nodes at medical users for privacy preservation. This work proposes an energy-efficient, fully homomorphic modified Rivest scheme (FHMRS) for the proposed privacy-preserving random forest classification (PRFC). A secure integer comparison protocol is also developed for reducing processing time and energy consumption for users while performing outsourced PRFC. The implementation results and security analysis show that the proposed schemes guarantee better energy efficiency for MHN green IoT devices without compromising privacy than the existing tree-based schemes.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices 关于寿命终结(EoL)物联网设备不安全性的实证研究
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334017
Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo
Researchers actively work on the security of Internet of Things (IoT) devices when IoT devices become popular. However, previous works ignore the insecurity about a special category of devices, i.e., the end-of-life (EoL) devices. Once a product becomes EoL, vendors no longer maintain its firmware, which makes it susceptible to attacks. In this article, we conduct the first empirical study to shed light on the (in)security of EoL devices. Our study performs two types of analysis, including the liveness analysis and the vulnerability analysis. The first one aims to detect the scale of EoL devices that are still alive in the wild in the long term. The second one is to evaluate the vulnerabilities existing in (active) EoL devices. We analyzed 894 EoL models from three vendors (i.e., D-Link, Tp-Link, and Netgear) for more than two years. Our study reveals some worrisome facts that were unknown by the community. There exist more than three million active EoL devices, while more than one million of them have been alive for more than five years. Furthermore, more than half of the vulnerabilities are discovered after the EoL date. Although vendors may release security patches after the EoL date, the process is ad hoc and incomplete, with limited functionality. In summary, more than three million active EoL devices are vulnerable, and nearly half of them are threatened by high-risk vulnerabilities. By compromising EoL devices, attackers can achieve a minimum of 8.67 Tbps DDoS attack.
随着物联网设备的普及,研究人员积极致力于研究物联网设备的安全性。然而,以往的研究忽略了一类特殊设备的不安全性,即报废(EoL)设备。一旦产品成为 EoL,供应商就不再维护其固件,从而使其容易受到攻击。在本文中,我们进行了首次实证研究,以揭示 EoL 设备的(不)安全性。我们的研究进行了两类分析,包括有效性分析和漏洞分析。第一种分析的目的是检测在野外长期存活的 EoL 设备的规模。第二种是评估(活跃的)EoL 设备中存在的漏洞。我们分析了三家供应商(即 D-Link、Tp-Link 和 Netgear)的 894 个 EoL 型号,时间跨度超过两年。我们的研究揭示了一些不为人知的令人担忧的事实。目前有 300 多万台活跃的 EoL 设备,其中有 100 多万台已使用了 5 年以上。此外,超过一半的漏洞是在 EoL 日期之后发现的。虽然供应商可能会在 EoL 日期之后发布安全补丁,但这一过程是临时的、不完整的,功能有限。总之,有 300 多万台使用中的 EoL 设备存在漏洞,其中近一半受到高危漏洞的威胁。通过入侵 EoL 设备,攻击者可以实现至少 8.67 Tbps 的 DDoS 攻击。
{"title":"An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices","authors":"Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo","doi":"10.1109/TDSC.2023.3334017","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334017","url":null,"abstract":"Researchers actively work on the security of Internet of Things (IoT) devices when IoT devices become popular. However, previous works ignore the insecurity about a special category of devices, i.e., the end-of-life (EoL) devices. Once a product becomes EoL, vendors no longer maintain its firmware, which makes it susceptible to attacks. In this article, we conduct the first empirical study to shed light on the (in)security of EoL devices. Our study performs two types of analysis, including the liveness analysis and the vulnerability analysis. The first one aims to detect the scale of EoL devices that are still alive in the wild in the long term. The second one is to evaluate the vulnerabilities existing in (active) EoL devices. We analyzed 894 EoL models from three vendors (i.e., D-Link, Tp-Link, and Netgear) for more than two years. Our study reveals some worrisome facts that were unknown by the community. There exist more than three million active EoL devices, while more than one million of them have been alive for more than five years. Furthermore, more than half of the vulnerabilities are discovered after the EoL date. Although vendors may release security patches after the EoL date, the process is ad hoc and incomplete, with limited functionality. In summary, more than three million active EoL devices are vulnerable, and nearly half of them are threatened by high-risk vulnerabilities. By compromising EoL devices, attackers can achieve a minimum of 8.67 Tbps DDoS attack.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports PKVIC:补充安全漏洞报告中缺失的软件包信息
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334762
Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu
Nowadays security vulnerability reports contain commercial vendor-centric information but fail to include accurate information of open-source software packages. Open-source ecosystems use package managers, such as Maven, NuGet, NPM, and Gem, to cover hundreds of thousands of free code packages. However, we uncover that vulnerability reports frequently miss the vulnerable software package information when the software package comes from open-source ecosystems. To fill in this gap, we propose a framework called PKVIC (software package vulnerability information calibration), as the first tool to automatically associate security vulnerability reports with affected software packages from different open-source ecosystems. Specifically, PKVIC designs an ecosystem classifier to determine which ecosystem a vulnerability report belongs to. From the reports written in natural language, PKVIC extracts the entities closely related to software names in ecosystems. To efficiently and accurately locate the affected software packages from millions of packages, we propose a recursive traversal method to generate the package identifier based on the naming scheme and candidate named entities. We implemented the prototype of PKVIC and conducted comprehensive experiments to validate its efficacy. In particular, we ran PKVIC over 421,808 vulnerability reports from 20 well-known sources of security vulnerabilities and identified 11,279 unique vulnerability reports that affected 2,703 open-source software packages. PKVIC successfully found the accurate reference URLs for these 2,703 software packages across 6 open-source ecosystems, including Pypi, Gem, NPM, Packagist, Nuget, and Maven.
现在的安全漏洞报告包含以商业供应商为中心的信息,却没有包含开源软件包的准确信息。开源生态系统使用 Maven、NuGet、NPM 和 Gem 等软件包管理器来管理成千上万的免费代码包。然而,我们发现,当软件包来自开源生态系统时,漏洞报告经常会遗漏易受攻击的软件包信息。为了填补这一空白,我们提出了一个名为 PKVIC(软件包漏洞信息校准)的框架,作为第一个将安全漏洞报告与来自不同开源生态系统的受影响软件包自动关联起来的工具。具体来说,PKVIC 设计了一个生态系统分类器来确定漏洞报告属于哪个生态系统。PKVIC 从用自然语言编写的报告中提取与生态系统中软件名称密切相关的实体。为了从数以百万计的软件包中高效、准确地找到受影响的软件包,我们提出了一种递归遍历方法,根据命名方案和候选命名实体生成软件包标识符。我们实现了 PKVIC 的原型,并进行了全面的实验来验证其功效。其中,我们对来自 20 个知名安全漏洞源的 421,808 份漏洞报告运行了 PKVIC,发现了 11,279 份影响 2,703 个开源软件包的独特漏洞报告。PKVIC 在 Pypi、Gem、NPM、Packagist、Nuget 和 Maven 等 6 个开源生态系统中成功找到了这 2703 个软件包的准确参考 URL。
{"title":"PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports","authors":"Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu","doi":"10.1109/TDSC.2023.3334762","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334762","url":null,"abstract":"Nowadays security vulnerability reports contain commercial vendor-centric information but fail to include accurate information of open-source software packages. Open-source ecosystems use package managers, such as Maven, NuGet, NPM, and Gem, to cover hundreds of thousands of free code packages. However, we uncover that vulnerability reports frequently miss the vulnerable software package information when the software package comes from open-source ecosystems. To fill in this gap, we propose a framework called PKVIC (software package vulnerability information calibration), as the first tool to automatically associate security vulnerability reports with affected software packages from different open-source ecosystems. Specifically, PKVIC designs an ecosystem classifier to determine which ecosystem a vulnerability report belongs to. From the reports written in natural language, PKVIC extracts the entities closely related to software names in ecosystems. To efficiently and accurately locate the affected software packages from millions of packages, we propose a recursive traversal method to generate the package identifier based on the naming scheme and candidate named entities. We implemented the prototype of PKVIC and conducted comprehensive experiments to validate its efficacy. In particular, we ran PKVIC over 421,808 vulnerability reports from 20 well-known sources of security vulnerabilities and identified 11,279 unique vulnerability reports that affected 2,703 open-source software packages. PKVIC successfully found the accurate reference URLs for these 2,703 software packages across 6 open-source ecosystems, including Pypi, Gem, NPM, Packagist, Nuget, and Maven.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity 揭示具有更高特征保真度的 DNN 训练数据的进化攻击
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3347225
Zipeng Ye, Wenjian Luo, Ruizhuo Zhang, Hongwei Zhang, Yuhui Shi, Yan Jia
Model inversion attacks aim to reveal information about sensitive training data of AI models, which may lead to serious privacy leakage. However, existing attack methods have limitations in reconstructing training data with higher feature fidelity. In this article, we propose an evolutionary model inversion attack approach (EvoMI) and empirically demonstrate that combined with the systematic search in the multi-degree-of-freedom latent space of the generative model, the simple use of an evolutionary algorithm can effectively improve the attack performance. Concretely, at first, we search for latent vectors which can generate images close to the attack target in the latent space with low-degree of freedom. Generally, the low-freedom constraint will reduce the probability of getting a local optima compared to existing methods that directly search for latent vectors in the high-freedom space. Consequently, we introduce a mutation operation to expand the search domain, thus further reduce the possibility of obtaining a local optima. Finally, we treat the searched latent vectors as the initial values of the post-processing and relax the constraint to further optimize the latent vectors in a higher-freedom space. Our proposed method is conceptually simple and easy to implement, yet it achieves substantial improvements and outperforms the state-of-the-art methods significantly.
模型反转攻击旨在揭示人工智能模型的敏感训练数据信息,这可能会导致严重的隐私泄露。然而,现有的攻击方法在重建特征保真度更高的训练数据时存在局限性。在本文中,我们提出了一种进化模型反转攻击方法(EvoMI),并通过实证证明,结合在生成模型的多自由度潜空间中的系统搜索,简单使用进化算法就能有效提高攻击性能。具体来说,首先,我们在低自由度的潜空间中搜索能够生成接近攻击目标图像的潜向量。一般来说,与直接在高自由度空间中搜索潜向量的现有方法相比,低自由度约束会降低获得局部最优的概率。因此,我们引入了突变操作来扩展搜索域,从而进一步降低获得局部最优的可能性。最后,我们将搜索到的潜向量作为后处理的初始值,并放松约束,进一步优化高自由空间中的潜向量。我们提出的方法概念简单、易于实现,但却能实现实质性改进,其性能明显优于最先进的方法。
{"title":"An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity","authors":"Zipeng Ye, Wenjian Luo, Ruizhuo Zhang, Hongwei Zhang, Yuhui Shi, Yan Jia","doi":"10.1109/TDSC.2023.3347225","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3347225","url":null,"abstract":"Model inversion attacks aim to reveal information about sensitive training data of AI models, which may lead to serious privacy leakage. However, existing attack methods have limitations in reconstructing training data with higher feature fidelity. In this article, we propose an evolutionary model inversion attack approach (EvoMI) and empirically demonstrate that combined with the systematic search in the multi-degree-of-freedom latent space of the generative model, the simple use of an evolutionary algorithm can effectively improve the attack performance. Concretely, at first, we search for latent vectors which can generate images close to the attack target in the latent space with low-degree of freedom. Generally, the low-freedom constraint will reduce the probability of getting a local optima compared to existing methods that directly search for latent vectors in the high-freedom space. Consequently, we introduce a mutation operation to expand the search domain, thus further reduce the possibility of obtaining a local optima. Finally, we treat the searched latent vectors as the initial values of the post-processing and relax the constraint to further optimize the latent vectors in a higher-freedom space. Our proposed method is conceptually simple and easy to implement, yet it achieves substantial improvements and outperforms the state-of-the-art methods significantly.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141708719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1