首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
Building a Lightweight Trusted Execution Environment for Arm GPUs 为 Arm GPU 构建轻量级可信执行环境
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334277
Chenxu Wang, Yunjie Deng, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zheng-hao He, Jiannong Cao, Fengwei Zhang
A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation. However, Arm GPU security has not been explored by the community. Existing work has used Trusted Execution Environments (TEEs) to address GPU security concerns on Intel-based platforms, but there are numerous architectural differences that lead to novel technical challenges in deploying TEEs for Arm GPUs. There is a need for generalizable and efficient Arm-based GPU security mechanisms. To address these problems, we present StrongBox, the first GPU TEE for secured general computation on Arm endpoints. StrongBox provides an isolated execution environment by ensuring exclusive access to GPU. Our approach is based in part on a dynamic, fine-grained memory protection policy as Arm-based GPUs typically share a unified memory with the CPU. Furthermore, StrongBox reduces runtime overhead from the redundant security introspection operations. We also design an effective defense mechanism within secure world to protect the confidential GPU computation. Our design leverages the widely-deployed Arm TrustZone and generic Arm features, without hardware modification or architectural changes. We prototype StrongBox using an off-the-shelf Arm Mali GPU and perform an extensive evaluation. Results show that StrongBox successfully ensures GPU computation security with a low (4.70%–15.26%) overhead.
各种 Arm 终端利用集成和离散 GPU 加速计算。然而,业界尚未对 Arm GPU 的安全性进行探讨。现有工作使用可信执行环境(TEE)来解决基于英特尔平台的 GPU 安全问题,但由于存在大量架构差异,为 Arm GPU 部署 TEE 会面临新的技术挑战。我们需要可通用且高效的基于 Arm 的 GPU 安全机制。为了解决这些问题,我们推出了 StrongBox,它是首个在 Arm 端点上进行安全通用计算的 GPU TEE。StrongBox 通过确保对 GPU 的独占访问,提供了一个隔离的执行环境。我们的方法部分基于动态、细粒度的内存保护策略,因为基于 Arm 的 GPU 通常与 CPU 共享统一的内存。此外,StrongBox 还减少了冗余安全反省操作带来的运行时开销。我们还在安全世界中设计了一种有效的防御机制,以保护机密的 GPU 计算。我们的设计利用了广泛部署的 Arm TrustZone 和通用 Arm 功能,无需修改硬件或架构。我们使用现成的 Arm Mali GPU 制作了 StrongBox 原型,并进行了广泛的评估。结果表明,StrongBox 以较低的开销(4.70%-15.26%)成功确保了 GPU 计算的安全性。
{"title":"Building a Lightweight Trusted Execution Environment for Arm GPUs","authors":"Chenxu Wang, Yunjie Deng, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zheng-hao He, Jiannong Cao, Fengwei Zhang","doi":"10.1109/TDSC.2023.3334277","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334277","url":null,"abstract":"A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation. However, Arm GPU security has not been explored by the community. Existing work has used Trusted Execution Environments (TEEs) to address GPU security concerns on Intel-based platforms, but there are numerous architectural differences that lead to novel technical challenges in deploying TEEs for Arm GPUs. There is a need for generalizable and efficient Arm-based GPU security mechanisms. To address these problems, we present StrongBox, the first GPU TEE for secured general computation on Arm endpoints. StrongBox provides an isolated execution environment by ensuring exclusive access to GPU. Our approach is based in part on a dynamic, fine-grained memory protection policy as Arm-based GPUs typically share a unified memory with the CPU. Furthermore, StrongBox reduces runtime overhead from the redundant security introspection operations. We also design an effective defense mechanism within secure world to protect the confidential GPU computation. Our design leverages the widely-deployed Arm TrustZone and generic Arm features, without hardware modification or architectural changes. We prototype StrongBox using an off-the-shelf Arm Mali GPU and perform an extensive evaluation. Results show that StrongBox successfully ensures GPU computation security with a low (4.70%–15.26%) overhead.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141703693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation 利用差分和失真地理扰动保护个性化 3D 位置隐私
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335374
Minghui Min, Haopeng Zhu, Jiahao Ding, Shiyin Li, Liang Xiao, Miao Pan, Zhu Han
The rapid development of indoor location-based services (LBS) has raised concerns about location privacy protection in the 3-dimensional (3D) space. The existing 2-dimensional (2D) location privacy protection mechanisms (LPPMs) cannot effectively resist attacks in 3D environments. Furthermore, users may have various sensitive attributes at different locations and times. In this article, we first formally study the relationship between two complementary notions of geo-indistinguishability and distortion privacy (i.e., expected inference error) in the 3D space and develop a two-phase personalized 3D LPPM (P3DLPPM). In Phase I, we search for neighboring locations to formulate a protection location set (PLS) for hiding the actual location based on the above-mentioned relationship. To realize this, we develop a 3D Hilbert curve-based minimum distance searching algorithm to find the PLS with minimum diameter for each location while guaranteeing differential privacy. In Phase II, we put forth a novel Permute-and-Flip mechanism for location perturbation, which maps its initial application in data publishing privacy protection to a location perturbation mechanism. It generates fake locations with smaller perturbation distances while improving the balance between privacy and quality of service (QoS). Simulation results show that the proposed P3DLPPM can significantly improve personalized privacy protection while meeting the user's QoS needs.
室内定位服务(LBS)的快速发展引起了人们对三维(3D)空间位置隐私保护的关注。现有的二维位置隐私保护机制(LPPM)无法有效抵御三维环境中的攻击。此外,用户在不同地点和时间可能具有不同的敏感属性。在本文中,我们首先正式研究了三维空间中地理不可区分性和失真隐私(即预期推断误差)这两个互补概念之间的关系,并开发了一种分两个阶段的个性化三维位置隐私保护机制(P3DLPPM)。在第一阶段,我们搜索相邻位置,根据上述关系制定一个保护位置集(PLS)来隐藏实际位置。为此,我们开发了一种基于三维希尔伯特曲线的最小距离搜索算法,以找到每个位置的最小直径 PLS,同时保证差分隐私。在第二阶段,我们提出了一种新颖的位置扰动 "Permute-and-Flip "机制,将其最初在数据发布隐私保护中的应用映射到位置扰动机制中。它能生成扰动距离更小的伪造位置,同时改善隐私和服务质量(QoS)之间的平衡。仿真结果表明,所提出的 P3DLPPM 在满足用户 QoS 需求的同时,还能显著改善个性化隐私保护。
{"title":"Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation","authors":"Minghui Min, Haopeng Zhu, Jiahao Ding, Shiyin Li, Liang Xiao, Miao Pan, Zhu Han","doi":"10.1109/TDSC.2023.3335374","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335374","url":null,"abstract":"The rapid development of indoor location-based services (LBS) has raised concerns about location privacy protection in the 3-dimensional (3D) space. The existing 2-dimensional (2D) location privacy protection mechanisms (LPPMs) cannot effectively resist attacks in 3D environments. Furthermore, users may have various sensitive attributes at different locations and times. In this article, we first formally study the relationship between two complementary notions of geo-indistinguishability and distortion privacy (i.e., expected inference error) in the 3D space and develop a two-phase personalized 3D LPPM (P3DLPPM). In Phase I, we search for neighboring locations to formulate a protection location set (PLS) for hiding the actual location based on the above-mentioned relationship. To realize this, we develop a 3D Hilbert curve-based minimum distance searching algorithm to find the PLS with minimum diameter for each location while guaranteeing differential privacy. In Phase II, we put forth a novel Permute-and-Flip mechanism for location perturbation, which maps its initial application in data publishing privacy protection to a location perturbation mechanism. It generates fake locations with smaller perturbation distances while improving the balance between privacy and quality of service (QoS). Simulation results show that the proposed P3DLPPM can significantly improve personalized privacy protection while meeting the user's QoS needs.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution 机器人应用程序中的功能交互风险:分析和基于政策的解决方案
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3348772
Yuan Xu, Yungang Bao, Sa Wang, Tianwei Zhang
Robot apps are becoming more automated, complex and diverse. An app usually consists of many functions, interacting with each other and the environment. This allows robots to conduct various tasks. However, it also opens a new door for cyber attacks: adversaries can leverage these interactions to threaten the safety of robot operations. Unfortunately, this issue is rarely explored in past works. We present the first systematic investigation about the function interactions in common robot apps. First, we disclose the potential risks and damages caused by malicious interactions. We introduce a comprehensive graph to model the function interactions in robot apps by analyzing 3,100 packages from the Robot Operating System (ROS) platform. From this graph, we identify and categorize three types of interaction risks. Second, we propose novel methodologies to detect and mitigate these risks and protect the operations of robot apps. We introduce security policies for each type of risks, and design coordination nodes to enforce the policies and regulate the interactions. We conduct extensive experiments on 110 robot apps from the ROS platform and two complex apps (Baidu Apollo and Autoware) widely adopted in industry. Evaluation results showed our methodologies can correctly identify and mitigate all potential risks.
机器人应用程序正变得越来越自动化、复杂和多样化。一个应用程序通常由许多功能组成,这些功能之间以及它们与环境之间可以相互影响。这使得机器人可以执行各种任务。然而,这也为网络攻击打开了一扇新的门:对手可以利用这些交互来威胁机器人操作的安全。遗憾的是,过去的研究很少探讨这一问题。我们首次对常见机器人应用程序中的功能交互进行了系统研究。首先,我们揭示了恶意交互可能带来的风险和破坏。通过分析机器人操作系统(ROS)平台上的 3100 个软件包,我们引入了一个全面的图来模拟机器人应用程序中的功能交互。从该图中,我们识别并划分出三种类型的交互风险。其次,我们提出了新颖的方法来检测和缓解这些风险,保护机器人应用程序的运行。我们为每种类型的风险引入了安全策略,并设计了协调节点来执行策略和规范交互。我们在 ROS 平台上的 110 个机器人应用程序和两个在行业中广泛采用的复杂应用程序(百度 Apollo 和 Autoware)上进行了大量实验。评估结果表明,我们的方法能够正确识别并降低所有潜在风险。
{"title":"Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution","authors":"Yuan Xu, Yungang Bao, Sa Wang, Tianwei Zhang","doi":"10.1109/TDSC.2023.3348772","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3348772","url":null,"abstract":"Robot apps are becoming more automated, complex and diverse. An app usually consists of many functions, interacting with each other and the environment. This allows robots to conduct various tasks. However, it also opens a new door for cyber attacks: adversaries can leverage these interactions to threaten the safety of robot operations. Unfortunately, this issue is rarely explored in past works. We present the first systematic investigation about the function interactions in common robot apps. First, we disclose the potential risks and damages caused by malicious interactions. We introduce a comprehensive graph to model the function interactions in robot apps by analyzing 3,100 packages from the Robot Operating System (ROS) platform. From this graph, we identify and categorize three types of interaction risks. Second, we propose novel methodologies to detect and mitigate these risks and protect the operations of robot apps. We introduce security policies for each type of risks, and design coordination nodes to enforce the policies and regulate the interactions. We conduct extensive experiments on 110 robot apps from the ROS platform and two complex apps (Baidu Apollo and Autoware) widely adopted in industry. Evaluation results showed our methodologies can correctly identify and mitigate all potential risks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141694196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedTA: Federated Worthy Task Assignment for Crowd Workers FedTA:面向人群工作者的联邦值得任务分配
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3346183
Xiangping Kang, Guoxian Yu, Lanju Kong, C. Domeniconi, Xiangliang Zhang, Qingzhong Li
Crowdsourcing is a promising computing paradigm for processing computer-hard tasks by harnessing human intelligence. How to protect online workers’ privacy is a hindrance for deploying crowdsourcing in the real world. Attempts have been made to address this issue by injecting noise or encrypting sensitive data, which cause quality loss and/or heavy computation and communication load. In this paper, we propose an approach, called FedTA (Federated Worthy Task Assignment for Crowd Workers), to protect a crowd worker's private data while ensuring quality. FedTA trains a client model based on the private data and annotations owned by a worker and uploads client models to aggregate the server model, without leaking the privacy of task data. To account for the varying task distributions (i.e., non-i.i.d.) and error-prone annotations of tasks, it leverages the feature similarity and semantic similarity separately derived from client and server models on local tasks, to quantify the quality of annotations and clients. Based on those, it further introduces a task assignment strategy to notify the clients which tasks are worthy and suitable for annotations. This strategy can incrementally improve the performance of client and server models. At the same time, it disregards the unworthy tasks to save the budget and to avoid their negative impact. Experimental results show that FedTA can complete secure crowdsourcing projects with high quality and low budget.
众包(Crowdsourcing)是一种前景广阔的计算模式,它通过利用人类智慧来处理计算机难以完成的任务。如何保护在线工作者的隐私是在现实世界中部署众包的一个障碍。有人试图通过注入噪音或加密敏感数据来解决这一问题,但这会造成质量损失和/或沉重的计算和通信负担。在本文中,我们提出了一种名为 FedTA(Federated Worthy Task Assignment for Crowd Workers)的方法,在确保质量的同时保护众包工作者的私人数据。FedTA 基于工作者拥有的私人数据和注释训练客户端模型,并上传客户端模型以聚合服务器模型,同时不会泄露任务数据的隐私。为了考虑到不同的任务分布(即非 i.i.d.)和容易出错的任务注释,它利用从本地任务的客户端和服务器模型中分别得出的特征相似性和语义相似性来量化注释和客户端的质量。在此基础上,它进一步引入了任务分配策略,通知客户端哪些任务值得并适合进行注释。这种策略可以逐步提高客户端和服务器模型的性能。同时,它还会忽略不值得的任务,以节省预算并避免其负面影响。实验结果表明,FedTA 可以高质量、低预算地完成安全众包项目。
{"title":"FedTA: Federated Worthy Task Assignment for Crowd Workers","authors":"Xiangping Kang, Guoxian Yu, Lanju Kong, C. Domeniconi, Xiangliang Zhang, Qingzhong Li","doi":"10.1109/TDSC.2023.3346183","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3346183","url":null,"abstract":"Crowdsourcing is a promising computing paradigm for processing computer-hard tasks by harnessing human intelligence. How to protect online workers’ privacy is a hindrance for deploying crowdsourcing in the real world. Attempts have been made to address this issue by injecting noise or encrypting sensitive data, which cause quality loss and/or heavy computation and communication load. In this paper, we propose an approach, called FedTA (Federated Worthy Task Assignment for Crowd Workers), to protect a crowd worker's private data while ensuring quality. FedTA trains a client model based on the private data and annotations owned by a worker and uploads client models to aggregate the server model, without leaking the privacy of task data. To account for the varying task distributions (i.e., non-i.i.d.) and error-prone annotations of tasks, it leverages the feature similarity and semantic similarity separately derived from client and server models on local tasks, to quantify the quality of annotations and clients. Based on those, it further introduces a task assignment strategy to notify the clients which tasks are worthy and suitable for annotations. This strategy can incrementally improve the performance of client and server models. At the same time, it disregards the unworthy tasks to save the budget and to avoid their negative impact. Experimental results show that FedTA can complete secure crowdsourcing projects with high quality and low budget.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141694664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels kCPA:为操作系统内核实现敏感指针全生命周期身份验证
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334268
Yutian Yang, Jinjiang Tu, Wenbo Shen, Songbo Zhu, Rui Chang, Yajin Zhou
Nowadays, code reuse attacks impose a substantial threat to the security of operating system kernels. Control-flow graph-based CFI techniques, while effective, bring considerable performance overhead, thus limiting their practical adoption in real-world products. As an alternative approach, recent research suggests safeguarding the integrity of sensitive pointers as a countermeasure against manipulation attempts. Unfortunately, existing pointer integrity protection schemes only protect sensitive pointers partially and ignore assembly code, leaving protection gaps. To fill up these protection gaps, we propose a novel security concept named full life-cycle integrity, which enforces the integrity of a sensitive pointer at every step on its value flow chain. To realize full life-cycle integrity, we propose three novel techniques, including assembly-aware sensitivity for analyzing assembly code, Merkle PAC tree for protecting interrupt context securely and efficiently, and pointer-grained authentication for defeating spatial substitution attacks. We have developed a practical implementation of comprehensive life-cycle integrity for the Linux kernel, called ”kernel Code Pointer Authentication” (kCPA), which leverages the ARM Pointer Authentication (PAuth) mechanism. This implementation has been extended to the Apple M1 architecture for real-world evaluation on PAuth hardware. Our assessment demonstrates that kCPA effectively mitigates a range of real-world attacks while incurring a minimal 2.5% performance overhead for the Phoronix Test Suite and nearly negligible performance impact for SPEC2017 benchmarks.
如今,代码重用攻击对操作系统内核的安全性构成了巨大威胁。基于控制流图的 CFI 技术虽然有效,但却带来了相当大的性能开销,因此限制了其在实际产品中的应用。作为一种替代方法,最近的研究建议保护敏感指针的完整性,以此作为防范操纵企图的对策。遗憾的是,现有的指针完整性保护方案只能部分保护敏感指针,而忽略了汇编代码,从而留下了保护空白。为了填补这些保护空白,我们提出了一种名为全生命周期完整性的新型安全概念,它能在敏感指针价值链的每一步都确保指针的完整性。为了实现全生命周期完整性,我们提出了三种新技术,包括用于分析汇编代码的汇编感知灵敏度、用于安全高效地保护中断上下文的 Merkle PAC 树,以及用于击败空间置换攻击的指针粒度验证。我们利用 ARM 指针验证(PAuth)机制,为 Linux 内核开发了一种全面生命周期完整性的实用实现,称为 "内核代码指针验证"(kCPA)。该实现已扩展到苹果 M1 架构,以便在 PAuth 硬件上进行实际评估。我们的评估结果表明,kCPA 能有效缓解现实世界中的各种攻击,同时对 Phoronix 测试套件的性能开销仅为 2.5%,对 SPEC2017 基准的性能影响几乎可以忽略不计。
{"title":"kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels","authors":"Yutian Yang, Jinjiang Tu, Wenbo Shen, Songbo Zhu, Rui Chang, Yajin Zhou","doi":"10.1109/TDSC.2023.3334268","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334268","url":null,"abstract":"Nowadays, code reuse attacks impose a substantial threat to the security of operating system kernels. Control-flow graph-based CFI techniques, while effective, bring considerable performance overhead, thus limiting their practical adoption in real-world products. As an alternative approach, recent research suggests safeguarding the integrity of sensitive pointers as a countermeasure against manipulation attempts. Unfortunately, existing pointer integrity protection schemes only protect sensitive pointers partially and ignore assembly code, leaving protection gaps. To fill up these protection gaps, we propose a novel security concept named full life-cycle integrity, which enforces the integrity of a sensitive pointer at every step on its value flow chain. To realize full life-cycle integrity, we propose three novel techniques, including assembly-aware sensitivity for analyzing assembly code, Merkle PAC tree for protecting interrupt context securely and efficiently, and pointer-grained authentication for defeating spatial substitution attacks. We have developed a practical implementation of comprehensive life-cycle integrity for the Linux kernel, called ”kernel Code Pointer Authentication” (kCPA), which leverages the ARM Pointer Authentication (PAuth) mechanism. This implementation has been extended to the Apple M1 architecture for real-world evaluation on PAuth hardware. Our assessment demonstrates that kCPA effectively mitigates a range of real-world attacks while incurring a minimal 2.5% performance overhead for the Phoronix Test Suite and nearly negligible performance impact for SPEC2017 benchmarks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141701084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs vCNN:基于 zk-SNARKs 的可验证卷积神经网络
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3348760
Seunghwan Lee, Hankyung Ko, Jihye Kim, Hyunok Oh
It is becoming important for the client to be able to check whether the AI inference services have been correctly calculated. Since the weight values in a CNN model are assets of service providers, the client should be able to check the correctness of the result without them. The Zero-knowledge Succinct Non-interactive Argument of Knowledge (zk-SNARK) allows verifying the result without input and weight values. However, the proving time in zk-SNARK is too slow to be applied to real AI applications. This article proposes a new efficient verifiable convolutional neural network (vCNN) framework that greatly accelerates the proving performance. We introduce a new efficient relation representation for convolution equations, reducing the proving complexity of convolution from O(ln) to O(l+n) compared to existing zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK) approaches, where l and n denote the size of the kernel and the data in CNNs. Experimental results show that the proposed vCNN improves proving performance by 20-fold for a simple MNIST and 18,000-fold for VGG16. The security of the proposed scheme is formally proven.
对于客户来说,检查人工智能推理服务的计算是否正确变得越来越重要。由于 CNN 模型中的权重值是服务提供商的资产,因此客户应该能够在没有权重值的情况下检查结果的正确性。零知识简洁非交互式知识论证(zk-SNARK)允许在没有输入和权重值的情况下验证结果。然而,zk-SNARK 的证明时间太慢,无法应用于实际的人工智能应用。本文提出了一种新的高效可验证卷积神经网络(vCNN)框架,大大加快了证明性能。与现有的零知识简洁非交互式知识论证(zk-SNARK)方法相比,我们为卷积方程引入了一种新的高效关系表示法,将卷积的证明复杂度从 O(ln) 降低到 O(l+n),其中 l 和 n 分别表示 CNN 中内核和数据的大小。实验结果表明,对于简单的 MNIST,所提出的 vCNN 将证明性能提高了 20 倍,对于 VGG16 则提高了 18000 倍。拟议方案的安全性已得到正式证明。
{"title":"vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs","authors":"Seunghwan Lee, Hankyung Ko, Jihye Kim, Hyunok Oh","doi":"10.1109/TDSC.2023.3348760","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3348760","url":null,"abstract":"It is becoming important for the client to be able to check whether the AI inference services have been correctly calculated. Since the weight values in a CNN model are assets of service providers, the client should be able to check the correctness of the result without them. The Zero-knowledge Succinct Non-interactive Argument of Knowledge (zk-SNARK) allows verifying the result without input and weight values. However, the proving time in zk-SNARK is too slow to be applied to real AI applications. This article proposes a new efficient verifiable convolutional neural network (vCNN) framework that greatly accelerates the proving performance. We introduce a new efficient relation representation for convolution equations, reducing the proving complexity of convolution from O(ln) to O(l+n) compared to existing zero-knowledge succinct non-interactive argument of knowledge (zk-SNARK) approaches, where l and n denote the size of the kernel and the data in CNNs. Experimental results show that the proposed vCNN improves proving performance by 20-fold for a simple MNIST and 18,000-fold for VGG16. The security of the proposed scheme is formally proven.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141702506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Deep Hashing Based Cancelable Multi-Biometric Template Protection 基于深度散列的可取消多重生物特征模板保护
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335961
Guichuan Zhao, Qi Jiang, Ding Wang, Xindi Ma, Xinghua Li
The increasing use of multi-biometric authentication has raised concerns about the security of biometric templates. Many template protection methods based on convolutional neural network have been presented, but most involve a trade-off between authentication accuracy and template security. In this paper, we present a cancelable multi-biometric template protection scheme that combines deep hashing with cancelable distance-preserving encryption (CDPE), which provides high template security without degrading the authentication performance. Specifically, a deep hashing based architecture that minimizes the quantization loss is designed to map face and iris traits to binary codes. Next, CDPE is proposed to generate a protected template given the face binary code and a user-specific key obtained from the iris binary code, which preserves the distance between original templates in the protected domain to ensure authentication performance equivalent to unprotected systems. Digital lockers instead of the key are stored to further enhance the security, which can be unlocked with genuine biometric traits to get the correct key during authentication. Theoretical and experimental results on real face and iris datasets show that our scheme can achieve equal error rate of 0.23% and genuine accept rate of 97.54%, while guaranteeing irreversibility, revocability and unlinkability of protected templates.
越来越多地使用多种生物识别技术进行身份验证,这引起了人们对生物识别模板安全性的关注。目前已经提出了许多基于卷积神经网络的模板保护方法,但大多数方法都需要在认证准确性和模板安全性之间做出权衡。在本文中,我们提出了一种可取消的多生物特征模板保护方案,它将深度散列与可取消的保距离加密(CDPE)相结合,在不降低身份验证性能的情况下提供了很高的模板安全性。具体来说,设计了一种基于深度散列的架构,可最大限度地减少量化损失,从而将人脸和虹膜特征映射为二进制代码。接下来,CDPE 被提出来生成一个受保护的模板,该模板给定了人脸二进制代码和从虹膜二进制代码中获得的用户特定密钥,它保留了受保护域中原始模板之间的距离,以确保认证性能与未受保护的系统相当。为了进一步提高安全性,还存储了代替密钥的数字锁,在验证过程中可以通过真正的生物特征解锁,从而获得正确的密钥。在真实人脸和虹膜数据集上的理论和实验结果表明,我们的方案可以实现 0.23% 的等效错误率和 97.54% 的真实接受率,同时保证受保护模板的不可逆转性、可撤销性和不可链接性。
{"title":"Deep Hashing Based Cancelable Multi-Biometric Template Protection","authors":"Guichuan Zhao, Qi Jiang, Ding Wang, Xindi Ma, Xinghua Li","doi":"10.1109/TDSC.2023.3335961","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335961","url":null,"abstract":"The increasing use of multi-biometric authentication has raised concerns about the security of biometric templates. Many template protection methods based on convolutional neural network have been presented, but most involve a trade-off between authentication accuracy and template security. In this paper, we present a cancelable multi-biometric template protection scheme that combines deep hashing with cancelable distance-preserving encryption (CDPE), which provides high template security without degrading the authentication performance. Specifically, a deep hashing based architecture that minimizes the quantization loss is designed to map face and iris traits to binary codes. Next, CDPE is proposed to generate a protected template given the face binary code and a user-specific key obtained from the iris binary code, which preserves the distance between original templates in the protected domain to ensure authentication performance equivalent to unprotected systems. Digital lockers instead of the key are stored to further enhance the security, which can be unlocked with genuine biometric traits to get the correct key during authentication. Theoretical and experimental results on real face and iris datasets show that our scheme can achieve equal error rate of 0.23% and genuine accept rate of 97.54%, while guaranteeing irreversibility, revocability and unlinkability of protected templates.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141700436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis AAS: 用于深度图像隐写分析的自动虚拟数据扩增技术
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3333913
Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Neng H. Yu
In recent years, steganalysis based on deep learning has evolved rapidly. However, training deep learning models is data-consuming. The models are prone to overfitting when data is limited. Data augmentation is an effective method to mitigate overfitting. Existing data augmentation methods in steganalysis can be categorized into cover enrichment and virtual augmentation. They are used in different stages. Cover enrichment refers to introducing additional cover-stego pairs in some ways, which is performed prior to training. In contrast, virtual augmentation augments data during training. Existing virtual augmentation methods are designed heuristically and rely on expert knowledge. In this paper, we propose the first automatic virtual data augmentation method for steganalysis. Specifically, we design an augmentation network that augments cover and stego images by intelligently adding noises. The augmentation network is trained adversarially with the steganalyzer to generate diverse data. Meanwhile, a “class-invariant” module prevents the augmentation network from changing the original data distribution too much. A “stabilizer” loss function is designed that keeps the adversarial training stable by constraining the number of noises. The experimental results show that the proposed method outperforms existing virtual augmentation methods. Moreover, combining the proposed method and cover enrichment can further boost performance.
近年来,基于深度学习的隐写分析发展迅速。然而,训练深度学习模型需要消耗大量数据。当数据有限时,模型容易出现过拟合。数据增强是缓解过拟合的有效方法。隐写分析中现有的数据增强方法可分为封面增强和虚拟增强。它们用于不同的阶段。封面丰富指的是以某种方式引入额外的封面-目标对,在训练之前进行。而虚拟增强则是在训练过程中增强数据。现有的虚拟增强方法是启发式设计的,依赖于专家知识。在本文中,我们提出了第一种用于隐写分析的自动虚拟数据增强方法。具体来说,我们设计了一个增强网络,通过智能添加噪声来增强覆盖和隐秘图像。增强网络通过与隐分析仪进行对抗训练来生成多样化的数据。同时,一个 "类不变 "模块可以防止增强网络过多地改变原始数据的分布。设计了一个 "稳定器 "损失函数,通过限制噪声的数量来保持对抗训练的稳定。实验结果表明,所提出的方法优于现有的虚拟增强方法。此外,将提出的方法与覆盖增强相结合,还能进一步提高性能。
{"title":"AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis","authors":"Jiansong Zhang, Kejiang Chen, Chuan Qin, Weiming Zhang, Neng H. Yu","doi":"10.1109/TDSC.2023.3333913","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3333913","url":null,"abstract":"In recent years, steganalysis based on deep learning has evolved rapidly. However, training deep learning models is data-consuming. The models are prone to overfitting when data is limited. Data augmentation is an effective method to mitigate overfitting. Existing data augmentation methods in steganalysis can be categorized into cover enrichment and virtual augmentation. They are used in different stages. Cover enrichment refers to introducing additional cover-stego pairs in some ways, which is performed prior to training. In contrast, virtual augmentation augments data during training. Existing virtual augmentation methods are designed heuristically and rely on expert knowledge. In this paper, we propose the first automatic virtual data augmentation method for steganalysis. Specifically, we design an augmentation network that augments cover and stego images by intelligently adding noises. The augmentation network is trained adversarially with the steganalyzer to generate diverse data. Meanwhile, a “class-invariant” module prevents the augmentation network from changing the original data distribution too much. A “stabilizer” loss function is designed that keeps the adversarial training stable by constraining the number of noises. The experimental results show that the proposed method outperforms existing virtual augmentation methods. Moreover, combining the proposed method and cover enrichment can further boost performance.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Minded Verification of Cooperative Awareness Messages 合作意识信息的安全验证
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/tdsc.2023.3345543
M. Farrell, Matthew Bradbury, Rafael C. Cardoso, Michael Fisher, Louise A. Dennis, Clare Dixon, A. Sheik, Hu Yuan, Carsten Maple
Autonomous robotic systems systems are both safety- and security-critical, since a breach in system security may impact safety. In such critical systems, formal verification is used to model the system and verify that it obeys specific functional and safety properties. Independently, threat modeling is used to analyse and manage the cyber security threats that such systems may encounter. Both verification and threat analysis serve the purpose of ensuring that the system will be reliable, albeit from differing perspectives. In prior work, we argued that these analyses should be used to inform one another and, in this paper, we extend our previously defined methodology for security-minded verification by incorporating runtime verification. To illustrate our approach, we analyse an algorithm for sending Cooperative Awareness Messages between autonomous vehicles. Our analysis centres on identifying STRIDE security threats. We show how these can be formalised, and subsequently verified, using a combination of formal tools for static aspects, namely Promela/SPIN and Dafny, and generate runtime monitors for dynamic verification. Our approach allows us to focus our verification effort on those security properties that are particularly important and to consider safety and security in tandem, both statically and at runtime.
自主机器人系统既是安全关键型系统,也是安保关键型系统,因为系统安保漏洞可能会影响安全性。在这类关键系统中,形式化验证用于对系统进行建模,并验证其是否符合特定的功能和安全属性。威胁建模则用于分析和管理此类系统可能遇到的网络安全威胁。验证和威胁分析的目的都是确保系统的可靠性,尽管两者的角度不同。在之前的工作中,我们认为这些分析应相互借鉴,而在本文中,我们将运行时验证纳入其中,从而扩展了之前定义的安全验证方法。为了说明我们的方法,我们分析了自动驾驶车辆之间发送合作认知信息的算法。我们的分析以识别 STRIDE 安全威胁为中心。我们展示了如何将这些威胁形式化,并在随后使用形式化工具(即 Promela/SPIN 和 Dafny)进行静态验证,以及如何生成运行时监控器进行动态验证。我们的方法使我们能够将验证工作集中在那些特别重要的安全属性上,并在静态和运行时同步考虑安全性和保安性。
{"title":"Security-Minded Verification of Cooperative Awareness Messages","authors":"M. Farrell, Matthew Bradbury, Rafael C. Cardoso, Michael Fisher, Louise A. Dennis, Clare Dixon, A. Sheik, Hu Yuan, Carsten Maple","doi":"10.1109/tdsc.2023.3345543","DOIUrl":"https://doi.org/10.1109/tdsc.2023.3345543","url":null,"abstract":"Autonomous robotic systems systems are both safety- and security-critical, since a breach in system security may impact safety. In such critical systems, formal verification is used to model the system and verify that it obeys specific functional and safety properties. Independently, threat modeling is used to analyse and manage the cyber security threats that such systems may encounter. Both verification and threat analysis serve the purpose of ensuring that the system will be reliable, albeit from differing perspectives. In prior work, we argued that these analyses should be used to inform one another and, in this paper, we extend our previously defined methodology for security-minded verification by incorporating runtime verification. To illustrate our approach, we analyse an algorithm for sending Cooperative Awareness Messages between autonomous vehicles. Our analysis centres on identifying STRIDE security threats. We show how these can be formalised, and subsequently verified, using a combination of formal tools for static aspects, namely Promela/SPIN and Dafny, and generate runtime monitors for dynamic verification. Our approach allows us to focus our verification effort on those security properties that are particularly important and to consider safety and security in tandem, both statically and at runtime.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing 在空间众包中实现高效且保护隐私的基于位置的任务推荐
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3342239
Fuyuan Song, Jinwen Liang, Chuan Zhang, Zhangjie Fu, Zhen Qin, Song Guo
In spatial crowdsourcing, location-based task recommendation schemes are widely used to match appropriate workers in desired geographic areas with relevant tasks from data requesters. To ensure data confidentiality, various privacy-preserving location-based task recommendation schemes have been proposed, as cloud servers behave semi-honestly. However, existing schemes reveal access patterns, and the dimension of the geographic query increases significantly when additional information beyond locations is used to filter appropriate workers. To address the above challenges, this article proposes two efficient and privacy-preserving location-based task recommendation (EPTR) schemes that support high-dimensional queries and access pattern privacy protection. First, we propose a basic EPTR scheme (EPTR-I) that utilizes randomizable matrix multiplication and public position intersection test (PPIT) to achieve linear search complexity and full access pattern privacy protection. Then, we explore the trade-off between efficiency and security and develop a tree-based EPTR scheme (EPTR-II) to achieve sub-linear search complexity. Security analysis demonstrates that both schemes protect the confidentiality of worker locations, requester queries, and query results and achieve different security properties on access pattern assurance. Extensive performance evaluation shows that both EPTR schemes are efficient in terms of computational cost, with EPTR-II being $10^{3}times$103× faster than the state-of-the-art scheme in task recommendation.
在空间众包中,基于位置的任务推荐方案被广泛用于匹配所需地理区域内的合适工作人员和数据请求者的相关任务。为了确保数据的保密性,人们提出了各种保护隐私的基于位置的任务推荐方案,因为云服务器的行为是半诚实的。但是,现有方案会暴露访问模式,而且如果使用位置以外的其他信息来筛选合适的工作人员,地理查询的维度就会大大增加。为应对上述挑战,本文提出了两种高效且保护隐私的基于位置的任务推荐(EPTR)方案,支持高维查询和访问模式隐私保护。首先,我们提出了一种基本的 EPTR 方案(EPTR-I),它利用可随机化矩阵乘法和公共位置交叉测试(PPIT)来实现线性搜索复杂度和完全的访问模式隐私保护。然后,我们探讨了效率和安全性之间的权衡,并开发了一种基于树的 EPTR 方案(EPTR-II),以实现亚线性搜索复杂度。安全分析表明,这两种方案都能保护工人位置、请求者查询和查询结果的机密性,并在访问模式保证方面实现了不同的安全属性。广泛的性能评估表明,两种EPTR方案在计算成本方面都很高效,其中EPTR-II在任务推荐方面比最先进的方案快10^{3}倍。
{"title":"Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing","authors":"Fuyuan Song, Jinwen Liang, Chuan Zhang, Zhangjie Fu, Zhen Qin, Song Guo","doi":"10.1109/TDSC.2023.3342239","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3342239","url":null,"abstract":"In spatial crowdsourcing, location-based task recommendation schemes are widely used to match appropriate workers in desired geographic areas with relevant tasks from data requesters. To ensure data confidentiality, various privacy-preserving location-based task recommendation schemes have been proposed, as cloud servers behave semi-honestly. However, existing schemes reveal access patterns, and the dimension of the geographic query increases significantly when additional information beyond locations is used to filter appropriate workers. To address the above challenges, this article proposes two efficient and privacy-preserving location-based task recommendation (EPTR) schemes that support high-dimensional queries and access pattern privacy protection. First, we propose a basic EPTR scheme (EPTR-I) that utilizes randomizable matrix multiplication and public position intersection test (PPIT) to achieve linear search complexity and full access pattern privacy protection. Then, we explore the trade-off between efficiency and security and develop a tree-based EPTR scheme (EPTR-II) to achieve sub-linear search complexity. Security analysis demonstrates that both schemes protect the confidentiality of worker locations, requester queries, and query results and achieve different security properties on access pattern assurance. Extensive performance evaluation shows that both EPTR schemes are efficient in terms of computational cost, with EPTR-II being <inline-formula><tex-math notation=\"LaTeX\">$10^{3}times$</tex-math><alternatives><mml:math><mml:mrow><mml:msup><mml:mn>10</mml:mn><mml:mn>3</mml:mn></mml:msup><mml:mo>×</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"liang-ieq1-3342239.gif\"/></alternatives></inline-formula> faster than the state-of-the-art scheme in task recommendation.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1