首页 > 最新文献

Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web最新文献

英文 中文
Can You Tell Me the Time? Security Implications of the Server-Timing Header 你能告诉我时间吗?服务器计时报头的安全含义
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23087
Vik Vanderlinden, W. Joosen, M. Vanhoef
—Performing a remote timing attack typically entails the collection of many timing measurements in order to overcome noise due to network jitter. If an attacker can reduce the amount of jitter in their measurements, they can exploit timing leaks using fewer measurements. To reduce the amount of jitter, an attacker may use timing information that is made available by a server. In this paper, we exploit the use of the server-timing header, which was created for performance monitoring and in some cases exposes millisecond accurate information about server-side execution times. We show that the header is increasingly often used, with an uptick in adoption rates in recent months. The websites that use the header often host dynamic content of which the generation time can potentially leak sensitive information. Our new attack techniques, one of which collects the header timing values from an intermediate proxy, improve performance over standard attacks using roundtrip times. Experiments show that, overall, our new attacks (significantly) decrease the number of samples required to exploit timing leaks. The attack is especially effective against geographically distant servers.
-执行远程定时攻击通常需要收集许多定时测量,以克服由于网络抖动引起的噪声。如果攻击者可以减少测量中的抖动量,他们就可以使用更少的测量来利用时间泄漏。为了减少抖动的数量,攻击者可以使用服务器提供的定时信息。在本文中,我们利用了服务器计时报头的使用,该报头是为性能监控而创建的,在某些情况下会暴露有关服务器端执行时间的毫秒级精确信息。我们显示,标题越来越多地被使用,最近几个月的采用率有所上升。使用标头的网站通常承载动态内容,这些内容的生成时间可能会泄露敏感信息。我们的新攻击技术(其中一种是从中间代理收集报头计时值)比使用往返时间的标准攻击提高了性能。实验表明,总的来说,我们的新攻击(显著)减少了利用时序泄漏所需的样本数量。这种攻击对地理位置较远的服务器尤其有效。
{"title":"Can You Tell Me the Time? Security Implications of the Server-Timing Header","authors":"Vik Vanderlinden, W. Joosen, M. Vanhoef","doi":"10.14722/madweb.2023.23087","DOIUrl":"https://doi.org/10.14722/madweb.2023.23087","url":null,"abstract":"—Performing a remote timing attack typically entails the collection of many timing measurements in order to overcome noise due to network jitter. If an attacker can reduce the amount of jitter in their measurements, they can exploit timing leaks using fewer measurements. To reduce the amount of jitter, an attacker may use timing information that is made available by a server. In this paper, we exploit the use of the server-timing header, which was created for performance monitoring and in some cases exposes millisecond accurate information about server-side execution times. We show that the header is increasingly often used, with an uptick in adoption rates in recent months. The websites that use the header often host dynamic content of which the generation time can potentially leak sensitive information. Our new attack techniques, one of which collects the header timing values from an intermediate proxy, improve performance over standard attacks using roundtrip times. Experiments show that, overall, our new attacks (significantly) decrease the number of samples required to exploit timing leaks. The attack is especially effective against geographically distant servers.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Accessibility Metrics to Measure the Threat Landscape for Users with Disabilities 应用可访问性指标衡量残疾用户的威胁形势
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23074
J. Breton, A. Abdou
—The link between user security and web accessibility is a new but growing field of research. To understand the potential threat landscape for users that require accessibility tools to access the web, we created the WATER framework. WATER measures websites using three security-related base accessibility metrics. Upon analyzing 30,000 websites from three distinct popularity ranges, we discovered that the risk for information leakage and phishing attacks is higher for these users. Over half of the analyzed websites had an accessibility percentage of less than 75%, a statistic that exposes these websites to potential accessibility-related lawsuits. Our data suggests that the current WCAG 2.1 standards may need to be revised to avoid assigning Level AA conformance to websites that undermine the security of users requiring accessibility tools. We make the WATER framework publicly available in the hopes it can be used for future research.
用户安全与网络可访问性之间的联系是一个新兴的研究领域。为了了解需要可访问性工具访问web的用户的潜在威胁情况,我们创建了WATER框架。WATER使用三个与安全相关的基本可访问性指标来衡量网站。在分析了三个不同流行范围的30,000个网站后,我们发现这些用户遭受信息泄露和网络钓鱼攻击的风险更高。超过一半的被分析网站的可访问性百分比低于75%,这一统计数据使这些网站面临与可访问性相关的潜在诉讼。我们的数据表明,当前的WCAG 2.1标准可能需要修改,以避免将AA级一致性分配给那些破坏了需要辅助工具的用户的安全性的网站。我们公开了WATER框架,希望它可以用于未来的研究。
{"title":"Applying Accessibility Metrics to Measure the Threat Landscape for Users with Disabilities","authors":"J. Breton, A. Abdou","doi":"10.14722/madweb.2023.23074","DOIUrl":"https://doi.org/10.14722/madweb.2023.23074","url":null,"abstract":"—The link between user security and web accessibility is a new but growing field of research. To understand the potential threat landscape for users that require accessibility tools to access the web, we created the WATER framework. WATER measures websites using three security-related base accessibility metrics. Upon analyzing 30,000 websites from three distinct popularity ranges, we discovered that the risk for information leakage and phishing attacks is higher for these users. Over half of the analyzed websites had an accessibility percentage of less than 75%, a statistic that exposes these websites to potential accessibility-related lawsuits. Our data suggests that the current WCAG 2.1 standards may need to be revised to avoid assigning Level AA conformance to websites that undermine the security of users requiring accessibility tools. We make the WATER framework publicly available in the hopes it can be used for future research.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tag of the Dead: How Terminated SaaS Tags Become Zombies 死亡的标签:终止的SaaS标签如何变成僵尸
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23034
Takahito Sakamoto, Takuya Murozono
—Software as a Service (SaaS) dies. Several SaaS die every day because it becomes too difficult to continue their business. SaaS lets website owners install a small amount of code, called a tag, on a website to extend its functionality of the website. However, sometimes that tag becomes a zombie. In this paper, we coordinate two studies to reveal the danger of the zombification of tags. (1) A research of domains used by dead SaaS tags. (2) An investigation of websites with dead tags. The results of our work show that of the 53 domains used with 49 dead SaaS tags, 18 domains have already been re-registered by a third party or are ready to be re-registered. We also scanned about 1.15 million websites of domestic companies and found 26 dead SaaS tags on approximately 18,000 websites. Finally, we found that three new SaaS tags have been abused by attackers, indicating the danger of zombification tags.
软件即服务(SaaS)消亡。每天都有几个SaaS因为很难继续他们的业务而死去。SaaS允许网站所有者在网站上安装少量的代码,称为标签,以扩展网站的功能。然而,有时这个标签会变成僵尸。在本文中,我们协调两项研究,以揭示标签僵尸化的危险。(1)对失效SaaS标签所使用的域进行研究。(2)调查有死标签的网站。我们的工作结果表明,在使用的53个域名中有49个失效的SaaS标签,其中18个域名已经被第三方重新注册或准备重新注册。我们还扫描了115万个国内企业的网站,在大约1.8万个网站中发现了26个已死的SaaS标签。最后,我们发现有三个新的SaaS标签被攻击者滥用,表明僵尸化标签的危险性。
{"title":"Tag of the Dead: How Terminated SaaS Tags Become Zombies","authors":"Takahito Sakamoto, Takuya Murozono","doi":"10.14722/madweb.2023.23034","DOIUrl":"https://doi.org/10.14722/madweb.2023.23034","url":null,"abstract":"—Software as a Service (SaaS) dies. Several SaaS die every day because it becomes too difficult to continue their business. SaaS lets website owners install a small amount of code, called a tag, on a website to extend its functionality of the website. However, sometimes that tag becomes a zombie. In this paper, we coordinate two studies to reveal the danger of the zombification of tags. (1) A research of domains used by dead SaaS tags. (2) An investigation of websites with dead tags. The results of our work show that of the 53 domains used with 49 dead SaaS tags, 18 domains have already been re-registered by a third party or are ready to be re-registered. We also scanned about 1.15 million websites of domestic companies and found 26 dead SaaS tags on approximately 18,000 websites. Finally, we found that three new SaaS tags have been abused by attackers, indicating the danger of zombification tags.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are some prices more equal than others? Evaluating store-based price differentiation 是否有些价格比其他价格更平等?评估基于商店的价格差异
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23011
H. Jonker, S. Karsch, Benjamin Krumnow, Godfried Meesters
—Online vendors typically offer different stores to sell their items, such as desktop site, mobile site, country-specific sites, etc. Online rumours and news media reports persist that item prices between such views differ. While several academic works have investigated price differentiation, to date, no systematic method for analysing this question was put forth. We devise an approach to investigate such store-based price differentiation, based on three pillars: a framework that can perform cross-store data acquisition synchronously, a method to perform cross-store item matching, and constraints to limit client-side noise factors. We test our method in an initial case study to investigate store effects on flight pricing. We gather pricing data of 824 flights from 15 stores (incl. desktop sites, mobile apps, and mobile sites) over a 38-day period. Our experiment shows that price differences occur frequently. Moreover, even in a limited run we find strong indications of store-specific pricing for certain vendors. We conclude that (i) a larger study into store-based price differentiation is needed to better gauge this effect; (ii) future research in this general domain should take store-based differences into account in their study design.
-在线供应商通常提供不同的商店来销售他们的商品,如桌面网站,移动网站,特定国家的网站等。网络谣言和新闻媒体报道坚持认为,这两种观点之间的商品价格存在差异。虽然一些学术著作研究了价格差异,但迄今为止,还没有提出系统的方法来分析这个问题。我们设计了一种基于三个支柱的方法来调查这种基于商店的价格差异:一个可以同步执行跨商店数据采集的框架,一种执行跨商店项目匹配的方法,以及限制客户端噪声因素的约束。我们在最初的案例研究中测试了我们的方法,以调查商店对航班定价的影响。我们从15家商店(包括桌面网站、移动应用和移动网站)收集了38天内824个航班的定价数据。我们的实验表明,价格差异经常发生。此外,即使在有限的运行中,我们也发现了针对某些供应商的特定商店定价的强烈迹象。我们得出结论:(i)需要对基于商店的价格差异进行更大规模的研究,以更好地衡量这种影响;(ii)未来在这一一般领域的研究应在研究设计中考虑到基于存储的差异。
{"title":"Are some prices more equal than others? Evaluating store-based price differentiation","authors":"H. Jonker, S. Karsch, Benjamin Krumnow, Godfried Meesters","doi":"10.14722/madweb.2023.23011","DOIUrl":"https://doi.org/10.14722/madweb.2023.23011","url":null,"abstract":"—Online vendors typically offer different stores to sell their items, such as desktop site, mobile site, country-specific sites, etc. Online rumours and news media reports persist that item prices between such views differ. While several academic works have investigated price differentiation, to date, no systematic method for analysing this question was put forth. We devise an approach to investigate such store-based price differentiation, based on three pillars: a framework that can perform cross-store data acquisition synchronously, a method to perform cross-store item matching, and constraints to limit client-side noise factors. We test our method in an initial case study to investigate store effects on flight pricing. We gather pricing data of 824 flights from 15 stores (incl. desktop sites, mobile apps, and mobile sites) over a 38-day period. Our experiment shows that price differences occur frequently. Moreover, even in a limited run we find strong indications of store-specific pricing for certain vendors. We conclude that (i) a larger study into store-based price differentiation is needed to better gauge this effect; (ii) future research in this general domain should take store-based differences into account in their study design.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do Internet Devices Remain Vulnerable? A Survey with System Administrators 互联网设备为何易受攻击?系统管理员调查
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23043
T. Bondar, Hala Assal, A. Abdou
—In efforts to understand the reasons behind Internet-connected devices remaining vulnerable for a long time, previous literature analyzed the effectiveness of large-scale vul- nerability notifications on remediation rates. Herein we focus on the perspective of system administrators. Through an online sur- vey study with 89 system administrators worldwide, we investigate factors affecting their decisions to remediate or ignore a security vulnerability. We use Censys to find servers with vulnerable public-facing services, extract the abuse contact information from WHOIS, and email an invitation to fill out the survey. We found no evidence that awareness of the existence of a vulnerability affects remediation plans, which explains the consistently small remediation rates following notification campaigns conducted in previous research. More interestingly, participants did not agree on a specific factor as the primary cause for lack of remediation. Many factors appeared roughly equally important, including backwards compatibility, technical knowledge, available resources, and motive to remediate.
为了理解互联网连接设备长期存在漏洞背后的原因,之前的文献分析了大规模漏洞通知对修复率的有效性。在这里,我们关注系统管理员的视角。通过对全球89位系统管理员的在线调查研究,我们调查了影响他们决定修复或忽略安全漏洞的因素。我们使用Censys查找具有易受攻击的面向公众服务的服务器,从WHOIS中提取滥用联系信息,并通过电子邮件邀请填写调查。我们没有发现任何证据表明意识到漏洞的存在会影响补救计划,这就解释了在之前的研究中,在通知活动之后,补救率一直很低。更有趣的是,参与者没有同意一个具体的因素是缺乏补救的主要原因。许多因素似乎同样重要,包括向后兼容性、技术知识、可用资源和修复的动机。
{"title":"Why do Internet Devices Remain Vulnerable? A Survey with System Administrators","authors":"T. Bondar, Hala Assal, A. Abdou","doi":"10.14722/madweb.2023.23043","DOIUrl":"https://doi.org/10.14722/madweb.2023.23043","url":null,"abstract":"—In efforts to understand the reasons behind Internet-connected devices remaining vulnerable for a long time, previous literature analyzed the effectiveness of large-scale vul- nerability notifications on remediation rates. Herein we focus on the perspective of system administrators. Through an online sur- vey study with 89 system administrators worldwide, we investigate factors affecting their decisions to remediate or ignore a security vulnerability. We use Censys to find servers with vulnerable public-facing services, extract the abuse contact information from WHOIS, and email an invitation to fill out the survey. We found no evidence that awareness of the existence of a vulnerability affects remediation plans, which explains the consistently small remediation rates following notification campaigns conducted in previous research. More interestingly, participants did not agree on a specific factor as the primary cause for lack of remediation. Many factors appeared roughly equally important, including backwards compatibility, technical knowledge, available resources, and motive to remediate.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123678066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the Privacy Gap: Enhanced User Consent Mechanisms on the Web 弥合隐私鸿沟:网络上增强的用户同意机制
Pub Date : 1900-01-01 DOI: 10.14722/madweb.2023.23017
Carl Magnus Bruhner, David Hasselquist, Niklas Carlsson
—In the age of the General Data Protection Regula- tion (GDPR) and the California Consumer Privacy Act (CCPA), privacy and consent control have become even more apparent for every-day web users. Privacy banners in all shapes and sizes ask for permission through more or less challenging designs and make privacy control more of a struggle than they help users’ privacy. In this paper, we present a novel solution expanding the Advanced Data Protection Control (ADPC) mechanism to bridge current gaps in user data and privacy control. Our solution moves the consent control to the browser interface to give users a seamless and hassle-free experience, while at the same time offering content providers a way to be legally compliant with legislation. Through an extensive review, we evaluate previous works and identify current gaps in user data control. We then present a blueprint for future implementation and suggest features to support privacy control online for users globally. Given browser support, the solution provides a tangible path to effectively achieve legally compliant privacy and consent control in a user-oriented manner that could allow them to again browse the web seamlessly.
在通用数据保护条例(GDPR)和加州消费者隐私法案(CCPA)的时代,隐私和同意控制对日常网络用户来说变得更加明显。各种形状和大小的隐私横幅通过或多或少具有挑战性的设计请求许可,使隐私控制变得更加困难,而不是帮助用户保护隐私。在本文中,我们提出了一种扩展高级数据保护控制(ADPC)机制的新解决方案,以弥合当前用户数据和隐私控制方面的差距。我们的解决方案将同意控制转移到浏览器界面,为用户提供无缝和无忧的体验,同时为内容提供商提供一种符合法律规定的方式。通过广泛的审查,我们评估以前的工作,并确定当前在用户数据控制方面的差距。然后,我们提出了未来实现的蓝图,并提出了支持全球用户在线隐私控制的功能建议。在浏览器的支持下,该解决方案提供了一条切实可行的途径,以面向用户的方式有效地实现合法的隐私和同意控制,使他们能够再次无缝地浏览网页。
{"title":"Bridging the Privacy Gap: Enhanced User Consent Mechanisms on the Web","authors":"Carl Magnus Bruhner, David Hasselquist, Niklas Carlsson","doi":"10.14722/madweb.2023.23017","DOIUrl":"https://doi.org/10.14722/madweb.2023.23017","url":null,"abstract":"—In the age of the General Data Protection Regula- tion (GDPR) and the California Consumer Privacy Act (CCPA), privacy and consent control have become even more apparent for every-day web users. Privacy banners in all shapes and sizes ask for permission through more or less challenging designs and make privacy control more of a struggle than they help users’ privacy. In this paper, we present a novel solution expanding the Advanced Data Protection Control (ADPC) mechanism to bridge current gaps in user data and privacy control. Our solution moves the consent control to the browser interface to give users a seamless and hassle-free experience, while at the same time offering content providers a way to be legally compliant with legislation. Through an extensive review, we evaluate previous works and identify current gaps in user data control. We then present a blueprint for future implementation and suggest features to support privacy control online for users globally. Given browser support, the solution provides a tangible path to effectively achieve legally compliant privacy and consent control in a user-oriented manner that could allow them to again browse the web seamlessly.","PeriodicalId":205270,"journal":{"name":"Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings 2023 Workshop on Measurements, Attacks, and Defenses for the Web
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1