首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
${{sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services ${{sf PEBA}}$:增强用户隐私和安全浏览服务的覆盖范围
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3204767
Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang
To keep web users away from unsafe websites, modern web browsers enable the embedded feature of safe browsing (SB) by default. In this work, through theoretical analysis and empirical evidence, we reveal two major shortcomings in the current SB infrastructure. First, we derive a feasible tracking technique for industry best practice. We show that the current mitigation techniques cannot eliminate the threat of de-anonymization permanently. Second, we gauge the effectiveness of blacklists provided by major vendors. Our discovery indicates the urge for blacklist integration in order to boost service quality. In light of this, we propose a new three-party paradigm ${{sf PEBA}}$PEBA with an intermediate third party decoupling the direct interaction of users and proprietary blacklist vendors. To satisfy practical usage requirements, we instantiate our design with trusted hardware, detailing how it can be leveraged to fulfill the requirements of privacy enhancement and broader content coverage at the same time. We also tackle numerous implementation challenges that emerged from this proxy-based and hardware-enabled solution. Extensive evaluation confirms that ${{sf PEBA}}$PEBA can balance well among desirable goals of security, usability, performance, and elasticity, making it suitable for deployment in practice.
为了让网页用户远离不安全的网站,现代网页浏览器默认启用了内置的安全浏览功能。在这项工作中,通过理论分析和实证证据,我们揭示了当前SB基础设施的两个主要缺陷。首先,我们推导出一种可行的行业最佳实践跟踪技术。我们表明,目前的缓解技术不能永久消除去匿名化的威胁。其次,我们评估了主要供应商提供的黑名单的有效性。我们的发现表明,为了提高服务质量,迫切需要黑名单整合。鉴于此,我们提出了一种新的三方范式${{sf PEBA}}$PEBA,它具有中间第三方,将用户和专有黑名单供应商的直接交互解耦。为了满足实际使用需求,我们用可信硬件实例化了我们的设计,详细说明了如何利用它来同时满足隐私增强和更广泛的内容覆盖的需求。我们还解决了这个基于代理和支持硬件的解决方案中出现的许多实现挑战。广泛的评估证实${{sf PEBA}}$PEBA可以很好地平衡安全性、可用性、性能和弹性的理想目标,使其适合在实践中部署。
{"title":"${{sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services","authors":"Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang","doi":"10.1109/TDSC.2022.3204767","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3204767","url":null,"abstract":"To keep web users away from unsafe websites, modern web browsers enable the embedded feature of safe browsing (SB) by default. In this work, through theoretical analysis and empirical evidence, we reveal two major shortcomings in the current SB infrastructure. First, we derive a feasible tracking technique for industry best practice. We show that the current mitigation techniques cannot eliminate the threat of de-anonymization permanently. Second, we gauge the effectiveness of blacklists provided by major vendors. Our discovery indicates the urge for blacklist integration in order to boost service quality. In light of this, we propose a new three-party paradigm <inline-formula><tex-math notation=\"LaTeX\">${{sf PEBA}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">PEBA</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq2-3204767.gif\"/></alternatives></inline-formula> with an intermediate third party decoupling the direct interaction of users and proprietary blacklist vendors. To satisfy practical usage requirements, we instantiate our design with trusted hardware, detailing how it can be leveraged to fulfill the requirements of privacy enhancement and broader content coverage at the same time. We also tackle numerous implementation challenges that emerged from this proxy-based and hardware-enabled solution. Extensive evaluation confirms that <inline-formula><tex-math notation=\"LaTeX\">${{sf PEBA}}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">PEBA</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq3-3204767.gif\"/></alternatives></inline-formula> can balance well among desirable goals of security, usability, performance, and elasticity, making it suitable for deployment in practice.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4343-4358"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46092865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Threat Model for Smart Systems 智能系统的混合威胁模型
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3213577
Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu
Cyber-physical systems and their smart components have a pervasive presence in all our daily activities. Unfortunately, identifying the potential threats and issues in these systems and selecting enough protection is challenging given that such environments combine human, physical and cyber aspects to the system design and implementation. Current threat models and analysis do not take into consideration all three aspects of the analyzed system, how they can introduce new vulnerabilities or protection measures to each other. In this work, we introduce a novel threat model for cyber-physical systems that combines the cyber, physical, and human aspects. Our model represents the system's components relations and security properties by taking into consideration these three aspects. Together with the threat model we also propose a threat analysis method that allows understanding the security state of the system's components. The threat model and the threat analysis have been implemented into an automatic tool, called TAMELESS, that automatically analyzes threats to the system, verifies its security properties, and generates a graphical representation, useful for security architects to identify the proper prevention/mitigation solutions. We show and prove the use of our threat model and analysis with three cases studies from different sectors.
网络物理系统及其智能组件在我们的日常活动中无处不在。不幸的是,鉴于这些环境将人类、物理和网络方面与系统设计和实施相结合,识别这些系统中的潜在威胁和问题并选择足够的保护是具有挑战性的。当前的威胁模型和分析没有考虑被分析系统的所有三个方面,即它们如何相互引入新的漏洞或保护措施。在这项工作中,我们介绍了一种新的网络物理系统威胁模型,该模型结合了网络、物理和人类方面。我们的模型通过考虑这三个方面来表示系统的组件关系和安全属性。与威胁模型一起,我们还提出了一种威胁分析方法,可以了解系统组件的安全状态。威胁模型和威胁分析已被实现到一个名为TAELESS的自动工具中,该工具可自动分析系统面临的威胁,验证其安全属性,并生成图形表示,有助于安全架构师确定适当的预防/缓解解决方案。我们通过来自不同部门的三个案例研究展示并证明了我们的威胁模型和分析的使用。
{"title":"A Hybrid Threat Model for Smart Systems","authors":"Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu","doi":"10.1109/TDSC.2022.3213577","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3213577","url":null,"abstract":"Cyber-physical systems and their smart components have a pervasive presence in all our daily activities. Unfortunately, identifying the potential threats and issues in these systems and selecting enough protection is challenging given that such environments combine human, physical and cyber aspects to the system design and implementation. Current threat models and analysis do not take into consideration all three aspects of the analyzed system, how they can introduce new vulnerabilities or protection measures to each other. In this work, we introduce a novel threat model for cyber-physical systems that combines the cyber, physical, and human aspects. Our model represents the system's components relations and security properties by taking into consideration these three aspects. Together with the threat model we also propose a threat analysis method that allows understanding the security state of the system's components. The threat model and the threat analysis have been implemented into an automatic tool, called TAMELESS, that automatically analyzes threats to the system, verifies its security properties, and generates a graphical representation, useful for security architects to identify the proper prevention/mitigation solutions. We show and prove the use of our threat model and analysis with three cases studies from different sectors.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4403-4417"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42513335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing Go-Sharing:一个基于区块链的跨社交网络照片共享隐私保护框架
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3208934
Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng
The evolution of social media has led to a trend of posting daily photos on online Social Network Platforms (SNPs). The privacy of online photos is often protected carefully by security mechanisms. However, these mechanisms will lose effectiveness when someone spreads the photos to other platforms. In this article, we propose Go-sharing, a blockchain-based privacy-preserving framework that provides powerful dissemination control for cross-SNP photo sharing. In contrast to security mechanisms running separately in centralized servers that do not trust each other, our framework achieves consistent consensus on photo dissemination control through carefully designed smart contract-based protocols. We use these protocols to create platform-free dissemination trees for every image, providing users with complete sharing control and privacy protection. Considering the possible privacy conflicts between owners and subsequent re-posters in cross-SNP sharing, we design a dynamic privacy policy generation algorithm that maximizes the flexibility of re-posters without violating formers’ privacy. Moreover, Go-sharing also provides robust photo ownership identification mechanisms to avoid illegal reprinting. It introduces a random noise black box in a two-stage separable deep learning process to improve robustness against unpredictable manipulations. Through extensive real-world simulations, the results demonstrate the capability and effectiveness of the framework across a number of performance metrics.
社交媒体的发展导致了在在线社交网络平台(SNPs)上发布每日照片的趋势。网络照片的隐私通常受到安全机制的严密保护。然而,当有人将这些照片传播到其他平台时,这些机制就会失去效力。在本文中,我们提出了Go-sharing,这是一个基于区块链的隐私保护框架,为跨snp照片共享提供强大的传播控制。与在互不信任的中心化服务器中单独运行的安全机制相比,我们的框架通过精心设计的基于智能合约的协议,在照片传播控制方面达成一致的共识。我们使用这些协议为每张图片创建无平台的传播树,为用户提供完整的共享控制和隐私保护。考虑到在跨snp共享中所有者和后续发布者之间可能存在的隐私冲突,我们设计了一种动态隐私策略生成算法,使发布者的灵活性最大化,同时不侵犯发布者的隐私。此外,Go-sharing还提供了强大的照片所有权识别机制,以避免非法转载。它在两阶段可分离深度学习过程中引入随机噪声黑盒,以提高对不可预测操作的鲁棒性。通过广泛的真实世界模拟,结果证明了该框架在许多性能指标上的能力和有效性。
{"title":"Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing","authors":"Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng","doi":"10.1109/TDSC.2022.3208934","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3208934","url":null,"abstract":"The evolution of social media has led to a trend of posting daily photos on online Social Network Platforms (SNPs). The privacy of online photos is often protected carefully by security mechanisms. However, these mechanisms will lose effectiveness when someone spreads the photos to other platforms. In this article, we propose Go-sharing, a blockchain-based privacy-preserving framework that provides powerful dissemination control for cross-SNP photo sharing. In contrast to security mechanisms running separately in centralized servers that do not trust each other, our framework achieves consistent consensus on photo dissemination control through carefully designed smart contract-based protocols. We use these protocols to create platform-free dissemination trees for every image, providing users with complete sharing control and privacy protection. Considering the possible privacy conflicts between owners and subsequent re-posters in cross-SNP sharing, we design a dynamic privacy policy generation algorithm that maximizes the flexibility of re-posters without violating formers’ privacy. Moreover, Go-sharing also provides robust photo ownership identification mechanisms to avoid illegal reprinting. It introduces a random noise black box in a two-stage separable deep learning process to improve robustness against unpredictable manipulations. Through extensive real-world simulations, the results demonstrate the capability and effectiveness of the framework across a number of performance metrics.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3572-3587"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42128743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved Protocols for Distributed Secret Sharing 分布式秘密共享的改进协议
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3213790
R. De Prisco, Alfredo De Santis, F. Palmieri
In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nodes of a network. Each involved party has access to a subset of the nodes and thus to a subset of the shares and is able to reconstruct a specific secret. Usually, these schemes are evaluated by measuring the required storage overhead, as well as the encoding and decoding complexities. In this paper, we provide new Distributed (multi) Secret Sharing Protocols for $(k,n)$(k,n)-threshold access structures that improve on previous results, characterized by nearly-optimal storage overhead, achieving both storage optimality and a better encoding/decoding complexity. The protocols are also simpler than previous ones and allow for easier encoding.
在分布式秘密共享方案中,秘密是用分布在网络多个节点上的共享进行编码的。每个相关方都可以访问节点的子集,从而访问共享的子集,并且能够重建特定的秘密。通常,通过测量所需的存储开销以及编码和解码的复杂性来评估这些方案。在本文中,我们为$(k,n)$(k、n)阈值访问结构提供了新的分布式(多)秘密共享协议,该协议改进了先前的结果,其特征是几乎最优的存储开销,实现了存储优化和更好的编码/解码复杂度。这些协议也比以前的协议更简单,并且允许更容易的编码。
{"title":"Improved Protocols for Distributed Secret Sharing","authors":"R. De Prisco, Alfredo De Santis, F. Palmieri","doi":"10.1109/TDSC.2022.3213790","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3213790","url":null,"abstract":"In Distributed Secret Sharing schemes, secrets are encoded with shares distributed over multiple nodes of a network. Each involved party has access to a subset of the nodes and thus to a subset of the shares and is able to reconstruct a specific secret. Usually, these schemes are evaluated by measuring the required storage overhead, as well as the encoding and decoding complexities. In this paper, we provide new Distributed (multi) Secret Sharing Protocols for <inline-formula><tex-math notation=\"LaTeX\">$(k,n)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>k</mml:mi><mml:mo>,</mml:mo><mml:mi>n</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"palmieri-ieq1-3213790.gif\"/></alternatives></inline-formula>-threshold access structures that improve on previous results, characterized by nearly-optimal storage overhead, achieving both storage optimality and a better encoding/decoding complexity. The protocols are also simpler than previous ones and allow for easier encoding.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3558-3571"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43094962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data PRkNN:加密数据上高效且隐私保护的反向kNN查询
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3211870
Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu
The advance of cloud computing has driven an emerging trend of outsourcing the rapidly growing data and query services to a powerful cloud for easing the local storage and computing pressure. Meanwhile, when taking data privacy into account, data are usually outsourced to the cloud in an encrypted form. As a result, query services have to be performed over the encrypted data. Among all kinds of query services, the reverse kNN query is highly popular in various applications, such as taxi dispatching and targeted push of multimedia information, but its privacy has not received sufficient attention. To our best knowledge, many existing privacy-preserving reverse kNN query schemes still have some limitations on the query result accuracy, dataset privacy, and flexible support for the choice of the query object and the parameter k. Aiming at addressing these limitations, in this paper, we propose an efficient and privacy-preserving reverse kNN query scheme over encrypted data, named PRkNN. Specifically, we first design a modified M-tree (MM-tree) to index the dataset and further present an MM-Tree based reverse kNN query algorithm in the filter and refinement framework. Then, we leverage the lightweight matrix encryption to carefully design a filter predicate encryption scheme (FPE) and a refinement predicate encryption scheme (RPE); and propose our PRkNN scheme by applying them to protect the privacy of the MM-Tree based reverse kNN query algorithm. Detailed security analysis shows that FPE and RPE schemes are selectively secure, and our PRkNN scheme can preserve both query privacy and dataset privacy. In addition, we conduct extensive experiments to evaluate the performance of our scheme, and the results demonstrate that our scheme is efficient.
云计算的发展推动了将快速增长的数据和查询服务外包给强大的云的新兴趋势,以缓解本地存储和计算的压力。同时,考虑到数据隐私,数据通常以加密的形式外包给云。因此,必须对加密的数据执行查询服务。在各种查询服务中,反向kNN查询在出租车调度、多媒体信息定向推送等各种应用中都得到了广泛的应用,但其私密性却没有得到足够的重视。现有的许多保护隐私的反向kNN查询方案在查询结果的准确性、数据集的保密性以及对查询对象和参数k选择的灵活支持等方面仍然存在一定的局限性。针对这些局限性,本文提出了一种高效且保护隐私的加密数据反向kNN查询方案,命名为PRkNN。具体而言,我们首先设计了一种改进的m树(MM-tree)来索引数据集,并在过滤和细化框架中提出了一种基于MM-tree的反向kNN查询算法。然后,我们利用轻量级矩阵加密,精心设计了过滤谓词加密方案(FPE)和细化谓词加密方案(RPE);并将它们应用于基于MM-Tree的反向kNN查询算法的隐私保护,提出了我们的PRkNN方案。详细的安全性分析表明,FPE和RPE方案具有选择性的安全性,PRkNN方案可以同时保护查询隐私和数据集隐私。此外,我们进行了大量的实验来评估我们的方案的性能,结果表明我们的方案是有效的。
{"title":"PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data","authors":"Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu","doi":"10.1109/TDSC.2022.3211870","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3211870","url":null,"abstract":"The advance of cloud computing has driven an emerging trend of outsourcing the rapidly growing data and query services to a powerful cloud for easing the local storage and computing pressure. Meanwhile, when taking data privacy into account, data are usually outsourced to the cloud in an encrypted form. As a result, query services have to be performed over the encrypted data. Among all kinds of query services, the reverse kNN query is highly popular in various applications, such as taxi dispatching and targeted push of multimedia information, but its privacy has not received sufficient attention. To our best knowledge, many existing privacy-preserving reverse kNN query schemes still have some limitations on the query result accuracy, dataset privacy, and flexible support for the choice of the query object and the parameter k. Aiming at addressing these limitations, in this paper, we propose an efficient and privacy-preserving reverse kNN query scheme over encrypted data, named PRkNN. Specifically, we first design a modified M-tree (MM-tree) to index the dataset and further present an MM-Tree based reverse kNN query algorithm in the filter and refinement framework. Then, we leverage the lightweight matrix encryption to carefully design a filter predicate encryption scheme (FPE) and a refinement predicate encryption scheme (RPE); and propose our PRkNN scheme by applying them to protect the privacy of the MM-Tree based reverse kNN query algorithm. Detailed security analysis shows that FPE and RPE schemes are selectively secure, and our PRkNN scheme can preserve both query privacy and dataset privacy. In addition, we conduct extensive experiments to evaluate the performance of our scheme, and the results demonstrate that our scheme is efficient.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4387-4402"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42789942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace 互联网规模的指纹识别:网络空间中物联网设备的再利用和重塑
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3223103
Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun
Fingerprinting Internet-of-Things(IoT) devices on types and brands is a necessary work for security analysis in the cyberspace. The existing approaches mainly rely on the dominant features of devices which is response to information in order to identify these online devices. However, the web server components reusing and products rebranding are the common phenomenons of these embedded IoT devices. It caused the existing approaches difficult to identify most devices even errors due to the similar responses. In this paper, we present an approach, IoTXray, which improves the work efficiently of information collection about accelerating the relations between reusing/rebranding devices with the corresponding manufacturers. And these relations can generate more accurate and reliable fingerprints than previous approaches. Using the mixed neural networks, IoTXray comprehensively detects the real manufactures of online IoT devices upon three different kinds of data sources. In the experiment, our approach can identify 7,025,854 IoT devices on HTTP-hosts. The identification rate has reached to several times higher than previous approaches. Our approach has especially detected 3,268,953 reusing and 963,653 rebranding devices with their original manufacturers.
对物联网设备的类型和品牌进行指纹识别是网络空间安全分析的必要工作。现有的方法主要依靠设备对信息的响应这一主要特征来识别这些在线设备。然而,web服务器组件重用和产品品牌重塑是这些嵌入式物联网设备的常见现象。由于响应相似,导致现有方法难以识别大多数器件,甚至出现错误。在本文中,我们提出了一种方法,IoTXray,它提高了信息收集的工作效率,加快了重复使用/重塑品牌设备与相应制造商之间的关系。与以往的方法相比,这些关系可以生成更准确、更可靠的指纹。利用混合神经网络,IoTXray在三种不同的数据源上全面检测在线物联网设备的真实制造商。在实验中,我们的方法可以识别http主机上的7,025,854个物联网设备。识别率比以往的方法提高了好几倍。我们的方法特别发现了3,268,953台重复使用的设备和963,653台与其原始制造商重新命名的设备。
{"title":"Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace","authors":"Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun","doi":"10.1109/TDSC.2022.3223103","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3223103","url":null,"abstract":"Fingerprinting Internet-of-Things(IoT) devices on types and brands is a necessary work for security analysis in the cyberspace. The existing approaches mainly rely on the dominant features of devices which is response to information in order to identify these online devices. However, the web server components reusing and products rebranding are the common phenomenons of these embedded IoT devices. It caused the existing approaches difficult to identify most devices even errors due to the similar responses. In this paper, we present an approach, IoTXray, which improves the work efficiently of information collection about accelerating the relations between reusing/rebranding devices with the corresponding manufacturers. And these relations can generate more accurate and reliable fingerprints than previous approaches. Using the mixed neural networks, IoTXray comprehensively detects the real manufactures of online IoT devices upon three different kinds of data sources. In the experiment, our approach can identify 7,025,854 IoT devices on HTTP-hosts. The identification rate has reached to several times higher than previous approaches. Our approach has especially detected 3,268,953 reusing and 963,653 rebranding devices with their original manufacturers.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3890-3909"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48478338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System PolyCosGraph:一种隐私保护的可取消脑电图生物识别系统
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3218782
Min Wang, Song Wang, Jiankun Hu
Recent findings confirm that biometric templates derived from electroencephalography (EEG) signals contain sensitive information about registered users, such as age, gender, cognitive ability, mental status and health information. Existing privacy-preserving methods such as hash function and fuzzy commitment are not cancelable, where raw biometric features are vulnerable to hill-climbing attacks. To address this issue, we propose the PolyCosGraph, a system based on Polynomial transformation embedding Cosine functions with Graph features of EEG signals, which is a privacy-preserving and cancelable template design that protects EEG features and system security against multiple attacks. In addition, a template corrupting process is designed to further enhance the security of the system, and a corresponding matching algorithm is developed. Even when the transformed template is compromised, attackers cannot retrieve raw EEG features and the compromised template can be revoked. The proposed system achieves the authentication performance of 1.49% EER with a resting state protocol, 0.68% EER with a motor imagery task, and 0.46% EER under a watching movie condition, which is equivalent to that in the non-encrypted domain. Security analysis demonstrates that our system is resistant to attacks via record multiplicity, preimage attacks, hill-climbing attacks, second attacks and brute force attacks.
最近的研究结果证实,从脑电图(EEG)信号中提取的生物特征模板包含注册用户的敏感信息,如年龄、性别、认知能力、心理状态和健康信息。现有的隐私保护方法,如哈希函数和模糊承诺,是不可取消的,因为原始生物特征容易受到爬山攻击。为了解决这个问题,我们提出了PolyCosGraph,这是一个基于多项式变换的系统,它嵌入了具有脑电信号图特征的余弦函数,是一种保护隐私和可取消的模板设计,可以保护脑电特征和系统安全免受多重攻击。此外,为了进一步提高系统的安全性,设计了模板破坏过程,并开发了相应的匹配算法。即使转换后的模板被破坏,攻击者也无法检索原始EEG特征,并且被破坏的模板可以被撤销。所提出的系统在静息状态协议下实现了1.49%EER的认证性能,在运动图像任务下实现了0.68%EER,在观看电影条件下实现了0.46%的EER,这与非加密域中的认证性能相当。安全分析表明,我们的系统能够抵御记录多重性、图像前攻击、爬山攻击、二次攻击和暴力攻击。
{"title":"PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System","authors":"Min Wang, Song Wang, Jiankun Hu","doi":"10.1109/TDSC.2022.3218782","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3218782","url":null,"abstract":"Recent findings confirm that biometric templates derived from electroencephalography (EEG) signals contain sensitive information about registered users, such as age, gender, cognitive ability, mental status and health information. Existing privacy-preserving methods such as hash function and fuzzy commitment are not cancelable, where raw biometric features are vulnerable to hill-climbing attacks. To address this issue, we propose the PolyCosGraph, a system based on Polynomial transformation embedding Cosine functions with Graph features of EEG signals, which is a privacy-preserving and cancelable template design that protects EEG features and system security against multiple attacks. In addition, a template corrupting process is designed to further enhance the security of the system, and a corresponding matching algorithm is developed. Even when the transformed template is compromised, attackers cannot retrieve raw EEG features and the compromised template can be revoked. The proposed system achieves the authentication performance of 1.49% EER with a resting state protocol, 0.68% EER with a motor imagery task, and 0.46% EER under a watching movie condition, which is equivalent to that in the non-encrypted domain. Security analysis demonstrates that our system is resistant to attacks via record multiplicity, preimage attacks, hill-climbing attacks, second attacks and brute force attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4258-4272"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41868276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM 基于恒Q谱草图和GA-SVM的鲁棒音频复制-移动伪造检测
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3215280
Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, M. Li, Weiming Zhang, Xin Yao
Audio recordings used as evidence have become increasingly important to litigation. Before their admissibility as evidence, an audio forensic expert is often required to help determine whether the submitted audio recordings are altered or authentic. Within this field, the copy-move forgery detection (CMFD), which focuses on finding possible forgeries that are derived from the same audio recording, has been an urgent problem in blind audio forensics. However, most of the existing methods require idealistic pre-segmentation and artificial threshold selection to calculate the similarity between segments, which may result in serious misleading and misjudgment especially on high frequency words. In this work, we present a robust method for detecting and locating an audio copy-move forgery on the basis of constant Q spectral sketches (CQSS) and the integration of a customised genetic algorithm (GA) and support vector machine (SVM). Specifically, the CQSS features are first extracted by averaging the logarithm of the squared-magnitude constant Q transform. Then, the CQSS feature set is automatically optimised by a customised GA combined with SVM to obtain the best feature subset and classification model at the same time. Finally, the integrated method, named CQSS-GA-SVM, is evaluated against the state-of-the-art approaches to blind detection of copy-move forgeries on real-world copy-move datasets with read English and Chinese corpus, respectively. The experimental results demonstrate that the proposed CQSS-GA-SVM exhibits significantly high robustness against post-processing based anti-forensics attacks and adaptability to the changes of the duplicated segment duration, the training set size, the recording length, and the forgery type, which may be beneficial to improving the work efficiency of audio forensic experts.
作为证据的录音在诉讼中变得越来越重要。在作为证据接受之前,通常需要音频法医专家帮助确定提交的录音是否被篡改或真实。在这一领域中,复制-移动伪造检测(CMFD)一直是盲音频取证中亟待解决的问题,其重点是发现来自同一音频记录的可能伪造物。然而,现有的方法大多采用理想化的预分割和人为的阈值选择来计算词段之间的相似度,这可能导致严重的误导和误判,特别是在高频词上。在这项工作中,我们提出了一种基于恒定Q谱草图(CQSS)和定制遗传算法(GA)和支持向量机(SVM)集成的检测和定位音频复制移动伪造的鲁棒方法。具体来说,CQSS特征首先通过对平方幅度常数Q变换的对数取平均值来提取。然后,利用自定义遗传算法结合支持向量机对CQSS特征集进行自动优化,同时获得最佳特征子集和分类模型。最后,将CQSS-GA-SVM集成方法分别与最先进的盲检测方法在真实世界的中文和英文语料库上进行了评估。实验结果表明,CQSS-GA-SVM对基于后处理的反取证攻击具有较强的鲁棒性,对重复片段长度、训练集大小、录音长度和伪造类型的变化具有较强的适应性,有助于提高音频取证专家的工作效率。
{"title":"Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM","authors":"Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, M. Li, Weiming Zhang, Xin Yao","doi":"10.1109/TDSC.2022.3215280","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3215280","url":null,"abstract":"Audio recordings used as evidence have become increasingly important to litigation. Before their admissibility as evidence, an audio forensic expert is often required to help determine whether the submitted audio recordings are altered or authentic. Within this field, the copy-move forgery detection (CMFD), which focuses on finding possible forgeries that are derived from the same audio recording, has been an urgent problem in blind audio forensics. However, most of the existing methods require idealistic pre-segmentation and artificial threshold selection to calculate the similarity between segments, which may result in serious misleading and misjudgment especially on high frequency words. In this work, we present a robust method for detecting and locating an audio copy-move forgery on the basis of constant Q spectral sketches (CQSS) and the integration of a customised genetic algorithm (GA) and support vector machine (SVM). Specifically, the CQSS features are first extracted by averaging the logarithm of the squared-magnitude constant Q transform. Then, the CQSS feature set is automatically optimised by a customised GA combined with SVM to obtain the best feature subset and classification model at the same time. Finally, the integrated method, named CQSS-GA-SVM, is evaluated against the state-of-the-art approaches to blind detection of copy-move forgeries on real-world copy-move datasets with read English and Chinese corpus, respectively. The experimental results demonstrate that the proposed CQSS-GA-SVM exhibits significantly high robustness against post-processing based anti-forensics attacks and adaptability to the changes of the duplicated segment duration, the training set size, the recording length, and the forgery type, which may be beneficial to improving the work efficiency of audio forensic experts.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4016-4031"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47565729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring Handwritten Signature Image Features for Hardware Security 探索用于硬件安全的手写签名图像特征
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3218506
Mahendra Rathor, A. Sengupta, Rahul Chaurasia, Aditya Anshul
This paper presents a novel hardware security technique that leverages handwritten signature image features for securing intellectual property (IP) cores, such as digital signal processing (DSP) cores, against IP piracy and false claim of IP ownership threats. In our approach, an IP vendor's handwritten signature image features are first converted into a corresponding digital template, followed by mapping into hardware security constraints and implanting them into the design during high level synthesis (HLS) process. This paper presents methodologies of extracting feature set of a handwritten signature through sampling and of encoding of the samples into binary values using a tree based encoding, for generating the digital template. The results of the proposed approach are assessed in terms of strength of IP ownership proof, security against a forged signature and impact of embedding signature constraints on design cost. The results revealed that the proposed approach provides robust security at negligible design cost overhead and also outperforms state of the art hardware security approaches for DSP cores.
本文提出了一种新的硬件安全技术,该技术利用手写签名图像特征来保护知识产权(IP)核心(如数字信号处理(DSP)核心)免受IP盗版和IP所有权威胁的虚假声明。在我们的方法中,IP供应商的手写签名图像特征首先被转换为相应的数字模板,然后映射到硬件安全约束中,并在高级合成(HLS)过程中将其植入设计中。本文提出了通过采样提取手写签名特征集的方法,以及使用基于树的编码将样本编码为二进制值以生成数字模板的方法。根据知识产权所有权证明的强度、针对伪造签名的安全性以及嵌入签名约束对设计成本的影响来评估所提出方法的结果。结果表明,所提出的方法在可忽略的设计成本开销下提供了稳健的安全性,并且还优于DSP核心的现有硬件安全方法。
{"title":"Exploring Handwritten Signature Image Features for Hardware Security","authors":"Mahendra Rathor, A. Sengupta, Rahul Chaurasia, Aditya Anshul","doi":"10.1109/TDSC.2022.3218506","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3218506","url":null,"abstract":"This paper presents a novel hardware security technique that leverages handwritten signature image features for securing intellectual property (IP) cores, such as digital signal processing (DSP) cores, against IP piracy and false claim of IP ownership threats. In our approach, an IP vendor's handwritten signature image features are first converted into a corresponding digital template, followed by mapping into hardware security constraints and implanting them into the design during high level synthesis (HLS) process. This paper presents methodologies of extracting feature set of a handwritten signature through sampling and of encoding of the samples into binary values using a tree based encoding, for generating the digital template. The results of the proposed approach are assessed in terms of strength of IP ownership proof, security against a forged signature and impact of embedding signature constraints on design cost. The results revealed that the proposed approach provides robust security at negligible design cost overhead and also outperforms state of the art hardware security approaches for DSP cores.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3687-3698"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49174913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity 具有次线性轮复杂度的差分无关两方模式匹配
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3206758
Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu
Privacy-preserving pattern matching enables a user to find all occurrences of a pattern in a text without revealing any sensitive information. However, many previous works designed on homomorphic encryption suffer from expensive computational overhead and a simple way to use it can lead to potential input leakage via access pattern during the matching process. In this article, we propose a differentially oblivious pattern matching algorithm, called DOPM. It is deployed on two servers by taking a series of lightweight secret-sharing-based protocols as building blocks. In DOPM, we utilize a witness array and the single instruction multiple data (SIMD) technique to parallelize the algorithm, which achieves sublinear round complexity in performing two-party computation. Additionally, we formally define a new access pattern privacy in the context of differential privacy, named $(epsilon,delta)$(ε,δ)-differentially oblivious privacy ($(epsilon,delta)$(ε,δ)-DOP), and present a pair of differentially oblivious algorithms to read and write elements in an array without using oblivious shuffle. Detailed security analysis demonstrates that the proposed DOPM achieves the goal of protecting confidentiality and access pattern during the matching process. Finally, we benchmark our scheme on a real-world human genome dataset, and experimental results show that DOPM is $10.9times$10.9× faster than the brute-force matching, $3.4-7.1times$3.4-7.1× faster than two state-of-the-art approaches.
保护隐私的模式匹配使用户能够在不泄露任何敏感信息的情况下找到文本中模式的所有出现情况。然而,以往许多关于同态加密的研究都存在计算开销大、使用方法简单、匹配过程中可能通过访问模式导致输入泄漏等问题。在本文中,我们提出了一种称为DOPM的差分无关模式匹配算法。它采用一系列轻量级的基于秘密共享的协议作为构建块,部署在两台服务器上。在DOPM中,我们利用见证数组和单指令多数据(SIMD)技术来并行化算法,在执行双方计算时实现了次线性的轮复杂度。此外,我们在差分隐私的背景下正式定义了一种新的访问模式隐私,命名为$(epsilon,delta)$ (ε,δ)-差分无关隐私($(epsilon,delta)$ (ε,δ)-DOP),并提出了一对差分无关算法来读写数组中的元素,而不使用无关shuffle。详细的安全性分析表明,所提出的DOPM在匹配过程中达到了保护机密性和访问模式的目的。最后,我们在现实世界的人类基因组数据集上对我们的方案进行了基准测试,实验结果表明DOPM比暴力匹配快$10.9times$ 10.9倍,比两种最先进的方法快$3.4-7.1times$ 3.4-7.1倍。
{"title":"Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity","authors":"Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu","doi":"10.1109/TDSC.2022.3206758","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3206758","url":null,"abstract":"Privacy-preserving pattern matching enables a user to find all occurrences of a pattern in a text without revealing any sensitive information. However, many previous works designed on homomorphic encryption suffer from expensive computational overhead and a simple way to use it can lead to potential input leakage via access pattern during the matching process. In this article, we propose a differentially oblivious pattern matching algorithm, called <monospace>DOPM</monospace>. It is deployed on two servers by taking a series of lightweight secret-sharing-based protocols as building blocks. In <monospace>DOPM</monospace>, we utilize a witness array and the single instruction multiple data (SIMD) technique to parallelize the algorithm, which achieves sublinear round complexity in performing two-party computation. Additionally, we formally define a new access pattern privacy in the context of differential privacy, named <inline-formula><tex-math notation=\"LaTeX\">$(epsilon,delta)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>ε</mml:mi><mml:mo>,</mml:mo><mml:mi>δ</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq1-3206758.gif\"/></alternatives></inline-formula>-differentially oblivious privacy (<inline-formula><tex-math notation=\"LaTeX\">$(epsilon,delta)$</tex-math><alternatives><mml:math><mml:mrow><mml:mo>(</mml:mo><mml:mi>ε</mml:mi><mml:mo>,</mml:mo><mml:mi>δ</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq2-3206758.gif\"/></alternatives></inline-formula>-DOP), and present a pair of differentially oblivious algorithms to read and write elements in an array without using oblivious shuffle. Detailed security analysis demonstrates that the proposed <monospace>DOPM</monospace> achieves the goal of protecting confidentiality and access pattern during the matching process. Finally, we benchmark our scheme on a real-world human genome dataset, and experimental results show that <monospace>DOPM</monospace> is <inline-formula><tex-math notation=\"LaTeX\">$10.9times$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>10</mml:mn><mml:mo>.</mml:mo><mml:mn>9</mml:mn><mml:mo>×</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq3-3206758.gif\"/></alternatives></inline-formula> faster than the brute-force matching, <inline-formula><tex-math notation=\"LaTeX\">$3.4-7.1times$</tex-math><alternatives><mml:math><mml:mrow><mml:mn>3</mml:mn><mml:mo>.</mml:mo><mml:mn>4</mml:mn><mml:mo>-</mml:mo><mml:mn>7</mml:mn><mml:mo>.</mml:mo><mml:mn>1</mml:mn><mml:mo>×</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"ning-ieq4-3206758.gif\"/></alternatives></inline-formula> faster than two state-of-the-art approaches.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4101-4117"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48110739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1