首页 > 最新文献

2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
A practical characterization of a NASA SpaceCube application through fault emulation and laser testing 通过故障仿真和激光测试对NASA空间立方体应用进行了实际表征
J. Walters, K. Zick, M. French
Historically, space-based processing systems have lagged behind their terrestrial counterparts by several processor generations due, in part, to the cost and complexity of implementing radiation-hardened processor designs. Efforts such as NASA's SpaceCube seek to change this paradigm, using higher performance commercial hardware wherever possible. This has the potential to revolutionize onboard data processing, but it cannot happen unless the soft error reliability can be characterized and deemed sufficient. A variety of fault injection techniques are used to evaluate system reliability, most commonly fault emulation, fault simulation, laser testing, and particle beam testing. Combining multiple techniques is more complex and less common. In this study we characterize a real-world application that leverages a radiation-hardening by software (RHBSW) solution for the SpaceCube platform, using two fault injection strategies: laser testing and fault emulation. We describe several valuable lessons learned, and show how both validation techniques can be combined to greater effect.
从历史上看,由于实现抗辐射处理器设计的成本和复杂性,天基处理系统已经落后于地面处理系统好几代。NASA的太空立方(SpaceCube)等项目试图改变这种模式,尽可能使用性能更高的商用硬件。这有可能彻底改变机载数据处理,但除非软错误可靠性能够被表征并被认为是足够的,否则无法实现。各种各样的故障注入技术被用来评估系统的可靠性,最常见的是故障仿真、故障模拟、激光测试和粒子束测试。结合多种技术更复杂,也更不常见。在这项研究中,我们描述了一个现实世界的应用,该应用利用软件辐射硬化(RHBSW)解决方案为SpaceCube平台,使用两种故障注入策略:激光测试和故障仿真。我们描述了一些有价值的经验教训,并展示了如何将这两种验证技术结合起来以获得更大的效果。
{"title":"A practical characterization of a NASA SpaceCube application through fault emulation and laser testing","authors":"J. Walters, K. Zick, M. French","doi":"10.1109/DSN.2013.6575354","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575354","url":null,"abstract":"Historically, space-based processing systems have lagged behind their terrestrial counterparts by several processor generations due, in part, to the cost and complexity of implementing radiation-hardened processor designs. Efforts such as NASA's SpaceCube seek to change this paradigm, using higher performance commercial hardware wherever possible. This has the potential to revolutionize onboard data processing, but it cannot happen unless the soft error reliability can be characterized and deemed sufficient. A variety of fault injection techniques are used to evaluate system reliability, most commonly fault emulation, fault simulation, laser testing, and particle beam testing. Combining multiple techniques is more complex and less common. In this study we characterize a real-world application that leverages a radiation-hardening by software (RHBSW) solution for the SpaceCube platform, using two fault injection strategies: laser testing and fault emulation. We describe several valuable lessons learned, and show how both validation techniques can be combined to greater effect.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FTSPM: A Fault-Tolerant ScratchPad Memory FTSPM:一种容错的暂存存储器
Amir Mahdi Hosseini Monazzah, Hamed Farbeh, S. Miremadi, M. Fazeli, H. Asadi
ScratchPad Memory (SPM) is an important part of most modern embedded processors. The use of embedded processors in safety-critical applications implies including fault tolerance in the design of SPM. This paper proposes a method, called FTSPM, which integrates a multi-priority mapping algorithm with a hybrid SPM structure. The proposed structure divides SPM into three parts: 1) a part is equipped with Non-Volatile Memory (NVM) which is immune against soft errors, 2) a part is equipped with Error-Correcting Code, and 3) a part is equipped with parity. The proposed mapping algorithm is responsible to distribute the program blocks among the above three parts with regards to their vulnerability level. The simulation results demonstrate that the FTSPM reduces the SPM vulnerability by about 7x in comparison to a pure SRAM-based SPM. In addition, the dynamic energy consumption of the proposed method is 77% and 47% less than that of a pure NVM-based SPM and a pure SRAM-based SPM, respectively.
ScratchPad Memory (SPM)是大多数现代嵌入式处理器的重要组成部分。在安全关键型应用程序中使用嵌入式处理器意味着在SPM的设计中包括容错性。本文提出了一种将多优先级映射算法与混合SPM结构相结合的FTSPM方法。提出的结构将SPM分为三部分:1)一个部分配备非易失性存储器(Non-Volatile Memory, NVM),它可以抵抗软错误,2)一个部分配备纠错码,3)一个部分配备奇偶校验。本文提出的映射算法负责将程序块根据漏洞级别在上述三个部分之间进行分配。仿真结果表明,与纯基于sram的SPM相比,FTSPM将SPM漏洞减少了约7倍。此外,该方法的动态能量消耗比基于nvm的纯SPM和基于sram的纯SPM分别低77%和47%。
{"title":"FTSPM: A Fault-Tolerant ScratchPad Memory","authors":"Amir Mahdi Hosseini Monazzah, Hamed Farbeh, S. Miremadi, M. Fazeli, H. Asadi","doi":"10.1109/DSN.2013.6575351","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575351","url":null,"abstract":"ScratchPad Memory (SPM) is an important part of most modern embedded processors. The use of embedded processors in safety-critical applications implies including fault tolerance in the design of SPM. This paper proposes a method, called FTSPM, which integrates a multi-priority mapping algorithm with a hybrid SPM structure. The proposed structure divides SPM into three parts: 1) a part is equipped with Non-Volatile Memory (NVM) which is immune against soft errors, 2) a part is equipped with Error-Correcting Code, and 3) a part is equipped with parity. The proposed mapping algorithm is responsible to distribute the program blocks among the above three parts with regards to their vulnerability level. The simulation results demonstrate that the FTSPM reduces the SPM vulnerability by about 7x in comparison to a pure SRAM-based SPM. In addition, the dynamic energy consumption of the proposed method is 77% and 47% less than that of a pure NVM-based SPM and a pure SRAM-based SPM, respectively.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128840744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
DATAFLASKS: An epidemic dependable key-value substrate DATAFLASKS:一种流行的可靠键值基板
Francisco Maia, M. Matos, R. Vilaça, J. Pereira, R. Oliveira, E. Rivière
Recently, tuple-stores have become pivotal structures in many information systems. Their ability to handle large datasets makes them important in an era with unprecedented amounts of data being produced and exchanged. However, these tuple-stores typically rely on structured peer-to-peer protocols which assume moderately stable environments. Such assumption does not always hold for very large scale systems sized in the scale of thousands of machines. In this paper we present a novel approach to the design of a tuple-store. Our approach follows a stratified design based on an unstructured substrate. We focus on this substrate and how the use of epidemic protocols allow reaching high dependability and scalability.
近年来,双存储已成为许多信息系统中的关键结构。它们处理大型数据集的能力使它们在一个产生和交换前所未有的大量数据的时代变得重要。然而,这些元存储通常依赖于结构化的点对点协议,这些协议假定环境适度稳定。这种假设并不总是适用于成千上万台机器的大规模系统。在本文中,我们提出了一种设计双存储的新方法。我们的方法遵循基于非结构化基板的分层设计。我们将重点关注这个底层,以及如何使用流行协议来实现高可靠性和可扩展性。
{"title":"DATAFLASKS: An epidemic dependable key-value substrate","authors":"Francisco Maia, M. Matos, R. Vilaça, J. Pereira, R. Oliveira, E. Rivière","doi":"10.1109/DSN.2013.6575326","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575326","url":null,"abstract":"Recently, tuple-stores have become pivotal structures in many information systems. Their ability to handle large datasets makes them important in an era with unprecedented amounts of data being produced and exchanged. However, these tuple-stores typically rely on structured peer-to-peer protocols which assume moderately stable environments. Such assumption does not always hold for very large scale systems sized in the scale of thousands of machines. In this paper we present a novel approach to the design of a tuple-store. Our approach follows a stratified design based on an unstructured substrate. We focus on this substrate and how the use of epidemic protocols allow reaching high dependability and scalability.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130454084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of bugs in Apache Virtual Computing Lab Apache虚拟计算实验室的bug分析
Flavio Frattini, R. Ghosh, M. Cinque, A. Rindos, Kishor S. Trivedi
Understanding the bugs in software platforms is extremely valuable for developers, especially during the testing phase. However, this is a rarely investigated issue for open source Cloud platforms till date. In this paper, we present the analysis of 146 bug reports from Apache Virtual Computing Lab, a representative open source Cloud platform. Analysis is performed by means of an empirical approach tailored to open source Clouds. For VCL development and test teams, these results provide useful guidelines, e.g., directing volunteers' effort to components where more residual bugs are expected to be found.
了解软件平台中的bug对开发人员来说是非常有价值的,尤其是在测试阶段。然而,到目前为止,对于开源云平台来说,这是一个很少被调查的问题。在本文中,我们对Apache虚拟计算实验室的146个bug报告进行了分析,这是一个具有代表性的开源云平台。分析是通过为开源云量身定制的经验方法执行的。对于VCL开发和测试团队,这些结果提供了有用的指导方针,例如,将志愿者的工作引导到预计会发现更多残留错误的组件上。
{"title":"Analysis of bugs in Apache Virtual Computing Lab","authors":"Flavio Frattini, R. Ghosh, M. Cinque, A. Rindos, Kishor S. Trivedi","doi":"10.1109/DSN.2013.6575324","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575324","url":null,"abstract":"Understanding the bugs in software platforms is extremely valuable for developers, especially during the testing phase. However, this is a rarely investigated issue for open source Cloud platforms till date. In this paper, we present the analysis of 146 bug reports from Apache Virtual Computing Lab, a representative open source Cloud platform. Analysis is performed by means of an empirical approach tailored to open source Clouds. For VCL development and test teams, these results provide useful guidelines, e.g., directing volunteers' effort to components where more residual bugs are expected to be found.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
DRIP: A framework for purifying trojaned kernel drivers 一个净化木马内核驱动程序的框架
Zhongshu Gu, Nick Sumner, Zhui Deng, X. Zhang, Dongyan Xu
Kernel drivers are usually provided in the form of loadable kernel extensions, which can be loaded/unloaded dynamically at runtime and execute with the same privilege as the core operating system kernel. The unrestricted security access from the drivers to the kernel is nevertheless a double-edged sword that makes them susceptible targets of trojan attacks. Given a benign driver, it is now easy to implant malicious logic with existing hacking tools. Once implanted, such malicious logic is difficult to detect. In this paper we propose DRIP, a framework for detecting and eliminating malicious logic embedded in a kernel driver through iteratively eliminating unnecessary kernel API invocations from the driver. When provided with the binary of a trojaned driver, DRIP generates a purified driver with benign functionalities preserved and malicious ones eliminated. Our evaluation shows that DRIP successfully eliminates malicious effects of trojaned drivers in the system, with the purified drivers maintaining or even improving their performance over the trojaned drivers.
内核驱动程序通常以可加载内核扩展的形式提供,它可以在运行时动态加载/卸载,并以与核心操作系统内核相同的特权执行。然而,从驱动程序到内核的无限制安全访问是一把双刃剑,使它们容易成为木马攻击的目标。给定一个良性驱动程序,现在很容易在现有的黑客工具中植入恶意逻辑。这种恶意逻辑一旦被植入,就很难被发现。在本文中,我们提出了DRIP,这是一个通过迭代地消除驱动程序中不必要的内核API调用来检测和消除嵌入在内核驱动程序中的恶意逻辑的框架。当提供木马驱动程序的二进制文件时,DRIP生成一个纯化的驱动程序,保留良性功能,消除恶意功能。我们的评估表明,DRIP成功地消除了系统中木马驱动程序的恶意影响,纯化的驱动程序保持甚至提高了木马驱动程序的性能。
{"title":"DRIP: A framework for purifying trojaned kernel drivers","authors":"Zhongshu Gu, Nick Sumner, Zhui Deng, X. Zhang, Dongyan Xu","doi":"10.1109/DSN.2013.6575342","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575342","url":null,"abstract":"Kernel drivers are usually provided in the form of loadable kernel extensions, which can be loaded/unloaded dynamically at runtime and execute with the same privilege as the core operating system kernel. The unrestricted security access from the drivers to the kernel is nevertheless a double-edged sword that makes them susceptible targets of trojan attacks. Given a benign driver, it is now easy to implant malicious logic with existing hacking tools. Once implanted, such malicious logic is difficult to detect. In this paper we propose DRIP, a framework for detecting and eliminating malicious logic embedded in a kernel driver through iteratively eliminating unnecessary kernel API invocations from the driver. When provided with the binary of a trojaned driver, DRIP generates a purified driver with benign functionalities preserved and malicious ones eliminated. Our evaluation shows that DRIP successfully eliminates malicious effects of trojaned drivers in the system, with the purified drivers maintaining or even improving their performance over the trojaned drivers.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122544249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software 在系统软件的错误处理代码中检测资源释放遗漏错误
S. Saha, Jean-Pierre Lozi, Gaël Thomas, J. Lawall, Gilles Muller
Omitting resource-release operations in systems error handling code can lead to memory leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of reproducing system errors, the diversity of system resources, and the lack of appropriate abstractions in the C language. To address these issues, numerous approaches have been proposed that globally scan a code base for common resource-release operations. Such macroscopic approaches are notorious for their many false positives, while also leaving many faults undetected. We propose a novel microscopic approach to finding resource-release omission faults in systems software. Rather than generalizing from the entire source code, our approach focuses on the error-handling code of each function. Using our tool, Hector, we have found over 370 faults in six systems software projects, including Linux, with a 23% false positive rate. Some of these faults allow an unprivileged malicious user to crash the entire system.
在系统错误处理代码中省略资源释放操作可能导致内存泄漏、崩溃和死锁。由于再现系统错误的困难、系统资源的多样性以及C语言中缺乏适当的抽象,发现遗漏错误是具有挑战性的。为了解决这些问题,已经提出了许多方法来全局扫描代码库以查找常见的资源释放操作。这种宏观方法因其许多误报而臭名昭著,同时也留下了许多未被发现的错误。我们提出了一种新的微观方法来发现系统软件中的资源释放遗漏故障。我们的方法侧重于每个函数的错误处理代码,而不是从整个源代码泛化。使用我们的工具Hector,我们在包括Linux在内的6个系统软件项目中发现了370多个错误,误报率为23%。其中一些错误允许非特权恶意用户使整个系统崩溃。
{"title":"Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software","authors":"S. Saha, Jean-Pierre Lozi, Gaël Thomas, J. Lawall, Gilles Muller","doi":"10.1109/DSN.2013.6575307","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575307","url":null,"abstract":"Omitting resource-release operations in systems error handling code can lead to memory leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of reproducing system errors, the diversity of system resources, and the lack of appropriate abstractions in the C language. To address these issues, numerous approaches have been proposed that globally scan a code base for common resource-release operations. Such macroscopic approaches are notorious for their many false positives, while also leaving many faults undetected. We propose a novel microscopic approach to finding resource-release omission faults in systems software. Rather than generalizing from the entire source code, our approach focuses on the error-handling code of each function. Using our tool, Hector, we have found over 370 faults in six systems software projects, including Linux, with a 23% false positive rate. Some of these faults allow an unprivileged malicious user to crash the entire system.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
A logic for model-checking mean-field models 用于模型检查平均场模型的逻辑
A. Kolesnichenko, P. Boer, Anne Remke, B. Haverkort
Recently the mean-field method has been adopted for analysing systems consisting of a large number of interacting objects in computer science, biology, chemistry, etc. It allows for a quick and accurate analysis of such systems, while avoiding the state-space explosion problem. So far, the method has primarily been used for performance evaluation. In this paper, we use the mean-field method for model-checking. We define and motivate a logic MF-CSL for describing properties of systems composed of many identical interacting objects. The proposed logic allows describing both properties of the overall system and of a random individual object. Algorithms to check the satisfaction relation for all MF-CSL operators are proposed. Furthermore, we explain how the set of all time instances that fulfill a given MF-CSL formula for a certain distribution of objects can be computed.
近年来,在计算机科学、生物学、化学等领域,平均场法已被广泛用于分析由大量相互作用的对象组成的系统。它允许对这样的系统进行快速和准确的分析,同时避免状态空间爆炸问题。到目前为止,该方法主要用于绩效评估。在本文中,我们使用平均场方法进行模型检验。我们定义并激发了一个逻辑MF-CSL来描述由许多相同的相互作用对象组成的系统的属性。所提出的逻辑允许描述整个系统和随机单个对象的属性。提出了检验所有MF-CSL算子满足关系的算法。此外,我们解释了如何计算给定对象分布的所有时间实例的集合,这些实例满足给定的MF-CSL公式。
{"title":"A logic for model-checking mean-field models","authors":"A. Kolesnichenko, P. Boer, Anne Remke, B. Haverkort","doi":"10.1109/DSN.2013.6575345","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575345","url":null,"abstract":"Recently the mean-field method has been adopted for analysing systems consisting of a large number of interacting objects in computer science, biology, chemistry, etc. It allows for a quick and accurate analysis of such systems, while avoiding the state-space explosion problem. So far, the method has primarily been used for performance evaluation. In this paper, we use the mean-field method for model-checking. We define and motivate a logic MF-CSL for describing properties of systems composed of many identical interacting objects. The proposed logic allows describing both properties of the overall system and of a random individual object. Algorithms to check the satisfaction relation for all MF-CSL operators are proposed. Furthermore, we explain how the set of all time instances that fulfill a given MF-CSL formula for a certain distribution of objects can be computed.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1