首页 > 最新文献

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control 启用安全云存储和访问控制的密文重复数据删除功能
Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, J. Weng, K. Ren
To secure cloud storage and enforce access control, data encryption has become essential, given the ever increasing cyber threat everywhere. Attribute-based Encryption (ABE) crypto systems are widely considered as a promising solution under such a context for its security strength, scalability and control flexibility. One major challenge, however, for applying ABE-based techniques in real world applications is its high overhead in various aspects. In this research, we are particularly concerned with the storage size expansion in existing ABE schemes. This combined with the vast-size nature of the cloud data poses an enormous challenge to the effective usage of the cloud data storage space and affects the utility of data deduplication. Normally, data deduplication is carried out based on identifying similar and even identical contents both within and between data files, however, these patterns will be destroyed after performing data encryption using any semantically secure encryption scheme including ABE. In this research, we focus on ciphertexts deduplication under ABE, which to our best knowledge is the first of such an effort. Our fundamental observation stems from the structure of ABE ciphertexts and the possible similarities among different access structures. We show how to design a secure ciphertext deduplication scheme based on a classical CP-ABE scheme by innovatively modifying the construction with a recursive algorithm, eliminating the duplicated secrets and adding additional randomness to some certain ciphertext. We then give a detailed analysis on the proposed scheme with respect to both efficiency and security. To thoroughly assess the performance of the proposed scheme, we also implement a prototype system and conduct comprehensive experiments, which shows that our ciphertext reduplication scheme could reduce up to 80% computation and storage cost in the best case.
鉴于无处不在的日益增加的网络威胁,为了保护云存储并实施访问控制,数据加密变得至关重要。基于属性的加密(ABE)加密系统因其安全强度、可扩展性和控制灵活性而被广泛认为是一种很有前途的解决方案。然而,在现实世界的应用程序中应用基于abe的技术的一个主要挑战是它在各个方面的高开销。在本研究中,我们特别关注现有ABE方案中的存储大小扩展。再加上云数据的庞大规模,这对有效利用云数据存储空间构成了巨大挑战,并影响了重复数据删除的效用。通常,重复数据删除是基于识别数据文件内部和文件之间相似甚至相同的内容来进行的,但是,使用任何语义安全的加密方案(包括ABE)进行数据加密后,这些模式都会被破坏。在本研究中,我们重点关注ABE下的密文重复数据删除,据我们所知,这是此类努力的第一次。我们的基本观察源于ABE密文的结构和不同访问结构之间可能存在的相似性。我们展示了如何在经典CP-ABE方案的基础上设计安全的密文重复数据删除方案,通过递归算法创新地修改结构,消除重复的秘密并为某些特定的密文添加额外的随机性。然后,从效率和安全性两个方面对所提出的方案进行了详细的分析。为了全面评估该方案的性能,我们还实现了一个原型系统并进行了全面的实验,结果表明我们的密文复制方案在最佳情况下可以减少高达80%的计算和存储成本。
{"title":"Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control","authors":"Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, J. Weng, K. Ren","doi":"10.1145/2897845.2897846","DOIUrl":"https://doi.org/10.1145/2897845.2897846","url":null,"abstract":"To secure cloud storage and enforce access control, data encryption has become essential, given the ever increasing cyber threat everywhere. Attribute-based Encryption (ABE) crypto systems are widely considered as a promising solution under such a context for its security strength, scalability and control flexibility. One major challenge, however, for applying ABE-based techniques in real world applications is its high overhead in various aspects. In this research, we are particularly concerned with the storage size expansion in existing ABE schemes. This combined with the vast-size nature of the cloud data poses an enormous challenge to the effective usage of the cloud data storage space and affects the utility of data deduplication. Normally, data deduplication is carried out based on identifying similar and even identical contents both within and between data files, however, these patterns will be destroyed after performing data encryption using any semantically secure encryption scheme including ABE. In this research, we focus on ciphertexts deduplication under ABE, which to our best knowledge is the first of such an effort. Our fundamental observation stems from the structure of ABE ciphertexts and the possible similarities among different access structures. We show how to design a secure ciphertext deduplication scheme based on a classical CP-ABE scheme by innovatively modifying the construction with a recursive algorithm, eliminating the duplicated secrets and adding additional randomness to some certain ciphertext. We then give a detailed analysis on the proposed scheme with respect to both efficiency and security. To thoroughly assess the performance of the proposed scheme, we also implement a prototype system and conduct comprehensive experiments, which shows that our ciphertext reduplication scheme could reduce up to 80% computation and storage cost in the best case.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Secure Dynamic SSE via Access Indistinguishable Storage 安全动态SSE通过访问不可区分的存储
Tianhao Wang, Yunlei Zhao
Cloud storage services such as Dropbox [1] and Google Drive [2] are becoming more and more popular. On the one hand, they provide users with mobility, scalability, and convenience. However, privacy issues arise when the storage becomes not fully controlled by users. Although modern encryption schemes are effective at protecting content of data, there are two drawbacks of the encryption-before-outsourcing approach: First, one kind of sensitive information, Access Pattern of the data is left unprotected. Moreover, encryption usually makes the data difficult to use. In this paper, we propose AIS (Access Indistinguishable Storage), the first client-side system that can partially conceal access pattern of the cloud storage in constant time. Besides data content, AIS can conceal information about the number of initial files, and length of each initial file. When it comes to the access phase after initiation, AIS can effectively conceal the behavior (read or write) and target file of the current access. Moreover, the existence and length of each file will remain confidential as long as there is no access after initiation. One application of AIS is SSE (Searchable Symmetric Encryption), which makes the encrypted data searchable. Based on AIS, we propose SBA (SSE Built on AIS). To the best of our knowledge, SBA is safer than any other SSE systems of the same complexity, and SBA is the first to conceal whether current keyword was queried before, the first to conceal whether current operation is an addition or deletion, and the first to support direct modification of files.
Dropbox[1]和Google Drive[2]等云存储服务越来越受欢迎。一方面,它们为用户提供了移动性、可扩展性和便利性。但是,当存储不完全由用户控制时,就会出现隐私问题。尽管现代加密方案在保护数据内容方面是有效的,但这种先加密后外包的方法存在两个缺点:首先,一类敏感信息,即数据的访问模式没有得到保护。此外,加密通常会使数据难以使用。在本文中,我们提出了AIS (Access ininguishable Storage),这是第一个能够在恒定时间内部分隐藏云存储访问模式的客户端系统。除了数据内容外,AIS还可以隐藏初始文件的数量和每个初始文件的长度等信息。在启动后的访问阶段,AIS可以有效地隐藏当前访问的行为(读或写)和目标文件。此外,只要启动后没有访问,每个文件的存在和长度将保持机密。AIS的一个应用是SSE(可搜索对称加密),它使加密的数据可搜索。基于AIS,我们提出了SBA (SSE Built on AIS)。据我们所知,SBA比其他相同复杂度的SSE系统更安全,SBA是第一个隐藏当前关键字之前是否被查询过,第一个隐藏当前操作是添加还是删除,第一个支持直接修改文件的系统。
{"title":"Secure Dynamic SSE via Access Indistinguishable Storage","authors":"Tianhao Wang, Yunlei Zhao","doi":"10.1145/2897845.2897884","DOIUrl":"https://doi.org/10.1145/2897845.2897884","url":null,"abstract":"Cloud storage services such as Dropbox [1] and Google Drive [2] are becoming more and more popular. On the one hand, they provide users with mobility, scalability, and convenience. However, privacy issues arise when the storage becomes not fully controlled by users. Although modern encryption schemes are effective at protecting content of data, there are two drawbacks of the encryption-before-outsourcing approach: First, one kind of sensitive information, Access Pattern of the data is left unprotected. Moreover, encryption usually makes the data difficult to use. In this paper, we propose AIS (Access Indistinguishable Storage), the first client-side system that can partially conceal access pattern of the cloud storage in constant time. Besides data content, AIS can conceal information about the number of initial files, and length of each initial file. When it comes to the access phase after initiation, AIS can effectively conceal the behavior (read or write) and target file of the current access. Moreover, the existence and length of each file will remain confidential as long as there is no access after initiation. One application of AIS is SSE (Searchable Symmetric Encryption), which makes the encrypted data searchable. Based on AIS, we propose SBA (SSE Built on AIS). To the best of our knowledge, SBA is safer than any other SSE systems of the same complexity, and SBA is the first to conceal whether current keyword was queried before, the first to conceal whether current operation is an addition or deletion, and the first to support direct modification of files.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123255458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Device-Enhanced Password Protocols with Optimal Online-Offline Protection 设备增强密码协议与最佳的联机-离线保护
Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena
We introduce a setting that we call Device-Enhanced PAKE (DE-PAKE), where PAKE (password-authenticated key exchange) protocols are strengthened against online and offline attacks through the use of an auxiliary device that aids the user in the authentication process. We build such schemes and show that their security, properly formalized, achieves maximal-attainable resistance to online and offline attacks in both PKI and PKI-free settings. In particular, an online attacker must guess the user's password and also corrupt the user's auxiliary device to authenticate, while an attacker who corrupts the server cannot learn the users' passwords via an offline dictionary attack. Notably, our solutions do not require secure channels, and nothing (in an information-theoretic sense) is learned about the password by the device (or a malicious software running on the device) or over the device-client channel, even without any external protection of this channel. An attacker taking over the device still requires a full online attack to impersonate the user. Importantly, our DE-PAKE scheme can be deployed at the user end without the need to modify the server and without the server having to be aware that the user is using a DE-PAKE scheme. In particular, the schemes can work with standard servers running the usual password-over-TLS authentication. We use these protocols to implement a practical DE-PAKE system and we evaluate its performance. To improve usability the implemented system utilizes automated and user-transparent data channel between the mobile device and the client, falling back to localized communication if the device looses primary connectivity.
我们引入了一种称为设备增强PAKE (DE-PAKE)的设置,其中PAKE(密码认证密钥交换)协议通过使用辅助设备来帮助用户进行身份验证过程,从而加强了对在线和离线攻击的防御。我们构建了这样的方案,并表明它们的安全性,适当形式化,在PKI和无PKI设置中实现了对在线和离线攻击的最大可实现阻力。特别是,在线攻击者必须猜测用户的密码并破坏用户的辅助设备进行身份验证,而破坏服务器的攻击者无法通过离线字典攻击了解用户的密码。值得注意的是,我们的解决方案不需要安全通道,设备(或在设备上运行的恶意软件)或设备-客户端通道(即使没有对该通道进行任何外部保护)对密码一无所知(从信息论的意义上说)。攻击者接管设备仍然需要一个完整的在线攻击来冒充用户。重要的是,我们的DE-PAKE方案可以部署在用户端,而不需要修改服务器,服务器也不必知道用户正在使用DE-PAKE方案。特别是,这些方案可以与运行通常的密码over tls身份验证的标准服务器一起工作。我们使用这些协议实现了一个实际的DE-PAKE系统,并对其性能进行了评估。为了提高可用性,实现的系统在移动设备和客户端之间利用自动化和用户透明的数据通道,如果设备失去主要连接,则回落到本地化通信。
{"title":"Device-Enhanced Password Protocols with Optimal Online-Offline Protection","authors":"Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena","doi":"10.1145/2897845.2897880","DOIUrl":"https://doi.org/10.1145/2897845.2897880","url":null,"abstract":"We introduce a setting that we call Device-Enhanced PAKE (DE-PAKE), where PAKE (password-authenticated key exchange) protocols are strengthened against online and offline attacks through the use of an auxiliary device that aids the user in the authentication process. We build such schemes and show that their security, properly formalized, achieves maximal-attainable resistance to online and offline attacks in both PKI and PKI-free settings. In particular, an online attacker must guess the user's password and also corrupt the user's auxiliary device to authenticate, while an attacker who corrupts the server cannot learn the users' passwords via an offline dictionary attack. Notably, our solutions do not require secure channels, and nothing (in an information-theoretic sense) is learned about the password by the device (or a malicious software running on the device) or over the device-client channel, even without any external protection of this channel. An attacker taking over the device still requires a full online attack to impersonate the user. Importantly, our DE-PAKE scheme can be deployed at the user end without the need to modify the server and without the server having to be aware that the user is using a DE-PAKE scheme. In particular, the schemes can work with standard servers running the usual password-over-TLS authentication. We use these protocols to implement a practical DE-PAKE system and we evaluate its performance. To improve usability the implemented system utilizes automated and user-transparent data channel between the mobile device and the client, falling back to localized communication if the device looses primary connectivity.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Building an Encrypted, Distributed, and Searchable Key-value Store 构建加密、分布式和可搜索的键值存储
Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin
Modern distributed key-value stores are offering superior performance, incremental scalability, and fine availability for data-intensive computing and cloud-based applications. Among those distributed data stores, the designs that ensure the confidentiality of sensitive data, however, have not been fully explored yet. In this paper, we focus on designing and implementing an encrypted, distributed, and searchable key-value store. It achieves strong protection on data privacy while preserving all the above prominent features of plaintext systems. We first design a secure data partition algorithm that distributes encrypted data evenly across a cluster of nodes. Based on this algorithm, we propose a secure transformation layer that supports multiple data models in a privacy-preserving way, and implement two basic APIs for the proposed encrypted key-value store. To enable secure search queries for secondary attributes of data, we leverage searchable symmetric encryption to design the encrypted secondary indexes which consider security, efficiency, and data locality simultaneously, and further enable secure query processing in parallel. For completeness, we present formal security analysis to demonstrate the strong security strength of the proposed designs. We implement the system prototype and deploy it to a cluster at Microsoft Azure. Comprehensive performance evaluation is conducted in terms of Put/Get throughput, Put/Get latency under different workloads, system scaling cost, and secure query performance. The comparison with Redis shows that our prototype can function in a practical manner.
现代分布式键值存储为数据密集型计算和基于云的应用程序提供了卓越的性能、增量可伸缩性和良好的可用性。然而,在这些分布式数据存储中,如何保证敏感数据的机密性还没有得到充分的研究。在本文中,我们专注于设计和实现一个加密的、分布式的、可搜索的键值存储。它在保留明文系统的所有突出特征的同时,对数据隐私进行了强有力的保护。我们首先设计了一个安全的数据分区算法,将加密的数据均匀地分布在一个节点集群上。在此基础上,提出了一种支持多种数据模型的安全转换层,并为所提出的加密键值存储实现了两个基本api。为了支持对数据次要属性的安全搜索查询,我们利用可搜索对称加密来设计加密的次要索引,这些索引同时考虑安全性、效率和数据局部性,并进一步支持并行的安全查询处理。为了完整起见,我们提出了正式的安全分析来证明所建议设计的强安全强度。我们实现了系统原型,并将其部署到Microsoft Azure的集群中。从不同工作负载下的Put/Get吞吐量、Put/Get延迟、系统扩展成本、安全查询性能等方面进行综合性能评估。与Redis的比较表明,我们的原型可以以实际的方式运行。
{"title":"Building an Encrypted, Distributed, and Searchable Key-value Store","authors":"Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin","doi":"10.1145/2897845.2897852","DOIUrl":"https://doi.org/10.1145/2897845.2897852","url":null,"abstract":"Modern distributed key-value stores are offering superior performance, incremental scalability, and fine availability for data-intensive computing and cloud-based applications. Among those distributed data stores, the designs that ensure the confidentiality of sensitive data, however, have not been fully explored yet. In this paper, we focus on designing and implementing an encrypted, distributed, and searchable key-value store. It achieves strong protection on data privacy while preserving all the above prominent features of plaintext systems. We first design a secure data partition algorithm that distributes encrypted data evenly across a cluster of nodes. Based on this algorithm, we propose a secure transformation layer that supports multiple data models in a privacy-preserving way, and implement two basic APIs for the proposed encrypted key-value store. To enable secure search queries for secondary attributes of data, we leverage searchable symmetric encryption to design the encrypted secondary indexes which consider security, efficiency, and data locality simultaneously, and further enable secure query processing in parallel. For completeness, we present formal security analysis to demonstrate the strong security strength of the proposed designs. We implement the system prototype and deploy it to a cluster at Microsoft Azure. Comprehensive performance evaluation is conducted in terms of Put/Get throughput, Put/Get latency under different workloads, system scaling cost, and secure query performance. The comparison with Redis shows that our prototype can function in a practical manner.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Gait-Based Wi-Fi Signatures for Privacy-Preserving 基于gait的Wi-Fi隐私保护签名
Yan Li, Ting Zhu
With the advent of the Internet of Things (IoT) and big data, high fidelity localization and tracking systems that employ cameras, RFIDs, and attached sensors intrude on personal privacy. However, the benefit of localization information sharing enables trend forecasting and automation. To address this challenge, we introduce Wobly, an attribute based signature (ABS) that measures gait. Wobly passively receives Wi-Fi beacons and produces human signatures based on the Doppler Effect and multipath signals without attached devices and out of direct line-of-sight. Because signatures are specific to antenna placement and room configuration and do not require sensor attachments, the identities of the individuals can remain anonymous. However, the gait based signatures are still unique, and thus Wobly is able to track individuals in a building or home. Wobly uses the physical layer channel and the unique human gait as a means of encoding a person's identity. We implemented Wobly on a National Instruments Radio Frequency (RF) test bed. Using a simple naive Bayes classifier, the correct identification rate was 87% with line-of-sight (LoS) and 77% with non-line-of-sight (NLoS).
随着物联网(IoT)和大数据的出现,采用摄像头、rfid和附加传感器的高保真定位和跟踪系统侵犯了个人隐私。然而,本地化信息共享的好处使趋势预测和自动化成为可能。为了应对这一挑战,我们引入了Wobly,一种基于属性的特征(ABS)来测量步态。Wobly被动接收Wi-Fi信标,并根据多普勒效应和多径信号产生人类特征,无需附加设备,也不在直接视线范围内。由于签名是特定于天线位置和房间配置的,不需要传感器附件,因此个人身份可以保持匿名。然而,基于步态的特征仍然是独一无二的,因此Wobly能够跟踪建筑物或家中的个人。Wobly使用物理层通道和独特的人类步态作为编码一个人身份的手段。我们在美国国家仪器公司的射频(RF)测试台上实现了Wobly。使用简单的朴素贝叶斯分类器,视距(LoS)和非视距(NLoS)的识别率分别为87%和77%。
{"title":"Gait-Based Wi-Fi Signatures for Privacy-Preserving","authors":"Yan Li, Ting Zhu","doi":"10.1145/2897845.2897909","DOIUrl":"https://doi.org/10.1145/2897845.2897909","url":null,"abstract":"With the advent of the Internet of Things (IoT) and big data, high fidelity localization and tracking systems that employ cameras, RFIDs, and attached sensors intrude on personal privacy. However, the benefit of localization information sharing enables trend forecasting and automation. To address this challenge, we introduce Wobly, an attribute based signature (ABS) that measures gait. Wobly passively receives Wi-Fi beacons and produces human signatures based on the Doppler Effect and multipath signals without attached devices and out of direct line-of-sight. Because signatures are specific to antenna placement and room configuration and do not require sensor attachments, the identities of the individuals can remain anonymous. However, the gait based signatures are still unique, and thus Wobly is able to track individuals in a building or home. Wobly uses the physical layer channel and the unique human gait as a means of encoding a person's identity. We implemented Wobly on a National Instruments Radio Frequency (RF) test bed. Using a simple naive Bayes classifier, the correct identification rate was 87% with line-of-sight (LoS) and 77% with non-line-of-sight (NLoS).","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Efficient Secure Outsourcing of Large-scale Quadratic Programs 大规模二次型规划的高效安全外包
Sergio Salinas, Changqing Luo, Weixian Liao, Pan Li
The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient computing resources to analyze their large-scale data in a cost-effective and timely way. Cloud computing offers access to vast computing resources on an on-demand and pay-per-use basis, which is a practical way for people to analyze their huge data sets. However, since their data contain sensitive information that needs to be kept secret for ethical, security, or legal reasons, many people are reluctant to adopt cloud computing. For the first time in the literature, we propose a secure outsourcing algorithm for large-scale quadratic programs (QPs), which is one of the most fundamental problems in data analysis. Specifically, based on simple linear algebra operations, we design a low-complexity QP transformation that protects the private data in a QP. We show that the transformed QP is computationally indistinguishable under a chosen plaintext attack (CPA), i.e., CPA-secure. We then develop a parallel algorithm to solve the transformed QP at the cloud, and efficiently find the solution to the original QP at the user. We implement the proposed algorithm on the Amazon Elastic Compute Cloud (EC2) and a laptop. We find that our proposed algorithm offers significant time savings for the user and is scalable to the size of the QP.
当今社会正在收集的大量数据具有推进科学知识和推动创新的潜力。然而,人们往往缺乏足够的计算资源,无法高效、及时地分析海量数据。云计算以按需和按使用付费的方式提供了对大量计算资源的访问,这是人们分析庞大数据集的一种实用方法。然而,由于他们的数据包含出于道德、安全或法律原因需要保密的敏感信息,许多人不愿意采用云计算。在文献中,我们首次提出了一种安全外包算法,用于大规模二次规划(QPs),这是数据分析中最基本的问题之一。具体来说,我们基于简单的线性代数运算,设计了一种低复杂度的QP变换,以保护QP中的私有数据。我们证明了在选择的明文攻击(CPA)下,转换后的QP在计算上是不可区分的,即CPA安全。然后,我们开发了一种并行算法来解决在云上转换的QP,并有效地找到原始QP在用户处的解。我们在Amazon Elastic Compute Cloud (EC2)和笔记本电脑上实现了所提出的算法。我们发现我们提出的算法为用户节省了大量的时间,并且可以扩展到QP的大小。
{"title":"Efficient Secure Outsourcing of Large-scale Quadratic Programs","authors":"Sergio Salinas, Changqing Luo, Weixian Liao, Pan Li","doi":"10.1145/2897845.2897862","DOIUrl":"https://doi.org/10.1145/2897845.2897862","url":null,"abstract":"The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient computing resources to analyze their large-scale data in a cost-effective and timely way. Cloud computing offers access to vast computing resources on an on-demand and pay-per-use basis, which is a practical way for people to analyze their huge data sets. However, since their data contain sensitive information that needs to be kept secret for ethical, security, or legal reasons, many people are reluctant to adopt cloud computing. For the first time in the literature, we propose a secure outsourcing algorithm for large-scale quadratic programs (QPs), which is one of the most fundamental problems in data analysis. Specifically, based on simple linear algebra operations, we design a low-complexity QP transformation that protects the private data in a QP. We show that the transformed QP is computationally indistinguishable under a chosen plaintext attack (CPA), i.e., CPA-secure. We then develop a parallel algorithm to solve the transformed QP at the cloud, and efficiently find the solution to the original QP at the user. We implement the proposed algorithm on the Amazon Elastic Compute Cloud (EC2) and a laptop. We find that our proposed algorithm offers significant time savings for the user and is scalable to the size of the QP.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected 你的证书被泄露,不要惊慌:你可以得到很好的保护
Issa M. Khalil, Zuochao Dou, Abdallah Khreishah
In this paper, we leverage the characteristics of round-trip communications latency (RTL) to design and implement a novel highly secure and usable web authentication scheme, dubbed CLAS. CLAS uses, in addition to the traditional credentials, round trip network communications latency to uniquely identify users. CLAS introduces a novel network architecture which turns RTL into a robust authentication feature that is extremely difficult to forge. CLAS offers robust defense against password compromise because, unlike many traditional authentication mechanisms, it is resilient to phishing/pharming, man-in-the-middle, and social engineering attacks. Most importantly, CLAS is transparent to users and incurs negligible overhead. Our experimental results show that CLAS can achieve 0.0017 false positive rate while maintaining false negative rate below 0.007.
在本文中,我们利用往返通信延迟(RTL)的特征来设计和实现一种新的高度安全和可用的web身份验证方案,称为CLAS。除了传统的凭据之外,CLAS还使用往返网络通信延迟来唯一地标识用户。CLAS引入了一种新颖的网络体系结构,它将RTL转变为一种极其难以伪造的健壮的身份验证特性。CLAS提供了针对密码泄露的强大防御,因为与许多传统的身份验证机制不同,它能够抵御网络钓鱼/欺诈、中间人攻击和社会工程攻击。最重要的是,CLAS对用户是透明的,产生的开销可以忽略不计。我们的实验结果表明,CLAS可以达到0.0017的假阳性率,同时将假阴性率保持在0.007以下。
{"title":"Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected","authors":"Issa M. Khalil, Zuochao Dou, Abdallah Khreishah","doi":"10.1145/2897845.2897925","DOIUrl":"https://doi.org/10.1145/2897845.2897925","url":null,"abstract":"In this paper, we leverage the characteristics of round-trip communications latency (RTL) to design and implement a novel highly secure and usable web authentication scheme, dubbed CLAS. CLAS uses, in addition to the traditional credentials, round trip network communications latency to uniquely identify users. CLAS introduces a novel network architecture which turns RTL into a robust authentication feature that is extremely difficult to forge. CLAS offers robust defense against password compromise because, unlike many traditional authentication mechanisms, it is resilient to phishing/pharming, man-in-the-middle, and social engineering attacks. Most importantly, CLAS is transparent to users and incurs negligible overhead. Our experimental results show that CLAS can achieve 0.0017 false positive rate while maintaining false negative rate below 0.007.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing MAXS:扩展恶意软件执行与顺序多假设检验
Phani Vadrevu, R. Perdisci
In an attempt to coerce useful information about the behavior of new malware families, threat analysts commonly force newly collected malicious software samples to run within a sandboxed environment. The main goal is to gather intelligence that can later be leveraged to detect and enumerate new malware infections within a network. Currently, most analysis environments "blindly" execute each newly collected malware sample for a predetermined amount of time (e.g., four to five minutes). However, a large majority of malware samples that are forced through sandbox execution are simply repackaged versions of previously seen (and already analyzed) malware. Consequently, a significant amount of time may be wasted in analyzing samples that do not generate new intelligence. In this paper, we propose MAXS, a novel probabilistic multi-hypothesis testing framework for scaling execution in malware analysis environments, including bare-metal execution environments. Our main goal is to automatically recognize whether a malware sample that is undergoing dynamic analysis has likely been seen before (e.g., in a "differently packed" form), and determine if we could therefore stop its execution early while avoiding loss of valuable malware intelligence (e.g., without missing DNS queries to never-before-seen malware command-and-control domains). We have tested our prototype implementation of MAXS over two large collections of malware execution traces obtained from two distinct production-level analysis environments. Our experimental results show that using MAXS we are able to reduce malware execution time by up to 50% in average, with less than 0.3% information loss. This roughly translates into the ability to double the capacity of malware sandbox environments, thus significantly optimizing the resources dedicated to malware execution and analysis. Our results are particularly important for bare-metal execution environments, in which it is not easy to leverage the economies of scale that characterize virtual-machine or emulation based malware sandboxes. For example, MAXS could be used to significantly cut the cost of bare-metal analysis environments by reducing the hardware resources needed to analyze a predetermined daily number of new malware samples.
为了获取有关新恶意软件家族行为的有用信息,威胁分析人员通常会强制新收集的恶意软件样本在沙盒环境中运行。其主要目标是收集情报,以便以后用于检测和列举网络中的新恶意软件感染。目前,大多数分析环境“盲目地”执行每个新收集的恶意软件样本一段预定的时间(例如,4到5分钟)。然而,大多数强制通过沙箱执行的恶意软件样本只是先前看到(和已经分析过)的恶意软件的重新打包版本。因此,大量的时间可能浪费在分析不能产生新智能的样本上。在本文中,我们提出了MAXS,一种新的概率多假设测试框架,用于在恶意软件分析环境中扩展执行,包括裸机执行环境。我们的主要目标是自动识别正在进行动态分析的恶意软件样本是否可能以前见过(例如,以“不同包装”的形式),并确定我们是否可以因此及早停止其执行,同时避免丢失有价值的恶意软件情报(例如,不会丢失对从未见过的恶意软件命令和控制域的DNS查询)。我们已经在两个不同的生产级分析环境中获得的两个大型恶意软件执行跟踪集上测试了MAXS的原型实现。我们的实验结果表明,使用MAXS,我们能够将恶意软件的执行时间平均减少高达50%,而信息丢失不到0.3%。这大致转化为将恶意软件沙箱环境的容量增加一倍的能力,从而显着优化专用于恶意软件执行和分析的资源。我们的结果对于裸机执行环境尤其重要,在这种环境中,利用虚拟机或基于仿真的恶意软件沙箱的规模经济是不容易的。例如,MAXS可用于通过减少分析每日预定数量的新恶意软件样本所需的硬件资源,从而显著降低裸机分析环境的成本。
{"title":"MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing","authors":"Phani Vadrevu, R. Perdisci","doi":"10.1145/2897845.2897873","DOIUrl":"https://doi.org/10.1145/2897845.2897873","url":null,"abstract":"In an attempt to coerce useful information about the behavior of new malware families, threat analysts commonly force newly collected malicious software samples to run within a sandboxed environment. The main goal is to gather intelligence that can later be leveraged to detect and enumerate new malware infections within a network. Currently, most analysis environments \"blindly\" execute each newly collected malware sample for a predetermined amount of time (e.g., four to five minutes). However, a large majority of malware samples that are forced through sandbox execution are simply repackaged versions of previously seen (and already analyzed) malware. Consequently, a significant amount of time may be wasted in analyzing samples that do not generate new intelligence. In this paper, we propose MAXS, a novel probabilistic multi-hypothesis testing framework for scaling execution in malware analysis environments, including bare-metal execution environments. Our main goal is to automatically recognize whether a malware sample that is undergoing dynamic analysis has likely been seen before (e.g., in a \"differently packed\" form), and determine if we could therefore stop its execution early while avoiding loss of valuable malware intelligence (e.g., without missing DNS queries to never-before-seen malware command-and-control domains). We have tested our prototype implementation of MAXS over two large collections of malware execution traces obtained from two distinct production-level analysis environments. Our experimental results show that using MAXS we are able to reduce malware execution time by up to 50% in average, with less than 0.3% information loss. This roughly translates into the ability to double the capacity of malware sandbox environments, thus significantly optimizing the resources dedicated to malware execution and analysis. Our results are particularly important for bare-metal execution environments, in which it is not easy to leverage the economies of scale that characterize virtual-machine or emulation based malware sandboxes. For example, MAXS could be used to significantly cut the cost of bare-metal analysis environments by reducing the hardware resources needed to analyze a predetermined daily number of new malware samples.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
SkypeLine: Robust Hidden Data Transmission for VoIP SkypeLine:网络电话的稳健隐藏数据传输
K. Kohls, Thorsten Holz, D. Kolossa, C. Pöpper
Internet censorship is used in many parts of the world to prohibit free access to online information. Different techniques such as IP address or URL blocking, DNS hijacking, or deep packet inspection are used to block access to specific content on the Internet. In response, several censorship circumvention systems were proposed that attempt to bypass existing filters. Especially systems that hide the communication in different types of cover protocols attracted a lot of attention. However, recent research results suggest that this kind of covert traffic can be easily detected by censors. In this paper, we present SkypeLine, a censorship circumvention system that leverages Direct-Sequence Spread Spectrum (DSSS) based steganography to hide information in Voice-over-IP (VoIP) communication. SkypeLine introduces two novel modulation techniques that hide data by modulating information bits on the voice carrier signal using pseudo-random, orthogonal noise sequences and repeating the spreading operation several times. Our design goals focus on undetectability in presence of a strong adversary and improved data rates. As a result, the hiding is inconspicuous, does not alter the statistical characteristics of the carrier signal, and is robust against alterations of the transmitted packets. We demonstrate the performance of SkypeLine based on two simulation studies that cover the theoretical performance and robustness. Our measurements demonstrate that the data rates achieved with our techniques substantially exceed existing DSSS approaches. Furthermore, we prove the real-world applicability of the presented system with an exemplary prototype for Skype.
互联网审查在世界上许多地方被用来禁止自由获取在线信息。IP地址或URL阻断、DNS劫持、深度包检测等技术被用来阻断对Internet上特定内容的访问。作为回应,提出了几个审查规避系统,试图绕过现有的过滤器。特别是在不同类型的掩护协议中隐藏通信的系统引起了人们的广泛关注。然而,最近的研究结果表明,这种隐蔽的流量很容易被审查者发现。在本文中,我们提出了skyeline,一种审查规避系统,它利用基于直接序列扩频(DSSS)的隐写术来隐藏ip语音(VoIP)通信中的信息。skyypeline引入了两种新的调制技术,通过使用伪随机、正交噪声序列调制语音载波信号上的信息位,并多次重复扩展操作来隐藏数据。我们的设计目标集中在强大对手面前的不可检测性和改进的数据速率。因此,这种隐藏是不明显的,不会改变载波信号的统计特性,并且对传输数据包的改变具有鲁棒性。我们在两个仿真研究的基础上证明了skyypeline的性能,包括理论性能和鲁棒性。我们的测量表明,我们的技术实现的数据速率大大超过现有的DSSS方法。此外,我们用Skype的示例原型证明了所提出系统的实际适用性。
{"title":"SkypeLine: Robust Hidden Data Transmission for VoIP","authors":"K. Kohls, Thorsten Holz, D. Kolossa, C. Pöpper","doi":"10.1145/2897845.2897913","DOIUrl":"https://doi.org/10.1145/2897845.2897913","url":null,"abstract":"Internet censorship is used in many parts of the world to prohibit free access to online information. Different techniques such as IP address or URL blocking, DNS hijacking, or deep packet inspection are used to block access to specific content on the Internet. In response, several censorship circumvention systems were proposed that attempt to bypass existing filters. Especially systems that hide the communication in different types of cover protocols attracted a lot of attention. However, recent research results suggest that this kind of covert traffic can be easily detected by censors. In this paper, we present SkypeLine, a censorship circumvention system that leverages Direct-Sequence Spread Spectrum (DSSS) based steganography to hide information in Voice-over-IP (VoIP) communication. SkypeLine introduces two novel modulation techniques that hide data by modulating information bits on the voice carrier signal using pseudo-random, orthogonal noise sequences and repeating the spreading operation several times. Our design goals focus on undetectability in presence of a strong adversary and improved data rates. As a result, the hiding is inconspicuous, does not alter the statistical characteristics of the carrier signal, and is robust against alterations of the transmitted packets. We demonstrate the performance of SkypeLine based on two simulation studies that cover the theoretical performance and robustness. Our measurements demonstrate that the data rates achieved with our techniques substantially exceed existing DSSS approaches. Furthermore, we prove the real-world applicability of the presented system with an exemplary prototype for Skype.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126951901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes 对更好度量的要求:双因素认证方案的比较评价
Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang
Despite over two decades of continuous efforts, how to design a secure and efficient two-factor authentication scheme remains an open issue. Hundreds of new schemes have wave upon wave been proposed, yet most of them are shortly found unable to achieve some important security goals (e.g., truly two-factor security) and desirable properties (e.g., user anonymity), falling into the unsatisfactory "break-fix-break-fix" cycle. In this vicious cycle, protocol designers often advocate the superiorities of their improved scheme, but do not illustrate (or unconsciously overlooking) the aspects on which their scheme performs poorly. In this paper, we first use a series of "improved schemes" over Xu et al.'s 2009 scheme as case studies to highlight that, if there are no improved measurements, more "improved schemes" generally would not mean more advancements. To figure out why the measurement of existing schemes is invariably insufficient, we further investigate into the state-of-the-art evaluation criteria set (i.e., Madhusudhan-Mittal's set). Besides reporting its ambiguities and redundancies, we propose viable fixes and refinements. To our knowledge, we for the first time show that there are at least seven different attacking scenarios that may lead to the failure of a scheme in achieving truly two-factor security. Finally, we conduct a large-scale comparative evaluation of 26 representative two-factor schemes, and our results outline the request for better measurement when assessing new schemes.
尽管经过了二十多年的不断努力,如何设计一个安全高效的双因素身份验证方案仍然是一个悬而未决的问题。人们一波接一波地提出了数百种新方案,但大多数方案很快就被发现无法实现一些重要的安全目标(例如,真正的双因素安全性)和理想的特性(例如,用户匿名性),陷入了令人不满意的“中断-修复-中断-修复”循环。在这个恶性循环中,协议设计者经常鼓吹他们改进方案的优点,但没有说明(或无意识地忽略)他们的方案表现不佳的方面。在本文中,我们首先使用Xu等人2009年方案的一系列“改进方案”作为案例研究来强调,如果没有改进的测量,更多的“改进方案”通常并不意味着更多的进步。为了弄清楚为什么现有方案的测量总是不足的,我们进一步研究了最先进的评估标准集(即Madhusudhan-Mittal的集)。除了报告其歧义和冗余,我们提出可行的修复和改进。据我们所知,我们首次展示了至少有七种不同的攻击场景可能导致方案无法实现真正的双因素安全性。最后,我们对26个具有代表性的双因素方案进行了大规模的比较评估,我们的结果概述了在评估新方案时需要更好的测量。
{"title":"The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes","authors":"Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang","doi":"10.1145/2897845.2897916","DOIUrl":"https://doi.org/10.1145/2897845.2897916","url":null,"abstract":"Despite over two decades of continuous efforts, how to design a secure and efficient two-factor authentication scheme remains an open issue. Hundreds of new schemes have wave upon wave been proposed, yet most of them are shortly found unable to achieve some important security goals (e.g., truly two-factor security) and desirable properties (e.g., user anonymity), falling into the unsatisfactory \"break-fix-break-fix\" cycle. In this vicious cycle, protocol designers often advocate the superiorities of their improved scheme, but do not illustrate (or unconsciously overlooking) the aspects on which their scheme performs poorly. In this paper, we first use a series of \"improved schemes\" over Xu et al.'s 2009 scheme as case studies to highlight that, if there are no improved measurements, more \"improved schemes\" generally would not mean more advancements. To figure out why the measurement of existing schemes is invariably insufficient, we further investigate into the state-of-the-art evaluation criteria set (i.e., Madhusudhan-Mittal's set). Besides reporting its ambiguities and redundancies, we propose viable fixes and refinements. To our knowledge, we for the first time show that there are at least seven different attacking scenarios that may lead to the failure of a scheme in achieving truly two-factor security. Finally, we conduct a large-scale comparative evaluation of 26 representative two-factor schemes, and our results outline the request for better measurement when assessing new schemes.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
期刊
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1