首页 > 最新文献

2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow 通过数据流的空间随机化保护AES免受局部EM攻击
Pub Date : 2019-05-05 DOI: 10.1109/HST.2019.8741026
Ge Li, Vishnuvardhan V. Iyer, M. Orshansky
A localized electromagnetic (EM) attack is a potent threat to security of embedded cryptographic implementations. The attack utilizes high resolution EM probes to localize and exploit information leakage in sub-circuits of a system, providing information not available in traditional EM and power attacks. In this paper, we propose a countermeasure based on randomizing the assignment of sensitive data to parallel datapath components in a high-performance implementation of AES. In contrast to a conventional design where each state register byte is routed to a fixed S-box, a permutation network, controlled by a transient random value, creates a dynamic random mapping between the state registers and the set of S-boxes. This randomization results in a significant reduction of exploitable leakage.We demonstrate the countermeasure’s effectiveness under two attack scenarios: a more powerful attack that assumes a fully controlled access to an attacked implementation for building a priori EM-profiles, and a generic attack based on the black-box model. Spatial randomization leads to a 150X increase of the minimum traces to disclosure (MTD) for the profiled attack and a 3.25X increase of MTD for the black-box model attack.
局部电磁(EM)攻击对嵌入式加密实现的安全性构成严重威胁。该攻击利用高分辨率电磁探针来定位和利用系统子电路中的信息泄漏,提供传统电磁攻击和功率攻击无法获得的信息。在本文中,我们提出了一种在高性能AES实现中基于随机分配敏感数据到并行数据路径组件的对策。与将每个状态寄存器字节路由到固定s盒的传统设计相反,由瞬时随机值控制的置换网络在状态寄存器和s盒集之间创建动态随机映射。这种随机化导致可利用泄漏的显著减少。我们在两种攻击场景下展示了对策的有效性:一种更强大的攻击,假设对被攻击实现的完全控制访问,以构建先验的em配置文件,以及一种基于黑盒模型的通用攻击。空间随机化导致轮廓型攻击的最小暴露痕迹(MTD)增加150倍,黑盒模型攻击的MTD增加3.25倍。
{"title":"Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow","authors":"Ge Li, Vishnuvardhan V. Iyer, M. Orshansky","doi":"10.1109/HST.2019.8741026","DOIUrl":"https://doi.org/10.1109/HST.2019.8741026","url":null,"abstract":"A localized electromagnetic (EM) attack is a potent threat to security of embedded cryptographic implementations. The attack utilizes high resolution EM probes to localize and exploit information leakage in sub-circuits of a system, providing information not available in traditional EM and power attacks. In this paper, we propose a countermeasure based on randomizing the assignment of sensitive data to parallel datapath components in a high-performance implementation of AES. In contrast to a conventional design where each state register byte is routed to a fixed S-box, a permutation network, controlled by a transient random value, creates a dynamic random mapping between the state registers and the set of S-boxes. This randomization results in a significant reduction of exploitable leakage.We demonstrate the countermeasure’s effectiveness under two attack scenarios: a more powerful attack that assumes a fully controlled access to an attacked implementation for building a priori EM-profiles, and a generic attack based on the black-box model. Spatial randomization leads to a 150X increase of the minimum traces to disclosure (MTD) for the profiled attack and a 3.25X increase of MTD for the black-box model attack.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125663474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher Ascon认证密码的统计故障分析方法
Pub Date : 2019-05-05 DOI: 10.1109/HST.2019.8741029
Keyvan Ramezanpour, P. Ampadu, William Diehl
Authenticated ciphers are trending in secret key cryptography, since they combine confidentiality, integrity, and authentication into one algorithm, and offer potential efficiencies over the use of separate block ciphers and keyed hashes. Current cryptographic contests and standardization efforts are evaluating authenticated ciphers for weaknesses, to include implementation vulnerabilities, such as fault attacks. In this paper, we analyze fault attacks against the Ascon authenticated cipher, which was selected by CAESAR as the first choice for the lightweight use case. We propose a fault attack technique based on statistical ineffective fault analysis (SIFA) using double-fault injection and key dividing. Faults are injected at two selected S-boxes for every encryption during the last round of permutation in the Ascon Finalization stage. The correct tag values, resulting from ineffective fault inductions, are then used to analyze key hypotheses. The complexity of our attack method is a trade-off between the size of key hypothesis search space and the number of double-fault injections. The sufficient number of correct tag values needed to recover a key subset depends on the bias of fault distributions. We perform experiments on a software implementation of Ascon to show that between 12.5 to 2500 correct tag values (i.e., ineffective faults) are enough for key recovery for highly biased to more uniform fault distributions, respectively.
经过身份验证的密码是密钥加密的趋势,因为它们将机密性、完整性和身份验证结合到一个算法中,并且比使用单独的块密码和密钥散列提供潜在的效率。当前的密码学竞赛和标准化工作正在评估经过身份验证的密码的弱点,包括实现漏洞,例如错误攻击。在本文中,我们分析了针对Ascon认证密码的故障攻击,该密码被CAESAR选为轻量级用例的首选。提出了一种基于统计无效故障分析(SIFA)的故障攻击技术,采用双故障注入和密钥划分。在Ascon finalize阶段的最后一轮排列期间,为每个加密在两个选定的s -box中注入错误。通过无效的故障归纳得到正确的标签值,然后用于分析关键假设。我们的攻击方法的复杂性是在关键假设搜索空间的大小和双错误注入的数量之间的权衡。恢复关键子集所需的正确标签值的足够数量取决于错误分布的偏差。我们在Ascon的软件实现上进行了实验,分别显示12.5到2500个正确的标签值(即无效故障)足以用于高度偏向于更均匀的故障分布的密钥恢复。
{"title":"A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher","authors":"Keyvan Ramezanpour, P. Ampadu, William Diehl","doi":"10.1109/HST.2019.8741029","DOIUrl":"https://doi.org/10.1109/HST.2019.8741029","url":null,"abstract":"Authenticated ciphers are trending in secret key cryptography, since they combine confidentiality, integrity, and authentication into one algorithm, and offer potential efficiencies over the use of separate block ciphers and keyed hashes. Current cryptographic contests and standardization efforts are evaluating authenticated ciphers for weaknesses, to include implementation vulnerabilities, such as fault attacks. In this paper, we analyze fault attacks against the Ascon authenticated cipher, which was selected by CAESAR as the first choice for the lightweight use case. We propose a fault attack technique based on statistical ineffective fault analysis (SIFA) using double-fault injection and key dividing. Faults are injected at two selected S-boxes for every encryption during the last round of permutation in the Ascon Finalization stage. The correct tag values, resulting from ineffective fault inductions, are then used to analyze key hypotheses. The complexity of our attack method is a trade-off between the size of key hypothesis search space and the number of double-fault injections. The sufficient number of correct tag values needed to recover a key subset depends on the bias of fault distributions. We perform experiments on a software implementation of Ascon to show that between 12.5 to 2500 correct tag values (i.e., ineffective faults) are enough for key recovery for highly biased to more uniform fault distributions, respectively.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders 使用时间和频率通知自编码器的勒索软件分析
Pub Date : 2019-05-05 DOI: 10.1109/HST.2019.8740837
Manaar Alam, Sarani Bhattacharya, Swastika Dutta, S. Sinha, Debdeep Mukhopadhyay, A. Chattopadhyay
Ransomware can produce direct and controllable economic loss making it one of the most prominent threats in cybersecurity. According to the latest statistics, more than half of the malwares reported in Q1 of 2017 are ransomwares, and there is a potential threat of novice cybercriminals accessing ransomware-as-a-service. The concept of public-key based data kidnapping and subsequent extortion was first introduced in 1996. Since then, variants of ransomware emerged with different cryptosystems and larger key sizes; however, the underlying techniques remained the same. There are several works in the literature which propose a generic framework to detect these ransomwares; though, most of them target ransomwares having specific classes of the encryption algorithm. In addition to it, most of these methods either require Operating System (OS) kernel modification or have high detection latency. In this work, we present a generalized two-step unsupervised detection framework: RATAFIA which uses a Deep Neural Network architecture and Fast Fourier Transformation to develop a highly accurate, fast and reliable solution to ransomware detection using minimal tracepoints. The proposed method does not require any OS kernel modification making it adaptable to most of the modern-day system. We also introduce a special detection module for successful identification of benign disk encryption processes having similar characteristics like malicious ransomware programs but having a different intention. We provide a comprehensive study to evaluate the performance of RATAFIA in the presence of standard benchmark programs, disk encryption and regular high computational processes in the light of software security.
勒索软件可以造成直接和可控的经济损失,是网络安全中最突出的威胁之一。根据最新统计数据,2017年第一季度报告的恶意软件中有一半以上是勒索软件,新手网络犯罪分子访问勒索软件即服务存在潜在威胁。基于公钥的数据绑架和随后的勒索的概念最早是在1996年提出的。从那时起,勒索软件的变种出现了不同的密码系统和更大的密钥大小;然而,基本的技术是相同的。文献中有几部作品提出了检测这些勒索软件的通用框架;不过,它们中的大多数针对的是具有特定类别加密算法的勒索软件。除此之外,这些方法中的大多数要么需要修改操作系统(OS)内核,要么具有很高的检测延迟。在这项工作中,我们提出了一个广义的两步无监督检测框架:RATAFIA,它使用深度神经网络架构和快速傅立叶变换来开发一个高度准确,快速和可靠的解决方案,使用最小的跟踪点来检测勒索软件。所提出的方法不需要任何操作系统内核修改,使其适用于大多数现代系统。我们还介绍了一个特殊的检测模块,用于成功识别具有与恶意勒索软件程序相似特征但意图不同的良性磁盘加密进程。我们从软件安全的角度出发,对RATAFIA在标准基准程序、磁盘加密和常规高计算过程下的性能进行了全面的研究。
{"title":"RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders","authors":"Manaar Alam, Sarani Bhattacharya, Swastika Dutta, S. Sinha, Debdeep Mukhopadhyay, A. Chattopadhyay","doi":"10.1109/HST.2019.8740837","DOIUrl":"https://doi.org/10.1109/HST.2019.8740837","url":null,"abstract":"Ransomware can produce direct and controllable economic loss making it one of the most prominent threats in cybersecurity. According to the latest statistics, more than half of the malwares reported in Q1 of 2017 are ransomwares, and there is a potential threat of novice cybercriminals accessing ransomware-as-a-service. The concept of public-key based data kidnapping and subsequent extortion was first introduced in 1996. Since then, variants of ransomware emerged with different cryptosystems and larger key sizes; however, the underlying techniques remained the same. There are several works in the literature which propose a generic framework to detect these ransomwares; though, most of them target ransomwares having specific classes of the encryption algorithm. In addition to it, most of these methods either require Operating System (OS) kernel modification or have high detection latency. In this work, we present a generalized two-step unsupervised detection framework: RATAFIA which uses a Deep Neural Network architecture and Fast Fourier Transformation to develop a highly accurate, fast and reliable solution to ransomware detection using minimal tracepoints. The proposed method does not require any OS kernel modification making it adaptable to most of the modern-day system. We also introduce a special detection module for successful identification of benign disk encryption processes having similar characteristics like malicious ransomware programs but having a different intention. We provide a comprehensive study to evaluate the performance of RATAFIA in the presence of standard benchmark programs, disk encryption and regular high computational processes in the light of software security.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130139969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB 高性能低复杂度:基于MSPB的GF(2m)有限域乘法器故障检测新方案
Pub Date : 2019-05-05 DOI: 10.1109/HST.2019.8741034
Chiou-Yng Lee, Jiafeng Xie
Fault detection is becoming more and more essential to the cryptographic circuits protection (for the purpose of fighting against both natural and malicious faults). While finite field multiplier is regarded as the bottleneck arithmetic unit for cryptosystems such as elliptic curve cryptography, efficient implementation of finite field multiplier with high fault detection capability is still missing in the literature. In this paper, therefore, we propose a novel fault detection scheme for finite field multipliers over GF(2m), where the proposed work aims at obtaining high fault detection performance for finite field multipliers and meanwhile maintain low-complexity implementation. To successfully carry out the proposed design strategy, we have used the modified shifted polynomial basis (MSPB) to represent the field and have conducted three coherent interdependent stages of efforts: (i) a novel 1-bit parity based detection scheme for bit-serial MSPB multiplier is presented after thorough mathematical derivation; (ii) a novel Toeplitz matrix-vector product (TMVP)-based multi-bit parity detection scheme for digit-serial MSPB multiplier is proposed then to obtain both high detection performance and low-complexity implementation; (iii) detailed complexity analysis and comparison show that the proposed designs have significantly better performance over the best of existing ones. For instance, for the bit-serial multipliers, the proposed design (using 1 parity bit) can achieve around 99.49% fault detection performance while the best existing one with 2-bit parity checking scheme achieves only 75.12% fault detection. The proposed scheme, because of its high fault detection capability and low-complexity, can be extended further in many cryptographic applications.
故障检测在加密电路保护中变得越来越重要(为了对抗自然和恶意故障)。有限域乘法器被认为是椭圆曲线密码学等密码系统的瓶颈运算单元,但目前文献中还缺乏高效实现具有高故障检测能力的有限域乘法器。因此,本文提出了一种新的GF(2m)有限域乘法器故障检测方案,该方案旨在获得有限域乘法器的高故障检测性能,同时保持低复杂度的实现。为了成功地实施所提出的设计策略,我们使用了改进的移位多项式基(MSPB)来表示该领域,并进行了三个连贯的相互依存的阶段的努力:(i)经过彻底的数学推导,提出了一种新的基于1位奇偶校验的位串行MSPB乘法器检测方案;(ii)提出了一种新的基于Toeplitz矩阵向量积(TMVP)的数字串行MSPB乘法器多比特奇偶校验方案,以获得高检测性能和低复杂度的实现;(iii)详细的复杂性分析和比较表明,建议的设计明显优于现有的最佳设计。例如,对于位串行乘法器,所提出的设计(使用1个奇偶校验位)可以达到99.49%左右的故障检测性能,而现有最好的2位奇偶校验方案只能达到75.12%的故障检测性能。该方案具有较强的故障检测能力和较低的复杂度,可以进一步扩展到许多密码学应用中。
{"title":"High Capability and Low-Complexity: Novel Fault Detection Scheme for Finite Field Multipliers over GF(2m) based on MSPB","authors":"Chiou-Yng Lee, Jiafeng Xie","doi":"10.1109/HST.2019.8741034","DOIUrl":"https://doi.org/10.1109/HST.2019.8741034","url":null,"abstract":"Fault detection is becoming more and more essential to the cryptographic circuits protection (for the purpose of fighting against both natural and malicious faults). While finite field multiplier is regarded as the bottleneck arithmetic unit for cryptosystems such as elliptic curve cryptography, efficient implementation of finite field multiplier with high fault detection capability is still missing in the literature. In this paper, therefore, we propose a novel fault detection scheme for finite field multipliers over GF(2m), where the proposed work aims at obtaining high fault detection performance for finite field multipliers and meanwhile maintain low-complexity implementation. To successfully carry out the proposed design strategy, we have used the modified shifted polynomial basis (MSPB) to represent the field and have conducted three coherent interdependent stages of efforts: (i) a novel 1-bit parity based detection scheme for bit-serial MSPB multiplier is presented after thorough mathematical derivation; (ii) a novel Toeplitz matrix-vector product (TMVP)-based multi-bit parity detection scheme for digit-serial MSPB multiplier is proposed then to obtain both high detection performance and low-complexity implementation; (iii) detailed complexity analysis and comparison show that the proposed designs have significantly better performance over the best of existing ones. For instance, for the bit-serial multipliers, the proposed design (using 1 parity bit) can achieve around 99.49% fault detection performance while the best existing one with 2-bit parity checking scheme achieves only 75.12% fault detection. The proposed scheme, because of its high fault detection capability and low-complexity, can be extended further in many cryptographic applications.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells 利用老化诱导的记忆细胞偏差检测回收soc
Pub Date : 2019-05-05 DOI: 10.1109/HST.2019.8741032
Ujjwal Guin, Wendong Wang, Charles Harper, A. Singh
The rise of recycled ICs being sold as new through the global semiconductor supply chain is a serious threat due to their inferior quality, shorter remaining life, and potentially poorer performance, compared to their authentic counterparts. While solutions, such as on-chip age monitors, have been proposed for new designs, detecting the recycling of older legacy ICs already in use is much harder; no reliable solution currently exists. In this paper, we propose a new and highly effective approach for detecting recycled ICs by exploiting the powerup state of on-chip SRAMs to evaluate the age of the chip. Our methodology does not require the introduction of any special aging detection circuitry, nor the recording and saving of historical circuit performance data as a reference to detect degradation from use. Instead, we exploit the novel observation that in a new unused SRAM, an equal number of cells power up to the 0 and 1 logic states, and also that this distribution becomes skewed in time due to aging in operation. Since SRAMs exist in virtually all systems-on-chip (SoCs), this simple aging detection method is widely applicable to both old and new designs. It is also low cost since does not require any special test equipment. We present experimental results using commercial off-the-shelf SRAM chips to validate the effectiveness of the proposed approach.
通过全球半导体供应链作为新产品出售的回收集成电路的增加是一个严重的威胁,因为它们的质量较差,剩余寿命较短,而且与正品相比,性能可能更差。虽然已经为新设计提出了诸如片上年龄监视器之类的解决方案,但检测已经在使用的旧遗留ic的回收要困难得多;目前没有可靠的解决方案。在本文中,我们提出了一种新的、高效的方法来检测回收集成电路,通过利用片上ram的上电状态来评估芯片的年龄。我们的方法不需要引入任何特殊的老化检测电路,也不需要记录和保存历史电路性能数据作为检测使用退化的参考。相反,我们利用了新的观察结果,即在一个新的未使用的SRAM中,相同数量的单元功率达到0和1逻辑状态,并且由于运行中的老化,这种分布在时间上变得倾斜。由于sram几乎存在于所有的片上系统(soc)中,因此这种简单的老化检测方法广泛适用于新旧设计。它的成本也很低,因为不需要任何特殊的测试设备。我们提出了使用商用现货SRAM芯片的实验结果来验证所提出方法的有效性。
{"title":"Detecting Recycled SoCs by Exploiting Aging Induced Biases in Memory Cells","authors":"Ujjwal Guin, Wendong Wang, Charles Harper, A. Singh","doi":"10.1109/HST.2019.8741032","DOIUrl":"https://doi.org/10.1109/HST.2019.8741032","url":null,"abstract":"The rise of recycled ICs being sold as new through the global semiconductor supply chain is a serious threat due to their inferior quality, shorter remaining life, and potentially poorer performance, compared to their authentic counterparts. While solutions, such as on-chip age monitors, have been proposed for new designs, detecting the recycling of older legacy ICs already in use is much harder; no reliable solution currently exists. In this paper, we propose a new and highly effective approach for detecting recycled ICs by exploiting the powerup state of on-chip SRAMs to evaluate the age of the chip. Our methodology does not require the introduction of any special aging detection circuitry, nor the recording and saving of historical circuit performance data as a reference to detect degradation from use. Instead, we exploit the novel observation that in a new unused SRAM, an equal number of cells power up to the 0 and 1 logic states, and also that this distribution becomes skewed in time due to aging in operation. Since SRAMs exist in virtually all systems-on-chip (SoCs), this simple aging detection method is widely applicable to both old and new designs. It is also low cost since does not require any special test equipment. We present experimental results using commercial off-the-shelf SRAM chips to validate the effectiveness of the proposed approach.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134277684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies 使用缓存监控和分区技术对缓存定时通道攻击的实用防御
Pub Date : 2019-05-01 DOI: 10.1109/HST.2019.8740835
Fan Yao, Hongyu Fang, M. Doroslovački, Guru Venkataramani
Recent studies have shown how adversaries can exploit hardware cache structures to launch information leakage-based attacks. Among these attacks, timing channels are especially worrisome since adversaries communicate simply by modulating the timing of shared resource accesses, and do not leave any physical trace of the communication. Therefore, guarding the system against such attacks is critical. Unfortunately, most existing mitigation mechanisms either require non-trivial hardware modifications and/or incur high runtime overheads.In this paper, we propose COTSknight, a new framework that guards the system against several classes of cache timing channel attacks by making novel use of Commercial Off-The-Shelf (COTS) architectural support for cache resource monitoring and prioritization. We find that the adversary’s attempt to modulate cache access latency during attacks can be captured using cache occupancy patterns. COTSknight leverages efficient signal processing techniques on cache occupancy patterns to determine the potential for timing channel attacks. Once suspicious domains are identified, COTSknight disbands timing channels using dynamic cache partitioning schemes in hardware. We implement a prototype of our COTSknight framework on an Intel Xeon v4 server and evaluate its efficacy extensively using different spatial encoding schemes, as well as serial and parallel implementations of Last Level Cache (LLC) timing channels. Our results show that COTSknight can successfully thwart several classes of timing channel attacks by allocating disjoint LLC ways to malicious processes. Even in benign cache-intensive workloads, we observe a 6% cache partition trigger rate that results in a relatively small 5% worst-case performance degradation. Interestingly, for some benign applications, upon COTSknight’s cache partition, we observe an improved performance by up to 9.2% through eliminating cache interference.
最近的研究显示了攻击者如何利用硬件缓存结构来发起基于信息泄漏的攻击。在这些攻击中,定时通道尤其令人担忧,因为攻击者仅仅通过调制共享资源访问的定时进行通信,并且不留下任何通信的物理痕迹。因此,保护系统免受此类攻击至关重要。不幸的是,大多数现有的缓解机制要么需要非常重要的硬件修改,要么会产生很高的运行时开销。在本文中,我们提出了COTSknight,这是一个新的框架,通过新颖地使用商用现货(COTS)架构支持缓存资源监控和优先级,保护系统免受几种缓存时间通道攻击。我们发现对手在攻击期间调制缓存访问延迟的尝试可以使用缓存占用模式捕获。COTSknight利用缓存占用模式上的有效信号处理技术来确定定时通道攻击的可能性。一旦识别出可疑的域,COTSknight就会使用硬件中的动态缓存分区方案来分解定时通道。我们在Intel Xeon v4服务器上实现了COTSknight框架的原型,并使用不同的空间编码方案以及Last Level Cache (LLC)时序通道的串行和并行实现来广泛评估其有效性。我们的结果表明,COTSknight可以通过向恶意进程分配不连接的LLC方式来成功地阻止几种时间通道攻击。即使在良性的缓存密集型工作负载中,我们也观察到6%的缓存分区触发率会导致相对较小的最坏情况下5%的性能下降。有趣的是,对于一些良性应用程序,在COTSknight的缓存分区上,我们观察到通过消除缓存干扰,性能提高了9.2%。
{"title":"COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies","authors":"Fan Yao, Hongyu Fang, M. Doroslovački, Guru Venkataramani","doi":"10.1109/HST.2019.8740835","DOIUrl":"https://doi.org/10.1109/HST.2019.8740835","url":null,"abstract":"Recent studies have shown how adversaries can exploit hardware cache structures to launch information leakage-based attacks. Among these attacks, timing channels are especially worrisome since adversaries communicate simply by modulating the timing of shared resource accesses, and do not leave any physical trace of the communication. Therefore, guarding the system against such attacks is critical. Unfortunately, most existing mitigation mechanisms either require non-trivial hardware modifications and/or incur high runtime overheads.In this paper, we propose COTSknight, a new framework that guards the system against several classes of cache timing channel attacks by making novel use of Commercial Off-The-Shelf (COTS) architectural support for cache resource monitoring and prioritization. We find that the adversary’s attempt to modulate cache access latency during attacks can be captured using cache occupancy patterns. COTSknight leverages efficient signal processing techniques on cache occupancy patterns to determine the potential for timing channel attacks. Once suspicious domains are identified, COTSknight disbands timing channels using dynamic cache partitioning schemes in hardware. We implement a prototype of our COTSknight framework on an Intel Xeon v4 server and evaluate its efficacy extensively using different spatial encoding schemes, as well as serial and parallel implementations of Last Level Cache (LLC) timing channels. Our results show that COTSknight can successfully thwart several classes of timing channel attacks by allocating disjoint LLC ways to malicious processes. Even in benign cache-intensive workloads, we observe a 6% cache partition trigger rate that results in a relatively small 5% worst-case performance degradation. Interestingly, for some benign applications, upon COTSknight’s cache partition, we observe an improved performance by up to 9.2% through eliminating cache interference.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits 基于可满足性的分裂制造电路攻击中邻近信息的利用
Pub Date : 2019-05-01 DOI: 10.1109/HST.2019.8740833
Suyuan Chen, R. Vemuri
Split Manufacturing (SM) was introduced as an effective countermeasure to reverse engineering of integrated circuits and as a potential deterrent to Trojan insertion and overproduction. In SM, some wires, assigned to the back-end-of-line (BEOL) layers and fabricated at a secure facility, are hidden from the attacker. However, proximity information based attacks use physical design hints such as wire-length, combinational cycles and routing directions obtained from the FEOL (front-end-of-line) netlist to recover some or all of the BEOL signals. In addition, a recently proposed satisfiability (SAT) based attack models the BEOL signal recovery problem as a problem of configuring a key-controlled interconnect network and solves for the key values using a SAT solver. While this method can recover 100% of the BEOL signals, it takes impractically long time for large circuits. In this paper, we propose an effective method to exploit proximity information extracted from the FEOL circuit to reduce the size of the interconnection network which models the missing BEOL layers which in turn significantly reduces the size of the resulting SAT problem. This leads to efficient recovery of 100% of the ‘hidden’ BEOL signals even for large circuits. Experimental results using circuits from ISCAS85, ISCAS89 and ITC99 benchmark suites show that the proposed method is up to 80x faster than the SAT-only attack (without proximity information) while maintaining the 100% attack correctness for all combinational and sequential benchmarks.
提出了分段制造(SM)作为集成电路逆向工程的有效对策和对特洛伊木马插入和生产过剩的潜在威慑。在SM中,一些分配到后端线(BEOL)层并在安全设施中制造的电线对攻击者是隐藏的。然而,基于接近信息的攻击使用物理设计提示,如从FEOL(前端)网络列表获得的线长、组合周期和路由方向,以恢复部分或全部BEOL信号。此外,最近提出的一种基于可满足性(SAT)的攻击将BEOL信号恢复问题建模为配置键控互连网络的问题,并使用SAT求解器求解键值。虽然这种方法可以恢复100%的BEOL信号,但对于大型电路来说,它需要很长时间。在本文中,我们提出了一种有效的方法来利用从FEOL电路中提取的接近信息来减少互连网络的大小,该互连网络模拟了缺失的BEOL层,从而显着减少了所产生的SAT问题的大小。这导致即使对于大型电路,也可以有效地恢复100%的“隐藏”BEOL信号。使用ISCAS85、ISCAS89和ITC99基准测试套件的电路进行的实验结果表明,所提出的方法比仅sat攻击(不含接近信息)快80倍,同时在所有组合和顺序基准测试中保持100%的攻击正确性。
{"title":"Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits","authors":"Suyuan Chen, R. Vemuri","doi":"10.1109/HST.2019.8740833","DOIUrl":"https://doi.org/10.1109/HST.2019.8740833","url":null,"abstract":"Split Manufacturing (SM) was introduced as an effective countermeasure to reverse engineering of integrated circuits and as a potential deterrent to Trojan insertion and overproduction. In SM, some wires, assigned to the back-end-of-line (BEOL) layers and fabricated at a secure facility, are hidden from the attacker. However, proximity information based attacks use physical design hints such as wire-length, combinational cycles and routing directions obtained from the FEOL (front-end-of-line) netlist to recover some or all of the BEOL signals. In addition, a recently proposed satisfiability (SAT) based attack models the BEOL signal recovery problem as a problem of configuring a key-controlled interconnect network and solves for the key values using a SAT solver. While this method can recover 100% of the BEOL signals, it takes impractically long time for large circuits. In this paper, we propose an effective method to exploit proximity information extracted from the FEOL circuit to reduce the size of the interconnection network which models the missing BEOL layers which in turn significantly reduces the size of the resulting SAT problem. This leads to efficient recovery of 100% of the ‘hidden’ BEOL signals even for large circuits. Experimental results using circuits from ISCAS85, ISCAS89 and ITC99 benchmark suites show that the proposed method is up to 80x faster than the SAT-only attack (without proximity information) while maintaining the 100% attack correctness for all combinational and sequential benchmarks.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller 闪存中激光诱导的单比特故障:32位微控制器上的指令损坏
Pub Date : 2019-05-01 DOI: 10.1109/HST.2019.8741030
Brice Colombier, A. Menu, J. Dutertre, Pierre-Alain Moëllic, J. Rigaud, J. Danger
Physical attacks are a known threat posed against secure embedded systems. Notable among these is laser fault injection, which is often considered as the most effective fault injection technique. Indeed, laser fault injection provides a high spatial accuracy, which enables an attacker to induce bit-level faults. However, experience gained from attacking 8-bit targets might not be relevant on more advanced micro-architectures, and these attacks become increasingly challenging on 32-bit microcontrollers. In this article, we show that the flash memory area of a 32-bit microcontroller is sensitive to laser fault injection. These faults occur during the instruction fetch process, hence the stored value remains unaltered. After a thorough characterisation of the induced faults and the associated fault model, we provide detailed examples of bit-level corruption of instructions and demonstrate practical applications in compromising the security of real-life codes. Based on these experimental results, we formulate a hypothesis about the underlying micro-architectural features that explain the observed fault model.
物理攻击是针对安全嵌入式系统的已知威胁。其中值得注意的是激光故障注入技术,它通常被认为是最有效的故障注入技术。事实上,激光故障注入提供了很高的空间精度,这使得攻击者能够诱导比特级故障。然而,从攻击8位目标中获得的经验可能与更高级的微架构无关,并且这些攻击在32位微控制器上变得越来越具有挑战性。在本文中,我们证明了32位微控制器的闪存区域对激光故障注入敏感。这些错误发生在指令获取过程中,因此存储的值保持不变。在对诱发故障和相关故障模型进行了彻底的描述之后,我们提供了位级指令损坏的详细示例,并演示了在危及现实代码安全性方面的实际应用。基于这些实验结果,我们提出了一个关于潜在微结构特征的假设,以解释观察到的断层模型。
{"title":"Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller","authors":"Brice Colombier, A. Menu, J. Dutertre, Pierre-Alain Moëllic, J. Rigaud, J. Danger","doi":"10.1109/HST.2019.8741030","DOIUrl":"https://doi.org/10.1109/HST.2019.8741030","url":null,"abstract":"Physical attacks are a known threat posed against secure embedded systems. Notable among these is laser fault injection, which is often considered as the most effective fault injection technique. Indeed, laser fault injection provides a high spatial accuracy, which enables an attacker to induce bit-level faults. However, experience gained from attacking 8-bit targets might not be relevant on more advanced micro-architectures, and these attacks become increasingly challenging on 32-bit microcontrollers. In this article, we show that the flash memory area of a 32-bit microcontroller is sensitive to laser fault injection. These faults occur during the instruction fetch process, hence the stored value remains unaltered. After a thorough characterisation of the induced faults and the associated fault model, we provide detailed examples of bit-level corruption of instructions and demonstrate practical applications in compromising the security of real-life codes. Based on these experimental results, we formulate a hypothesis about the underlying micro-architectural features that explain the observed fault model.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution CoPHEE:部分同态加密执行的协处理器
Pub Date : 2019-05-01 DOI: 10.1109/HST.2019.8741036
M. Nabeel, M. Ashraf, E. Chielle, N. G. Tsoutsos, M. Maniatakos
The recent disclosure of the Spectre and Meltdown side-channel vulnerabilities offers yet another example of modern computer architectures prioritizing performance optimizations over security and privacy. The devastating impact of data leakage, however, emphasizes the need for new processor designs that provide native support for data privacy using cryptography. In this paper, we report on a year-long effort to design, implement, fabricate, and validate CoPHEE: a novel co-processor design that mitigates data leakage risks using partially homomorphic encrypted execution. ASIC designs for encrypted execution impose unique challenges, such as the need for non-traditional arithmetic units (modular inverse, greatest common divisor), very wide datapaths (2048 bits), and the requirement for secure multiplexer units enabling general-purpose execution on encrypted values. Our fully-functional co-processor chip is fabricated in 65nm CMOS technology, and communicates to a main processor via UART. This paper offers an elaborate overview of all steps and design techniques in the ASIC development process, ranging from RTL design to fabrication and validation. We evaluate our co-processor using data-oblivious C++ benchmarks, while our RTL files are available in an open-source repository.
最近披露的Spectre和Meltdown侧信道漏洞提供了现代计算机架构优先考虑性能优化而不是安全和隐私的另一个例子。然而,数据泄漏的破坏性影响强调了对新处理器设计的需求,这种设计需要使用加密技术为数据隐私提供本地支持。在本文中,我们报告了长达一年的设计、实现、制造和验证CoPHEE的工作:一种新颖的协处理器设计,使用部分同态加密执行来减轻数据泄漏风险。用于加密执行的ASIC设计带来了独特的挑战,例如需要非传统的算术单元(模逆、最大公约数)、非常宽的数据路径(2048位),以及需要安全的多路复用器单元,以便对加密值进行通用执行。我们的全功能协处理器芯片采用65纳米CMOS技术制造,并通过UART与主处理器通信。本文提供了ASIC开发过程中所有步骤和设计技术的详细概述,从RTL设计到制造和验证。我们使用无关数据的c++基准来评估我们的协处理器,而我们的RTL文件可以在开源存储库中获得。
{"title":"CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution","authors":"M. Nabeel, M. Ashraf, E. Chielle, N. G. Tsoutsos, M. Maniatakos","doi":"10.1109/HST.2019.8741036","DOIUrl":"https://doi.org/10.1109/HST.2019.8741036","url":null,"abstract":"The recent disclosure of the Spectre and Meltdown side-channel vulnerabilities offers yet another example of modern computer architectures prioritizing performance optimizations over security and privacy. The devastating impact of data leakage, however, emphasizes the need for new processor designs that provide native support for data privacy using cryptography. In this paper, we report on a year-long effort to design, implement, fabricate, and validate CoPHEE: a novel co-processor design that mitigates data leakage risks using partially homomorphic encrypted execution. ASIC designs for encrypted execution impose unique challenges, such as the need for non-traditional arithmetic units (modular inverse, greatest common divisor), very wide datapaths (2048 bits), and the requirement for secure multiplexer units enabling general-purpose execution on encrypted values. Our fully-functional co-processor chip is fabricated in 65nm CMOS technology, and communicates to a main processor via UART. This paper offers an elaborate overview of all steps and design techniques in the ASIC development process, ranging from RTL design to fabrication and validation. We evaluate our co-processor using data-oblivious C++ benchmarks, while our RTL files are available in an open-source repository.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117170848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ENTT: A Family of Emerging NVM-based Trojan Triggers ENTT:基于nvm的新型木马触发器系列
Pub Date : 2019-05-01 DOI: 10.1109/HST.2019.8740836
Karthikeyan Nagarajan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh
Hardware Trojans in the form of malicious modifications during the design and/or the fabrication process is a security concern due to globalization of the semiconductor production process. A Trojan is designed to evade structural and functional testing and trigger under certain conditions (e.g., after a number of clock ticks or assertion of a rare net) and deliver the payload (e.g., denial-of-service, information leakage). A wide variety of logic Trojans (both triggers and payloads) have been identified, however, very limited literature exists on memory Trojans in spite of their high likelihood. Emerging Non-Volatile Memories (NVMs) e.g., Resistive RAM (RRAM) possess unique characteristics e.g., non-volatility and gradual drift in resistance with pulsing voltage that make them a prime target to deploy a Hardware Trojan. In this paper, we present a delay and voltage-based Trojan trigger by exploiting the RRAM resistance drift under pulsing current. Simulation results indicate that these triggers can be activated by accessing a pre-selected address 2500–3000 times (varies with trigger designs) since the proposed trigger requires a large number of hammerings to evade test phase. Due to non-volatility, the hammering need not be consecutive and therefore can evade system-level techniques that can classify hammering as a potential security threat. We also propose a mechanism to reset the triggers. The maximum area and static/dynamic power overheads of the trigger circuit are 6.68μm2 and 104.24μW/0.426μW, respectively in PTM 65nm technology.
由于半导体生产过程的全球化,在设计和/或制造过程中以恶意修改形式存在的硬件木马是一个安全问题。特洛伊木马旨在逃避结构和功能测试,并在特定条件下触发(例如,在一些时钟滴答或断言罕见的网络之后)并传递有效载荷(例如,拒绝服务,信息泄漏)。各种各样的逻辑木马(包括触发器和有效载荷)已经被确定,然而,关于内存木马的文献非常有限,尽管它们的可能性很高。新兴的非易失性存储器(nvm),例如,电阻性RAM (RRAM)具有独特的特性,例如,非易失性和随脉冲电压的电阻逐渐漂移,使其成为部署硬件木马的主要目标。本文利用随机存储器在脉冲电流作用下的电阻漂移,提出了一种基于延时和电压的特洛伊触发器。仿真结果表明,这些触发器可以通过访问预先选择的地址2500-3000次(因触发器设计而异)来激活,因为所提出的触发器需要大量的锤击以逃避测试阶段。由于非易失性,锤击不必是连续的,因此可以逃避将锤击分类为潜在安全威胁的系统级技术。我们还提出了一种重置触发器的机制。在PTM 65nm工艺下,触发电路的最大面积和静态/动态功耗开销分别为6.68μm2和104.24μW/0.426μW。
{"title":"ENTT: A Family of Emerging NVM-based Trojan Triggers","authors":"Karthikeyan Nagarajan, Mohammad Nasim Imtiaz Khan, Swaroop Ghosh","doi":"10.1109/HST.2019.8740836","DOIUrl":"https://doi.org/10.1109/HST.2019.8740836","url":null,"abstract":"Hardware Trojans in the form of malicious modifications during the design and/or the fabrication process is a security concern due to globalization of the semiconductor production process. A Trojan is designed to evade structural and functional testing and trigger under certain conditions (e.g., after a number of clock ticks or assertion of a rare net) and deliver the payload (e.g., denial-of-service, information leakage). A wide variety of logic Trojans (both triggers and payloads) have been identified, however, very limited literature exists on memory Trojans in spite of their high likelihood. Emerging Non-Volatile Memories (NVMs) e.g., Resistive RAM (RRAM) possess unique characteristics e.g., non-volatility and gradual drift in resistance with pulsing voltage that make them a prime target to deploy a Hardware Trojan. In this paper, we present a delay and voltage-based Trojan trigger by exploiting the RRAM resistance drift under pulsing current. Simulation results indicate that these triggers can be activated by accessing a pre-selected address 2500–3000 times (varies with trigger designs) since the proposed trigger requires a large number of hammerings to evade test phase. Due to non-volatility, the hammering need not be consecutive and therefore can evade system-level techniques that can classify hammering as a potential security threat. We also propose a mechanism to reset the triggers. The maximum area and static/dynamic power overheads of the trigger circuit are 6.68μm2 and 104.24μW/0.426μW, respectively in PTM 65nm technology.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"55 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1