首页 > 最新文献

Proceedings 2019 Network and Distributed System Security Symposium最新文献

英文 中文
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs 打破限制之墙:理解和分析恶意域名删除
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23243
Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, Xiaofeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu
Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it plays an important role in fighting cybercrime, the domain take-down procedure is still surprisingly opaque. There seems to be no in-depth understanding about how the take-down operation works and whether there is due diligence to ensure its security and reliability. In this paper, we report the first systematic study on domain takedown. Our study was made possible via a large collection of data, including various sinkhole feeds and blacklists, passive DNS data spanning six years, and historical WHOIS information. Over these datasets, we built a unique methodology that extensively used various reverse lookups and other data analysis techniques to address the challenges in identifying taken-down domains, sinkhole operators, and take-down durations. Applying the methodology on the data, we discovered over 620K takendown domains and conducted a longitudinal analysis on the take-down process, thus facilitating a better understanding of the operation and its weaknesses. We found that more than 14% of domains taken-down over the past ten months have been released back to the domain market and that some of the released domains have been repurchased by the malicious actor again before being captured and seized, either by the same or different sinkholes. In addition, we showed that the misconfiguration of DNS records corresponding to the sinkholed domains allowed us to hijack a domain that was seized by the FBI. Further, we found that expired sinkholes have caused the transfer of around 30K takendown domains whose traffic is now under the control of new owners.
删除行动旨在破坏涉及恶意域名的网络犯罪。在过去的十年中,有许多成功的拆除行动被报道,包括针对Conficker蠕虫的拆除行动,以及最近针对VPNFilter的拆除行动。尽管它在打击网络犯罪方面发挥着重要作用,但撤除域名的程序仍然令人惊讶地不透明。似乎没有深入了解拆除操作是如何工作的,以及是否有尽职调查来确保其安全性和可靠性。在本文中,我们首次对域名删除进行了系统的研究。我们的研究是通过大量数据收集而成的,包括各种天坑馈送和黑名单、六年被动DNS数据和历史WHOIS信息。在这些数据集上,我们建立了一种独特的方法,广泛使用各种反向查找和其他数据分析技术来解决识别陷落域、陷落井操作员和陷落持续时间方面的挑战。将该方法应用于数据,我们发现了超过620K的拆除域,并对拆除过程进行了纵向分析,从而有助于更好地了解操作及其弱点。我们发现,在过去10个月里,超过14%被关闭的域名已经被释放回域名市场,其中一些被释放的域名在被相同或不同的天坑捕获和扣押之前再次被恶意行为者重新购买。此外,我们还发现,与塌陷域名对应的DNS记录配置错误,使我们能够劫持一个被FBI查封的域名。此外,我们发现过期的天坑已经导致了大约3万个被关闭的域名的转移,这些域名的流量现在处于新所有者的控制之下。
{"title":"Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs","authors":"Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, Xiaofeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu","doi":"10.14722/ndss.2019.23243","DOIUrl":"https://doi.org/10.14722/ndss.2019.23243","url":null,"abstract":"Take-down operations aim to disrupt cybercrime involving malicious domains. In the past decade, many successful take-down operations have been reported, including those against the Conficker worm, and most recently, against VPNFilter. Although it plays an important role in fighting cybercrime, the domain take-down procedure is still surprisingly opaque. There seems to be no in-depth understanding about how the take-down operation works and whether there is due diligence to ensure its security and reliability. In this paper, we report the first systematic study on domain takedown. Our study was made possible via a large collection of data, including various sinkhole feeds and blacklists, passive DNS data spanning six years, and historical WHOIS information. Over these datasets, we built a unique methodology that extensively used various reverse lookups and other data analysis techniques to address the challenges in identifying taken-down domains, sinkhole operators, and take-down durations. Applying the methodology on the data, we discovered over 620K takendown domains and conducted a longitudinal analysis on the take-down process, thus facilitating a better understanding of the operation and its weaknesses. We found that more than 14% of domains taken-down over the past ten months have been released back to the domain market and that some of the released domains have been repurchased by the malicious actor again before being captured and seized, either by the same or different sinkholes. In addition, we showed that the misconfiguration of DNS records corresponding to the sinkholed domains allowed us to hijack a domain that was seized by the FBI. Further, we found that expired sinkholes have caused the transfer of around 30K takendown domains whose traffic is now under the control of new owners.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74196534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification 用符号执行分析语义正确性:以pkcs# 1 v1.5签名验证为例
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23430
Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li
We discuss how symbolic execution can be used to not only find low-level errors but also analyze the semantic correctness of protocol implementations. To avoid manually crafting test cases, we propose a strategy of meta-level search, which leverages constraints stemmed from the input formats to automatically generate concolic test cases. Additionally, to aid root-cause analysis, we develop constraint provenance tracking (CPT), a mechanism that associates atomic sub-formulas of path constraints with their corresponding source level origins. We demonstrate the power of symbolic analysis with a case study on PKCS#1 v1.5 signature verification. Leveraging meta-level search and CPT, we analyzed 15 recent open-source implementations using symbolic execution and found semantic flaws in 6 of them. Further analysis of these flaws showed that 4 implementations are susceptible to new variants of the Bleichenbacher lowexponent RSA signature forgery. One implementation suffers from potential denial of service attacks with purposefully crafted signatures. All our findings have been responsibly shared with the affected vendors. Among the flaws discovered, 6 new CVEs have been assigned to the immediately exploitable ones.
我们讨论了如何使用符号执行不仅可以发现低级错误,还可以分析协议实现的语义正确性。为了避免手工制作测试用例,我们提出了一种元级搜索策略,它利用来自输入格式的约束来自动生成聚合测试用例。此外,为了帮助根本原因分析,我们开发了约束来源跟踪(CPT),这是一种将路径约束的原子子公式与其相应的源级起源相关联的机制。通过对pkcs# 1 v1.5签名验证的案例研究,我们展示了符号分析的强大功能。利用元级搜索和CPT,我们分析了15个最近使用符号执行的开源实现,发现其中6个存在语义缺陷。对这些漏洞的进一步分析表明,有4种实现容易受到Bleichenbacher低指数RSA签名伪造的新变体的影响。一种实现遭受了带有故意制作签名的潜在拒绝服务攻击。我们已负责任地与受影响的供应商分享了所有发现。在发现的漏洞中,有6个新的cve被分配给可立即利用的漏洞。
{"title":"Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification","authors":"Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li","doi":"10.14722/ndss.2019.23430","DOIUrl":"https://doi.org/10.14722/ndss.2019.23430","url":null,"abstract":"We discuss how symbolic execution can be used to not only find low-level errors but also analyze the semantic correctness of protocol implementations. To avoid manually crafting test cases, we propose a strategy of meta-level search, which leverages constraints stemmed from the input formats to automatically generate concolic test cases. Additionally, to aid root-cause analysis, we develop constraint provenance tracking (CPT), a mechanism that associates atomic sub-formulas of path constraints with their corresponding source level origins. We demonstrate the power of symbolic analysis with a case study on PKCS#1 v1.5 signature verification. Leveraging meta-level search and CPT, we analyzed 15 recent open-source implementations using symbolic execution and found semantic flaws in 6 of them. Further analysis of these flaws showed that 4 implementations are susceptible to new variants of the Bleichenbacher lowexponent RSA signature forgery. One implementation suffers from potential denial of service attacks with purposefully crafted signatures. All our findings have been responsibly shared with the affected vendors. Among the flaws discovered, 6 new CVEs have been assigned to the immediately exploitable ones.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"224 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80031996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Constructing an Adversary Solver for Equihash 构造Equihash的对手求解器
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23337
X. Bai, Jian Gao, Chenglong Hu, L. Zhang
Blockchain networks, especially cryptocurrencies, rely heavily on proof-of-work (PoW) systems, often as a basis to distribute rewards. These systems require solving specific puzzles, where Application Specific Integrated Circuits (ASICs) can be designed for performance or efficiency. Either way, ASICs surpass CPUs and GPUs by orders of magnitude, and may harm blockchain networks. Recently, Equihash is developed to resist ASIC solving with heavy memory usage. Although commercial ASIC solvers exist for its most popular parameter set, such solvers do not work under better ones, and are considered impossible under optimal parameters. In this paper, we inspect the ASIC resistance of Equihash by constructing a parameterindependent adversary solver design. We evaluate the product, and project at least 10x efficiency advantage for resourceful adversaries. We contribute to the security community in two ways: (1) by revealing the limitation of Equihash and raising awareness about its algorithmic factors, and (2) by demonstrating that security inspection is practical and useful on PoW systems, serving as a start point for future research and development.
区块链网络,尤其是加密货币,严重依赖于工作量证明(PoW)系统,通常作为分配奖励的基础。这些系统需要解决特定的难题,其中专用集成电路(asic)可以设计为性能或效率。无论哪种方式,asic都超过了cpu和gpu的数量级,并可能损害区块链网络。最近,Equihash被开发用来抵抗大量内存使用的ASIC解决方案。尽管针对其最流行的参数集存在商用ASIC求解器,但这种求解器不能在更好的参数集下工作,并且在最优参数下被认为是不可能的。在本文中,我们通过构造一个参数无关的对手求解器设计来检验Equihash的ASIC抗性。我们评估了产品,并为足智多谋的对手预测了至少10倍的效率优势。我们通过两种方式为安全社区做出贡献:(1)通过揭示Equihash的局限性并提高对其算法因素的认识,以及(2)通过展示安全检查在PoW系统上是实用和有用的,作为未来研究和开发的起点。
{"title":"Constructing an Adversary Solver for Equihash","authors":"X. Bai, Jian Gao, Chenglong Hu, L. Zhang","doi":"10.14722/ndss.2019.23337","DOIUrl":"https://doi.org/10.14722/ndss.2019.23337","url":null,"abstract":"Blockchain networks, especially cryptocurrencies, rely heavily on proof-of-work (PoW) systems, often as a basis to distribute rewards. These systems require solving specific puzzles, where Application Specific Integrated Circuits (ASICs) can be designed for performance or efficiency. Either way, ASICs surpass CPUs and GPUs by orders of magnitude, and may harm blockchain networks. Recently, Equihash is developed to resist ASIC solving with heavy memory usage. Although commercial ASIC solvers exist for its most popular parameter set, such solvers do not work under better ones, and are considered impossible under optimal parameters. In this paper, we inspect the ASIC resistance of Equihash by constructing a parameterindependent adversary solver design. We evaluate the product, and project at least 10x efficiency advantage for resourceful adversaries. We contribute to the security community in two ways: (1) by revealing the limitation of Equihash and raising awareness about its algorithmic factors, and (2) by demonstrating that security inspection is practical and useful on PoW systems, serving as a start point for future research and development.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89303374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines CodeAlchemist:语义感知代码生成以查找JavaScript引擎中的漏洞
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23263
HyungSeok Han, DongHyeon Oh, S. Cha
JavaScript engines are an attractive target for attackers due to their popularity and flexibility in building exploits. Current state-of-the-art fuzzers for finding JavaScript engine vulnerabilities focus mainly on generating syntactically correct test cases based on either a predefined context-free grammar or a trained probabilistic language model. Unfortunately, syntactically correct JavaScript sentences are often semantically invalid at runtime. Furthermore, statically analyzing the semantics of JavaScript code is challenging due to its dynamic nature: JavaScript code is generated at runtime, and JavaScript expressions are dynamically-typed. To address this challenge, we propose a novel test case generation algorithm that we call semantics-aware assembly, and implement it in a fuzz testing tool termed CodeAlchemist. Our tool can generate arbitrary JavaScript code snippets that are both semantically and syntactically correct, and it effectively yields test cases that can crash JavaScript engines. We found numerous vulnerabilities of the latest JavaScript engines with CodeAlchemist and reported them to the vendors.
JavaScript引擎由于其受欢迎程度和构建漏洞的灵活性而成为攻击者的一个有吸引力的目标。目前用于查找JavaScript引擎漏洞的最先进的fuzzers主要集中在基于预定义的上下文无关语法或训练的概率语言模型生成语法正确的测试用例上。不幸的是,语法正确的JavaScript句子在运行时往往在语义上无效。此外,由于JavaScript代码的动态性,静态分析其语义具有挑战性:JavaScript代码是在运行时生成的,JavaScript表达式是动态类型的。为了应对这一挑战,我们提出了一种新的测试用例生成算法,我们称之为语义感知组装,并在一个名为CodeAlchemist的模糊测试工具中实现它。我们的工具可以生成任意的JavaScript代码片段,这些代码片段在语义和语法上都是正确的,并且它有效地生成了可以使JavaScript引擎崩溃的测试用例。我们使用CodeAlchemist发现了最新JavaScript引擎的许多漏洞,并向供应商报告了这些漏洞。
{"title":"CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines","authors":"HyungSeok Han, DongHyeon Oh, S. Cha","doi":"10.14722/ndss.2019.23263","DOIUrl":"https://doi.org/10.14722/ndss.2019.23263","url":null,"abstract":"JavaScript engines are an attractive target for attackers due to their popularity and flexibility in building exploits. Current state-of-the-art fuzzers for finding JavaScript engine vulnerabilities focus mainly on generating syntactically correct test cases based on either a predefined context-free grammar or a trained probabilistic language model. Unfortunately, syntactically correct JavaScript sentences are often semantically invalid at runtime. Furthermore, statically analyzing the semantics of JavaScript code is challenging due to its dynamic nature: JavaScript code is generated at runtime, and JavaScript expressions are dynamically-typed. To address this challenge, we propose a novel test case generation algorithm that we call semantics-aware assembly, and implement it in a fuzz testing tool termed CodeAlchemist. Our tool can generate arbitrary JavaScript code snippets that are both semantically and syntactically correct, and it effectively yields test cases that can crash JavaScript engines. We found numerous vulnerabilities of the latest JavaScript engines with CodeAlchemist and reported them to the vendors.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86511589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability 区块链可扩展性和互操作性的匿名多跳锁
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23330
Giulio Malavolta, Pedro A. Moreno-Sánchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permissionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues, allowing the bulk of payments between two users to be carried out off-chain. Unfortunately, as reported in the literature and further demonstrated in this paper, current PCNs do not provide meaningful security and privacy guarantees [30], [40]. In this work, we study and design secure and privacy- preserving PCNs. We start with a security analysis of existing PCNs, reporting a new attack that applies to all major PCNs, including the Lightning Network, and allows an attacker to steal the fees from honest intermediaries in the same payment path. We then formally define anonymous multi-hop locks (AMHLs), a novel cryptographic primitive that serves as a cornerstone for the design of secure and privacy-preserving PCNs. We present several provably secure cryptographic instantiations that make AMHLs compatible with the vast majority of cryptocurrencies. In particular, we show that (linear) homomorphic one-way functions suffice to construct AMHLs for PCNs supporting a script language (e.g., Ethereum). We also propose a construction based on ECDSA signatures that does not require scripts , thus solving a prominent open problem in the field.
加密货币使用量的巨大增长暴露了无权限区块链技术固有的可扩展性问题。支付通道网络(pcn)已经成为缓解可扩展性问题的最广泛部署的解决方案,允许两个用户之间的大部分支付在链下进行。不幸的是,正如文献报道和本文进一步论证的那样,目前的pcn不能提供有意义的安全和隐私保障[30],[40]。在这项工作中,我们研究和设计了安全和隐私保护的pcn。我们从对现有pcn的安全分析开始,报告了一种适用于所有主要pcn(包括闪电网络)的新攻击,并允许攻击者在相同的支付路径上从诚实的中介那里窃取费用。然后,我们正式定义了匿名多跳锁(amhl),这是一种新的加密原语,可作为设计安全和保护隐私的pcn的基石。我们提出了几个可证明安全的加密实例,使amhl与绝大多数加密货币兼容。特别是,我们证明了(线性)同态单向函数足以为支持脚本语言(例如以太坊)的pcn构建amhl。我们还提出了一种不需要脚本的基于ECDSA签名的构造,从而解决了该领域的一个突出的开放问题。
{"title":"Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability","authors":"Giulio Malavolta, Pedro A. Moreno-Sánchez, Clara Schneidewind, Aniket Kate, Matteo Maffei","doi":"10.14722/ndss.2019.23330","DOIUrl":"https://doi.org/10.14722/ndss.2019.23330","url":null,"abstract":"—Tremendous growth in cryptocurrency usage is exposing the inherent scalability issues with permissionless blockchain technology. Payment-channel networks (PCNs) have emerged as the most widely deployed solution to mitigate the scalability issues, allowing the bulk of payments between two users to be carried out off-chain. Unfortunately, as reported in the literature and further demonstrated in this paper, current PCNs do not provide meaningful security and privacy guarantees [30], [40]. In this work, we study and design secure and privacy- preserving PCNs. We start with a security analysis of existing PCNs, reporting a new attack that applies to all major PCNs, including the Lightning Network, and allows an attacker to steal the fees from honest intermediaries in the same payment path. We then formally define anonymous multi-hop locks (AMHLs), a novel cryptographic primitive that serves as a cornerstone for the design of secure and privacy-preserving PCNs. We present several provably secure cryptographic instantiations that make AMHLs compatible with the vast majority of cryptocurrencies. In particular, we show that (linear) homomorphic one-way functions suffice to construct AMHLs for PCNs supporting a script language (e.g., Ethereum). We also propose a construction based on ECDSA signatures that does not require scripts , thus solving a prominent open problem in the field.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74951053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 201
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries 揭示你的击键:对图形库的基于缓存的侧通道攻击
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23221
Daimeng Wang, Ajaya Neupane, Zhiyun Qian, N. Abu-Ghazaleh, S. Krishnamurthy, E. Colbert, Paul L. Yu
Operating systems use shared memory to improve performance. However, as shown in recent studies, attackers can exploit CPU cache side-channels associated with shared memory to extract sensitive information. The attacks that were previously attempted typically only detect the presence of a certain operation and require significant manual analysis to identify and evaluate their effectiveness. Moreover, very few of them target graphics libraries which are commonly used, but difficult to attack. In this paper, we consider the execution time of shared libraries as the side-channel, and showcase a completely automated technique to discover and select exploitable side-channels on shared graphics libraries. In essence, we first collect the cache lines accessed by a victim process during different key presses offline, and then use machine learning to infer the best cache lines (e.g., easily measurable, robust to noise, high information leakage) for a flush and reload attack. We are able to discover effective strategies to classify what keys have been pressed. Using this approach, we not only preclude the need for manual analyses of code and traces — the automated system discovered many previously unknown sidechannels of the type we are interested in, but also achieve high precision in terms of inferring the sensitive information entered on desktop and Android platforms. We show that our approach infers the passwords with lowercase letters and numbers 10,000 1,000,000 times faster than random guessing. For a large fraction of PINs consisting of 4 to 6 digits, we are able to infer them within 20 and 80 guesses respectively. Finally, we suggest ways to mitigate these attacks.
操作系统使用共享内存来提高性能。然而,最近的研究表明,攻击者可以利用与共享内存相关的CPU缓存侧通道来提取敏感信息。以前尝试的攻击通常只检测到某个操作的存在,并且需要大量的人工分析来识别和评估其有效性。此外,很少有攻击对象是常用但难以攻击的图形库。在本文中,我们将共享图形库的执行时间作为侧通道,并展示了一种完全自动化的技术来发现和选择共享图形库上可利用的侧通道。本质上,我们首先收集受害者进程在不同的离线按键期间访问的缓存线,然后使用机器学习来推断用于刷新和重新加载攻击的最佳缓存线(例如,易于测量,对噪声具有鲁棒性,高信息泄漏)。我们能够发现有效的策略来对按下的键进行分类。使用这种方法,我们不仅排除了手工分析代码和跟踪的需要——自动化系统发现了许多我们感兴趣的类型的未知侧通道,而且在推断桌面和Android平台上输入的敏感信息方面也达到了很高的精度。我们证明,我们的方法推断密码小写字母和数字比随机猜测快10,000 1,000,000倍。对于大部分由4到6位数字组成的pin,我们能够分别在20次和80次猜测内推断出它们。最后,我们提出了减轻这些攻击的方法。
{"title":"Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries","authors":"Daimeng Wang, Ajaya Neupane, Zhiyun Qian, N. Abu-Ghazaleh, S. Krishnamurthy, E. Colbert, Paul L. Yu","doi":"10.14722/ndss.2019.23221","DOIUrl":"https://doi.org/10.14722/ndss.2019.23221","url":null,"abstract":"Operating systems use shared memory to improve performance. However, as shown in recent studies, attackers can exploit CPU cache side-channels associated with shared memory to extract sensitive information. The attacks that were previously attempted typically only detect the presence of a certain operation and require significant manual analysis to identify and evaluate their effectiveness. Moreover, very few of them target graphics libraries which are commonly used, but difficult to attack. In this paper, we consider the execution time of shared libraries as the side-channel, and showcase a completely automated technique to discover and select exploitable side-channels on shared graphics libraries. In essence, we first collect the cache lines accessed by a victim process during different key presses offline, and then use machine learning to infer the best cache lines (e.g., easily measurable, robust to noise, high information leakage) for a flush and reload attack. We are able to discover effective strategies to classify what keys have been pressed. Using this approach, we not only preclude the need for manual analyses of code and traces — the automated system discovered many previously unknown sidechannels of the type we are interested in, but also achieve high precision in terms of inferring the sensitive information entered on desktop and Android platforms. We show that our approach infers the passwords with lowercase letters and numbers 10,000 1,000,000 times faster than random guessing. For a large fraction of PINs consisting of 4 to 6 digits, we are able to infer them within 20 and 80 guesses respectively. Finally, we suggest ways to mitigate these attacks.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"116 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73386286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications 语音识别后的生活:语音助理应用的模糊语义误解
Pub Date : 2019-01-01 DOI: 10.14722/ndss.2019.23525
Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, G. Gu
—Popular Voice Assistant (VA) services such as Amazon Alexa and Google Assistant are now rapidly appifying their platforms to allow more flexible and diverse voice-controlled service experience. However, the ubiquitous deployment of VA devices and the increasing number of third-party applications have raised security and privacy concerns. While previous works such as hidden voice attacks mostly examine the problems of VA services’ default Automatic Speech Recognition (ASR) component, our work analyzes and evaluates the security of the succeeding component after ASR, i.e., Natural Language Understanding (NLU), which performs semantic interpretation (i.e., text-to-intent) after ASR’s acoustic-to-text processing. In particular, we focus on NLU’s Intent Classifier which is used in customizing machine understanding for third-party VA Applications (or vApps). We find that the semantic inconsistency caused by the improper semantic interpretation of an Intent Classifier can create the opportunity of breaching the integrity of vApp processing when attackers delicately leverage some common spoken errors. In this paper, we design the first linguistic-model-guided fuzzing tool, named LipFuzzer, to assess the security of Intent Classifier and systematically discover potential misinterpretation-prone spoken errors based on vApps’ voice command templates. To guide the fuzzing, we construct adversarial linguistic models with the help of Statistical Relational Learning (SRL) and emerging Natural Language Processing (NLP) techniques. In evaluation, we have successfully verified the effectiveness and accuracy of LipFuzzer. We also use LipFuzzer to evaluate both Amazon Alexa and Google Assistant vApp platforms. We have identified that a large portion of real-world
-亚马逊Alexa和b谷歌Assistant等流行语音助手(VA)服务正在迅速应用其平台,以实现更灵活和多样化的语音控制服务体验。然而,无处不在的VA设备的部署和越来越多的第三方应用程序引起了人们对安全和隐私的担忧。虽然以前的工作(如隐藏语音攻击)主要检查VA服务默认的自动语音识别(ASR)组件的问题,但我们的工作分析和评估了ASR之后后续组件的安全性,即自然语言理解(NLU),它在ASR的声到文本处理之后执行语义解释(即文本到意图)。我们特别关注NLU的意图分类器,该分类器用于为第三方VA应用程序(或vApps)定制机器理解。我们发现,当攻击者巧妙地利用一些常见的口语错误时,由意图分类器的不正确语义解释引起的语义不一致可能会破坏vApp处理的完整性。在本文中,我们设计了第一个语言模型指导的模糊测试工具LipFuzzer,用于评估意图分类器的安全性,并基于vapp的语音命令模板系统地发现潜在的容易被误解的语音错误。为了指导模糊,我们在统计关系学习(SRL)和新兴的自然语言处理(NLP)技术的帮助下构建了对抗性语言模型。在评估中,我们成功地验证了LipFuzzer的有效性和准确性。我们还使用LipFuzzer来评估亚马逊Alexa和b谷歌助手vApp平台。我们已经确定了现实世界的很大一部分
{"title":"Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications","authors":"Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, G. Gu","doi":"10.14722/ndss.2019.23525","DOIUrl":"https://doi.org/10.14722/ndss.2019.23525","url":null,"abstract":"—Popular Voice Assistant (VA) services such as Amazon Alexa and Google Assistant are now rapidly appifying their platforms to allow more flexible and diverse voice-controlled service experience. However, the ubiquitous deployment of VA devices and the increasing number of third-party applications have raised security and privacy concerns. While previous works such as hidden voice attacks mostly examine the problems of VA services’ default Automatic Speech Recognition (ASR) component, our work analyzes and evaluates the security of the succeeding component after ASR, i.e., Natural Language Understanding (NLU), which performs semantic interpretation (i.e., text-to-intent) after ASR’s acoustic-to-text processing. In particular, we focus on NLU’s Intent Classifier which is used in customizing machine understanding for third-party VA Applications (or vApps). We find that the semantic inconsistency caused by the improper semantic interpretation of an Intent Classifier can create the opportunity of breaching the integrity of vApp processing when attackers delicately leverage some common spoken errors. In this paper, we design the first linguistic-model-guided fuzzing tool, named LipFuzzer, to assess the security of Intent Classifier and systematically discover potential misinterpretation-prone spoken errors based on vApps’ voice command templates. To guide the fuzzing, we construct adversarial linguistic models with the help of Statistical Relational Learning (SRL) and emerging Natural Language Processing (NLP) techniques. In evaluation, we have successfully verified the effectiveness and accuracy of LipFuzzer. We also use LipFuzzer to evaluate both Amazon Alexa and Google Assistant vApp platforms. We have identified that a large portion of real-world","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82255023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation Tranco:一个以研究为导向的顶级网站排名,加强了对操纵的防范
Pub Date : 2018-06-04 DOI: 10.14722/ndss.2019.23386
V. Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczyński, W. Joosen
In order to evaluate the prevalence of security and privacy practices on a representative sample of the Web, researchers rely on website popularity rankings such as the Alexa list. While the validity and representativeness of these rankings are rarely questioned, our findings show the contrary: we show for four main rankings how their inherent properties (similarity, stability, representativeness, responsiveness and benignness) affect their composition and therefore potentially skew the conclusions made in studies. Moreover, we find that it is trivial for an adversary to manipulate the composition of these lists. We are the first to empirically validate that the ranks of domains in each of the lists are easily altered, in the case of Alexa through as little as a single HTTP request. This allows adversaries to manipulate rankings on a large scale and insert malicious domains into whitelists or bend the outcome of research studies to their will. To overcome the limitations of such rankings, we propose improvements to reduce the fluctuations in list composition and guarantee better defenses against manipulation. To allow the research community to work with reliable and reproducible rankings, we provide Tranco, an improved ranking that we offer through an online service available at this https URL.
为了评估网络代表性样本中安全和隐私实践的普遍程度,研究人员依赖于网站人气排名,如Alexa列表。虽然这些排名的有效性和代表性很少受到质疑,但我们的研究结果却恰恰相反:我们展示了四个主要排名的内在属性(相似性、稳定性、代表性、响应性和亲和性)如何影响它们的构成,从而可能歪曲研究得出的结论。此外,我们发现对手操纵这些列表的组成是微不足道的。我们是第一个经验验证,在每个列表的域名的行列很容易改变,在Alexa的情况下,通过一个单一的HTTP请求。这使得对手可以大规模地操纵排名,将恶意域名插入白名单,或者根据自己的意愿扭曲研究结果。为了克服这种排名的局限性,我们提出了改进措施,以减少列表组成的波动,并保证更好地防御操纵。为了使研究界能够进行可靠和可重复的排名,我们提供了Tranco,这是我们通过以下https URL提供的在线服务提供的改进排名。
{"title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation","authors":"V. Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczyński, W. Joosen","doi":"10.14722/ndss.2019.23386","DOIUrl":"https://doi.org/10.14722/ndss.2019.23386","url":null,"abstract":"In order to evaluate the prevalence of security and privacy practices on a representative sample of the Web, researchers rely on website popularity rankings such as the Alexa list. While the validity and representativeness of these rankings are rarely questioned, our findings show the contrary: we show for four main rankings how their inherent properties (similarity, stability, representativeness, responsiveness and benignness) affect their composition and therefore potentially skew the conclusions made in studies. Moreover, we find that it is trivial for an adversary to manipulate the composition of these lists. We are the first to empirically validate that the ranks of domains in each of the lists are easily altered, in the case of Alexa through as little as a single HTTP request. This allows adversaries to manipulate rankings on a large scale and insert malicious domains into whitelists or bend the outcome of research studies to their will. To overcome the limitations of such rankings, we propose improvements to reduce the fluctuations in list composition and guarantee better defenses against manipulation. To allow the research community to work with reliable and reproducible rankings, we provide Tranco, an improved ranking that we offer through an online service available at this https URL.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79875633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 423
Securing Real-Time Microcontroller Systems through Customized Memory View Switching 通过自定义内存视图切换保护实时微控制器系统
Pub Date : 2018-01-01 DOI: 10.14722/NDSS.2018.23107
C. Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, X. Zhang, Dongyan Xu
Real-time microcontrollers have been widely adopted in cyber-physical systems that require both real-time and security guarantees. Unfortunately, security is sometimes traded for real-time performance in such systems. Notably, memory isolation, which is one of the most established security features in modern computer systems, is typically not available in many real-time microcontroller systems due to its negative impacts on performance and violation of real-time constraints. As such, the memory space of these systems has created an open, monolithic attack surface that attackers can target to subvert the entire systems. In this paper, we present MINION, a security architecture that intends to virtually partition the memory space and enforce memory access control of a real-time microcontroller. MINION can automatically identify the reachable memory regions of realtime processes through off-line static analysis on the system’s firmware and conduct run-time memory access control through hardware-based enforcement. Our evaluation results demonstrate that, by significantly reducing the memory space that each process can access, MINION can effectively protect a microcontroller from various attacks that were previously viable. In addition, unlike conventional memory isolation mechanisms that might incur substantial performance overhead, the lightweight design of MINION is able to maintain the real-time properties of the microcontroller.
实时微控制器被广泛应用于需要实时和安全保证的网络物理系统中。不幸的是,在这样的系统中,安全性有时会以实时性能为代价。值得注意的是,内存隔离是现代计算机系统中最成熟的安全特性之一,由于其对性能的负面影响和违反实时约束,在许多实时微控制器系统中通常不可用。因此,这些系统的内存空间创造了一个开放的、单一的攻击面,攻击者可以瞄准它来破坏整个系统。在本文中,我们提出了MINION,一种安全架构,旨在虚拟分区内存空间并强制实时微控制器的内存访问控制。MINION可以通过对系统固件的离线静态分析自动识别实时进程的可访问内存区域,并通过基于硬件的强制执行进行运行时内存访问控制。我们的评估结果表明,通过显著减少每个进程可以访问的内存空间,MINION可以有效地保护微控制器免受以前可行的各种攻击。此外,与可能导致大量性能开销的传统内存隔离机制不同,MINION的轻量级设计能够保持微控制器的实时特性。
{"title":"Securing Real-Time Microcontroller Systems through Customized Memory View Switching","authors":"C. Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, X. Zhang, Dongyan Xu","doi":"10.14722/NDSS.2018.23107","DOIUrl":"https://doi.org/10.14722/NDSS.2018.23107","url":null,"abstract":"Real-time microcontrollers have been widely adopted in cyber-physical systems that require both real-time and security guarantees. Unfortunately, security is sometimes traded for real-time performance in such systems. Notably, memory isolation, which is one of the most established security features in modern computer systems, is typically not available in many real-time microcontroller systems due to its negative impacts on performance and violation of real-time constraints. As such, the memory space of these systems has created an open, monolithic attack surface that attackers can target to subvert the entire systems. In this paper, we present MINION, a security architecture that intends to virtually partition the memory space and enforce memory access control of a real-time microcontroller. MINION can automatically identify the reachable memory regions of realtime processes through off-line static analysis on the system’s firmware and conduct run-time memory access control through hardware-based enforcement. Our evaluation results demonstrate that, by significantly reducing the memory space that each process can access, MINION can effectively protect a microcontroller from various attacks that were previously viable. In addition, unlike conventional memory isolation mechanisms that might incur substantial performance overhead, the lightweight design of MINION is able to maintain the real-time properties of the microcontroller.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps 为你的秘密寻找线索:移动应用中语义驱动、基于学习的隐私发现
Pub Date : 2018-01-01 DOI: 10.14722/ndss.2018.23099
Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang
A long-standing challenge in analyzing information leaks within mobile apps is to automatically identify the code operating on sensitive data. With all existing solutions relying on System APIs (e.g., IMEI, GPS location) or features of user interfaces (UI), the content from app servers, like user’s Facebook profile, payment history, fall through the crack. Finding such content is important given the fact that most apps today are web applications, whose critical data are often on the server side. In the meantime, operations on the data within mobile apps are often hard to capture, since all server-side information is delivered to the app in the same way, sensitive or not. A unique observation of our research is that in modern apps, a program is essentially a semantics-rich documentation carrying meaningful program elements such as method names, variables and constants that reveal the sensitive data involved, even when the program is under moderate obfuscation. Leveraging this observation, we develop a novel semantics-driven solution for automatic discovery of sensitive user data, including those from the server side. Our approach utilizes natural language processing (NLP) to automatically locate the program elements (variables, methods, etc.) of interest, and then performs a learning-based program structure analysis to accurately identify those indeed carrying sensitive content. Using this new technique, we analyzed 445,668 popular apps, an unprecedented scale for this type of research. Our work brings to light the pervasiveness of information leaks, and the channels through which the leaks happen, including unintentional over-sharing across libraries and aggressive data acquisition behaviors. Further we found that many high-profile apps and libraries are involved in such leaks. Our findings contribute to a better understanding of the privacy risk in mobile apps and also highlight the importance of data protection in today’s software composition.
在分析移动应用程序中的信息泄露时,一个长期存在的挑战是自动识别对敏感数据进行操作的代码。由于所有现有的解决方案都依赖于系统api(如IMEI, GPS定位)或用户界面(UI)的功能,来自应用服务器的内容,如用户的Facebook个人资料,支付历史,都无法破解。考虑到当今大多数应用程序都是web应用程序,其关键数据通常位于服务器端,找到这样的内容非常重要。与此同时,移动应用中对数据的操作通常很难捕捉,因为所有服务器端信息都以相同的方式传递给应用,无论是否敏感。我们研究的一个独特观察是,在现代应用程序中,程序本质上是一个语义丰富的文档,包含有意义的程序元素,如方法名、变量和常量,这些元素揭示了所涉及的敏感数据,即使程序处于中度混淆状态。利用这一观察结果,我们开发了一种新的语义驱动的解决方案,用于自动发现敏感用户数据,包括来自服务器端的数据。我们的方法利用自然语言处理(NLP)自动定位感兴趣的程序元素(变量、方法等),然后执行基于学习的程序结构分析,以准确识别那些确实携带敏感内容的程序。使用这种新技术,我们分析了445,668个流行应用程序,这是此类研究中前所未有的规模。我们的工作揭示了信息泄露的普遍性,以及泄露发生的渠道,包括图书馆之间无意的过度共享和激进的数据获取行为。此外,我们发现许多备受瞩目的应用程序和库都涉及此类泄漏。我们的研究结果有助于更好地理解移动应用程序中的隐私风险,同时也强调了数据保护在当今软件构成中的重要性。
{"title":"Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps","authors":"Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang","doi":"10.14722/ndss.2018.23099","DOIUrl":"https://doi.org/10.14722/ndss.2018.23099","url":null,"abstract":"A long-standing challenge in analyzing information leaks within mobile apps is to automatically identify the code operating on sensitive data. With all existing solutions relying on System APIs (e.g., IMEI, GPS location) or features of user interfaces (UI), the content from app servers, like user’s Facebook profile, payment history, fall through the crack. Finding such content is important given the fact that most apps today are web applications, whose critical data are often on the server side. In the meantime, operations on the data within mobile apps are often hard to capture, since all server-side information is delivered to the app in the same way, sensitive or not. A unique observation of our research is that in modern apps, a program is essentially a semantics-rich documentation carrying meaningful program elements such as method names, variables and constants that reveal the sensitive data involved, even when the program is under moderate obfuscation. Leveraging this observation, we develop a novel semantics-driven solution for automatic discovery of sensitive user data, including those from the server side. Our approach utilizes natural language processing (NLP) to automatically locate the program elements (variables, methods, etc.) of interest, and then performs a learning-based program structure analysis to accurately identify those indeed carrying sensitive content. Using this new technique, we analyzed 445,668 popular apps, an unprecedented scale for this type of research. Our work brings to light the pervasiveness of information leaks, and the channels through which the leaks happen, including unintentional over-sharing across libraries and aggressive data acquisition behaviors. Further we found that many high-profile apps and libraries are involved in such leaks. Our findings contribute to a better understanding of the privacy risk in mobile apps and also highlight the importance of data protection in today’s software composition.","PeriodicalId":20444,"journal":{"name":"Proceedings 2019 Network and Distributed System Security Symposium","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
期刊
Proceedings 2019 Network and Distributed System Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1