首页 > 最新文献

2019 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions 测量和分析搜索引擎中毒的语言冲突
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00025
Matthew Joslin, Neng Li, S. Hao, Minhui Xue, Haojin Zhu
Misspelled keywords have become an appealing target in search poisoning, since they are less competitive to promote than the correct queries and account for a considerable amount of search traffic. Search engines have adopted several countermeasure strategies, e.g., Google applies automated corrections on queried keywords and returns search results of the corrected versions directly. However, a sophisticated class of attack, which we term as linguistic-collision misspelling, can evade auto-correction and poison search results. Cybercriminals target special queries where the misspelled terms are existent words, even in other languages (e.g., "idobe", a misspelling of the English word "adobe", is a legitimate word in the Nigerian language). In this paper, we perform the first large-scale analysis on linguistic-collision search poisoning attacks. In particular, we check 1.77 million misspelled search terms on Google and Baidu and analyze both English and Chinese languages, which are the top two languages used by Internet users. We leverage edit distance operations and linguistic properties to generate misspelling candidates. To more efficiently identify linguistic-collision search terms, we design a deep learning model that can improve collection rate by 2.84x compared to random sampling. Our results show that the abuse is prevalent: around 1.19% of linguistic-collision search terms on Google and Baidu have results on the first page directing to malicious websites. We also find that cybercriminals mainly target categories of gambling, drugs, and adult content. Mobile-device users disproportionately search for misspelled keywords, presumably due to small screen for input. Our work highlights this new class of search engine poisoning and provides insights to help mitigate the threat.
拼写错误的关键字已经成为搜索中毒的一个吸引人的目标,因为它们比正确的查询更具竞争力,并且占了相当大的搜索流量。搜索引擎采用了几种对策策略,例如谷歌对查询的关键词进行自动更正,并直接返回更正后的搜索结果。然而,一类复杂的攻击,我们称之为语言冲突拼写错误,可以逃避自动更正和毒害搜索结果。网络罪犯的目标是那些拼写错误的词是存在的特殊查询,即使是在其他语言中(例如,“idobe”是英语单词“adobe”的拼写错误,在尼日利亚语中是一个合法的单词)。在本文中,我们首次对语言冲突搜索中毒攻击进行了大规模分析。特别是,我们在谷歌和百度上检查了177万个拼写错误的搜索词,并分析了网民使用最多的两种语言——英语和汉语。我们利用编辑距离操作和语言属性来生成拼写错误候选项。为了更有效地识别语言冲突搜索词,我们设计了一个深度学习模型,与随机抽样相比,该模型可以将收集率提高2.84倍。我们的结果显示,滥用是普遍存在的:在谷歌和百度上,大约1.19%的语言冲突搜索词在第一页的结果指向恶意网站。我们还发现,网络罪犯主要针对赌博、毒品和成人内容。移动设备用户不成比例地搜索拼错的关键字,可能是由于输入屏幕太小。我们的工作突出了这类新的搜索引擎中毒,并提供了有助于减轻威胁的见解。
{"title":"Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions","authors":"Matthew Joslin, Neng Li, S. Hao, Minhui Xue, Haojin Zhu","doi":"10.1109/SP.2019.00025","DOIUrl":"https://doi.org/10.1109/SP.2019.00025","url":null,"abstract":"Misspelled keywords have become an appealing target in search poisoning, since they are less competitive to promote than the correct queries and account for a considerable amount of search traffic. Search engines have adopted several countermeasure strategies, e.g., Google applies automated corrections on queried keywords and returns search results of the corrected versions directly. However, a sophisticated class of attack, which we term as linguistic-collision misspelling, can evade auto-correction and poison search results. Cybercriminals target special queries where the misspelled terms are existent words, even in other languages (e.g., \"idobe\", a misspelling of the English word \"adobe\", is a legitimate word in the Nigerian language). In this paper, we perform the first large-scale analysis on linguistic-collision search poisoning attacks. In particular, we check 1.77 million misspelled search terms on Google and Baidu and analyze both English and Chinese languages, which are the top two languages used by Internet users. We leverage edit distance operations and linguistic properties to generate misspelling candidates. To more efficiently identify linguistic-collision search terms, we design a deep learning model that can improve collection rate by 2.84x compared to random sampling. Our results show that the abuse is prevalent: around 1.19% of linguistic-collision search terms on Google and Baidu have results on the first page directing to malicious websites. We also find that cybercriminals mainly target categories of gambling, drugs, and adult content. Mobile-device users disproportionately search for misspelled keywords, presumably due to small screen for input. Our work highlights this new class of search engine poisoning and provides insights to help mitigate the threat.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122695166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
LBM: A Security Framework for Peripherals within the Linux Kernel LBM: Linux内核中外设的安全框架
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00041
D. Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, Kevin R. B. Butler
Modern computer peripherals are diverse in their capabilities and functionality, ranging from keyboards and printers to smartphones and external GPUs. In recent years, peripherals increasingly connect over a small number of standardized communication protocols, including USB, Bluetooth, and NFC. The host operating system is responsible for managing these devices; however, malicious peripherals can request additional functionality from the OS resulting in system compromise, or can craft data packets to exploit vulnerabilities within OS software stacks. Defenses against malicious peripherals to date only partially cover the peripheral attack surface and are limited to specific protocols (e.g., USB). In this paper, we propose Linux (e)BPF Modules (LBM), a general security framework that provides a unified API for enforcing protection against malicious peripherals within the Linux kernel. LBM leverages the eBPF packet filtering mechanism for performance and extensibility and we provide a high-level language to facilitate the development of powerful filtering functionality. We demonstrate how LBM can provide host protection against malicious USB, Bluetooth, and NFC devices; we also instantiate and unify existing defenses under the LBM framework. Our evaluation shows that the overhead introduced by LBM is within 1 μs per packet in most cases, application and system overhead is negligible, and LBM outperforms other state-of-the-art solutions. To our knowledge, LBM is the first security framework designed to provide comprehensive protection against malicious peripherals within the Linux kernel.
现代计算机外围设备的性能和功能多种多样,从键盘和打印机到智能手机和外部gpu。近年来,外设越来越多地通过少数标准化通信协议连接,包括USB、蓝牙和NFC。主机操作系统负责管理这些设备;然而,恶意的外设可以从操作系统请求额外的功能,从而危及系统,或者可以制作数据包来利用操作系统软件堆栈中的漏洞。迄今为止,针对恶意外设的防御仅部分覆盖了外设攻击面,并且仅限于特定协议(例如USB)。在本文中,我们提出了Linux (e)BPF模块(LBM),这是一个通用的安全框架,它提供了一个统一的API,用于在Linux内核中实施针对恶意外设的保护。LBM利用eBPF包过滤机制来提高性能和可扩展性,我们提供了一种高级语言来促进强大过滤功能的开发。我们演示了LBM如何提供针对恶意USB,蓝牙和NFC设备的主机保护;我们还在LBM框架下实例化和统一了现有的防御。我们的评估表明,在大多数情况下,LBM引入的开销在每个数据包1 μs以内,应用程序和系统开销可以忽略不计,并且LBM优于其他最先进的解决方案。据我们所知,LBM是第一个设计用于在Linux内核中提供针对恶意外设的全面保护的安全框架。
{"title":"LBM: A Security Framework for Peripherals within the Linux Kernel","authors":"D. Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, Kevin R. B. Butler","doi":"10.1109/SP.2019.00041","DOIUrl":"https://doi.org/10.1109/SP.2019.00041","url":null,"abstract":"Modern computer peripherals are diverse in their capabilities and functionality, ranging from keyboards and printers to smartphones and external GPUs. In recent years, peripherals increasingly connect over a small number of standardized communication protocols, including USB, Bluetooth, and NFC. The host operating system is responsible for managing these devices; however, malicious peripherals can request additional functionality from the OS resulting in system compromise, or can craft data packets to exploit vulnerabilities within OS software stacks. Defenses against malicious peripherals to date only partially cover the peripheral attack surface and are limited to specific protocols (e.g., USB). In this paper, we propose Linux (e)BPF Modules (LBM), a general security framework that provides a unified API for enforcing protection against malicious peripherals within the Linux kernel. LBM leverages the eBPF packet filtering mechanism for performance and extensibility and we provide a high-level language to facilitate the development of powerful filtering functionality. We demonstrate how LBM can provide host protection against malicious USB, Bluetooth, and NFC devices; we also instantiate and unify existing defenses under the LBM framework. Our evaluation shows that the overhead introduced by LBM is within 1 μs per packet in most cases, application and system overhead is negligible, and LBM outperforms other state-of-the-art solutions. To our knowledge, LBM is the first security framework designed to provide comprehensive protection against malicious peripherals within the Linux kernel.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Code That Never Ran: Modeling Attacks on Speculative Evaluation 从未运行的代码:对推测性求值的建模攻击
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00047
Craig Disselkoen, R. Jagadeesan, A. Jeffrey, J. Riely
This paper studies information flow caused by speculation mechanisms in hardware and software. The Spectre attack shows that there are practical information flow attacks which use an interaction of dynamic security checks, speculative evaluation and cache timing. Previous formal models of program execution are designed to capture computer architecture, rather than micro-architecture, and so do not capture attacks such as Spectre. In this paper, we propose a model based on pomsets which is designed to model speculative evaluation. The model is abstract with respect to specific micro-architectural features, such as caches and pipelines, yet is powerful enough to express known attacks such as Spectre and Prime+Abort, and verify their countermeasures. The model also allows for the prediction of new information flow attacks. We derive two such attacks, which exploit compiler optimizations, and validate these experimentally against gcc and clang.
本文研究了硬件和软件投机机制引起的信息流。Spectre攻击表明,有实际的信息流攻击使用动态安全检查,推测评估和缓存定时的相互作用。以前的程序执行的正式模型被设计为捕获计算机体系结构,而不是微体系结构,因此不能捕获像Spectre这样的攻击。在本文中,我们提出了一个基于模型集的模型来模拟推测性评价。该模型相对于特定的微架构特征(如缓存和管道)是抽象的,但它足够强大,可以表达已知的攻击,如Spectre和Prime+Abort,并验证其对策。该模型还允许预测新的信息流攻击。我们推导了两种这样的攻击,它们利用了编译器的优化,并对gcc和clang进行了实验验证。
{"title":"The Code That Never Ran: Modeling Attacks on Speculative Evaluation","authors":"Craig Disselkoen, R. Jagadeesan, A. Jeffrey, J. Riely","doi":"10.1109/SP.2019.00047","DOIUrl":"https://doi.org/10.1109/SP.2019.00047","url":null,"abstract":"This paper studies information flow caused by speculation mechanisms in hardware and software. The Spectre attack shows that there are practical information flow attacks which use an interaction of dynamic security checks, speculative evaluation and cache timing. Previous formal models of program execution are designed to capture computer architecture, rather than micro-architecture, and so do not capture attacks such as Spectre. In this paper, we propose a model based on pomsets which is designed to model speculative evaluation. The model is abstract with respect to specific micro-architectural features, such as caches and pipelines, yet is powerful enough to express known attacks such as Spectre and Prime+Abort, and verify their countermeasures. The model also allows for the prediction of new information flow attacks. We derive two such attacks, which exploit compiler optimizations, and validate these experimentally against gcc and clang.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128070834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
PrivKV: Key-Value Data Collection with Local Differential Privacy PrivKV:具有本地差分隐私的键值数据收集
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00018
Qingqing Ye, Haibo Hu, Xiaofeng Meng, Huadi Zheng
Local differential privacy (LDP), where each user perturbs her data locally before sending to an untrusted data collector, is a new and promising technique for privacy-preserving distributed data collection. The advantage of LDP is to enable the collector to obtain accurate statistical estimation on sensitive user data (e.g., location and app usage) without accessing them. However, existing work on LDP is limited to simple data types, such as categorical, numerical, and set-valued data. To the best of our knowledge, there is no existing LDP work on key-value data, which is an extremely popular NoSQL data model and the generalized form of set-valued and numerical data. In this paper, we study this problem of frequency and mean estimation on key-value data by first designing a baseline approach PrivKV within the same "perturbation-calibration" paradigm as existing LDP techniques. To address the poor estimation accuracy due to the clueless perturbation of users, we then propose two iterative solutions PrivKVM and PrivKVM+ that can gradually improve the estimation results through a series of iterations. An optimization strategy is also presented to reduce network latency and increase estimation accuracy by introducing virtual iterations in the collector side without user involvement. We verify the correctness and effectiveness of these solutions through theoretical analysis and extensive experimental results.
本地差分隐私(LDP)是一种新的、有前途的保护隐私的分布式数据收集技术,每个用户在将其数据发送到不可信的数据收集器之前在本地扰动其数据。LDP的优点是使收集器能够在不访问敏感用户数据(例如位置和应用程序使用情况)的情况下获得准确的统计估计。然而,现有的LDP工作仅限于简单的数据类型,如分类、数值和集值数据。据我们所知,目前还没有针对键值数据的LDP工作,键值数据是一种非常流行的NoSQL数据模型,是集值和数值数据的广义形式。在本文中,我们通过首先设计一个基线方法PrivKV来研究键值数据的频率和均值估计问题,该方法与现有的LDP技术具有相同的“扰动校准”范式。为了解决由于用户的无意识扰动导致的估计精度不高的问题,我们提出了PrivKVM和PrivKVM+两种迭代方案,通过一系列的迭代可以逐步提高估计结果。提出了一种优化策略,通过在不需要用户参与的情况下在收集器端引入虚拟迭代来减少网络延迟和提高估计精度。通过理论分析和广泛的实验结果验证了这些解决方案的正确性和有效性。
{"title":"PrivKV: Key-Value Data Collection with Local Differential Privacy","authors":"Qingqing Ye, Haibo Hu, Xiaofeng Meng, Huadi Zheng","doi":"10.1109/SP.2019.00018","DOIUrl":"https://doi.org/10.1109/SP.2019.00018","url":null,"abstract":"Local differential privacy (LDP), where each user perturbs her data locally before sending to an untrusted data collector, is a new and promising technique for privacy-preserving distributed data collection. The advantage of LDP is to enable the collector to obtain accurate statistical estimation on sensitive user data (e.g., location and app usage) without accessing them. However, existing work on LDP is limited to simple data types, such as categorical, numerical, and set-valued data. To the best of our knowledge, there is no existing LDP work on key-value data, which is an extremely popular NoSQL data model and the generalized form of set-valued and numerical data. In this paper, we study this problem of frequency and mean estimation on key-value data by first designing a baseline approach PrivKV within the same \"perturbation-calibration\" paradigm as existing LDP techniques. To address the poor estimation accuracy due to the clueless perturbation of users, we then propose two iterative solutions PrivKVM and PrivKVM+ that can gradually improve the estimation results through a series of iterations. An optimization strategy is also presented to reduce network latency and increase estimation accuracy by introducing virtual iterations in the collector side without user involvement. We verify the correctness and effectiveness of these solutions through theoretical analysis and extensive experimental results.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115323182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Bleichenbacher的CAT的九种生命:对TLS实现的新缓存攻击
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00062
Eyal Ronen, Robert Gillham, Daniel Genkin, A. Shamir, David Wong, Y. Yarom
At CRYPTO'98, Bleichenbacher published his seminal paper which described a padding oracle attack against RSA implementations that follow the PKCS #1 v1.5 standard. Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible sources of Bleichenbacher-like leakages. However, as we show in this paper, most implementations are still vulnerable to several novel types of attack based on leakage from various microarchitectural side channels: Out of nine popular implementations of TLS that we tested, we were able to break the security of seven implementations with practical proof-of-concept attacks. We demonstrate the feasibility of using those Cache-like ATacks (CATs) to perform a downgrade attack against any TLS connection to a vulnerable server, using a BEAST-like Man in the Browser attack. The main difficulty we face is how to perform the thousands of oracle queries required before the browser's imposed timeout (which is 30 seconds for almost all browsers, with the exception of Firefox which can be tricked into extending this period). Due to its use of adaptive chosen ciphertext queries, the attack seems to be inherently sequential, but we describe a new way to parallelize Bleichenbacher-like padding attacks by exploiting any available number of TLS servers that share the same public key certificate. With this improvement, we can demonstrate the feasibility of a downgrade attack which could recover all the 2048 bits of the RSA plaintext (including the premaster secret value, which suffices to establish a secure connection) from five available TLS servers in under 30 seconds. This sequential-to-parallel transformation of such attacks can be of independent interest, speeding up and facilitating other side channel attacks on RSA implementations.
在CRYPTO'98上,Bleichenbacher发表了他的开创性论文,描述了针对遵循pkcs# 1 v1.5标准的RSA实现的填充oracle攻击。在过去的二十年里,研究人员和实施者花费了大量的精力来开发和部署大量的缓解技术,这些技术本应堵塞布莱亨巴赫式泄漏的所有可能来源。然而,正如我们在本文中所展示的,大多数实现仍然容易受到几种基于各种微架构侧通道泄漏的新型攻击:在我们测试的9种流行的TLS实现中,我们能够通过实际的概念验证攻击打破7种实现的安全性。我们演示了使用这些类缓存攻击(CATs)对任何到易受攻击的服务器的TLS连接执行降级攻击的可行性,在浏览器中使用类兽攻击。我们面临的主要困难是如何在浏览器强制超时(几乎所有浏览器都是30秒,除了Firefox可以被欺骗延长这个时间)之前执行数千个oracle查询。由于它使用自适应选择的密文查询,攻击似乎是固有的顺序,但我们描述了一种新的方法来并行布莱亨巴赫式填充攻击,利用任何可用的数量的TLS服务器共享相同的公钥证书。通过这种改进,我们可以证明降级攻击的可行性,降级攻击可以在30秒内从五个可用的TLS服务器恢复RSA明文的所有2048位(包括足以建立安全连接的premaster秘密值)。这种攻击的顺序到并行转换可以是独立的兴趣,加速和促进对RSA实现的其他侧信道攻击。
{"title":"The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations","authors":"Eyal Ronen, Robert Gillham, Daniel Genkin, A. Shamir, David Wong, Y. Yarom","doi":"10.1109/SP.2019.00062","DOIUrl":"https://doi.org/10.1109/SP.2019.00062","url":null,"abstract":"At CRYPTO'98, Bleichenbacher published his seminal paper which described a padding oracle attack against RSA implementations that follow the PKCS #1 v1.5 standard. Over the last twenty years researchers and implementors had spent a huge amount of effort in developing and deploying numerous mitigation techniques which were supposed to plug all the possible sources of Bleichenbacher-like leakages. However, as we show in this paper, most implementations are still vulnerable to several novel types of attack based on leakage from various microarchitectural side channels: Out of nine popular implementations of TLS that we tested, we were able to break the security of seven implementations with practical proof-of-concept attacks. We demonstrate the feasibility of using those Cache-like ATacks (CATs) to perform a downgrade attack against any TLS connection to a vulnerable server, using a BEAST-like Man in the Browser attack. The main difficulty we face is how to perform the thousands of oracle queries required before the browser's imposed timeout (which is 30 seconds for almost all browsers, with the exception of Firefox which can be tricked into extending this period). Due to its use of adaptive chosen ciphertext queries, the attack seems to be inherently sequential, but we describe a new way to parallelize Bleichenbacher-like padding attacks by exploiting any available number of TLS servers that share the same public key certificate. With this improvement, we can demonstrate the feasibility of a downgrade attack which could recover all the 2048 bits of the RSA plaintext (including the premaster secret value, which suffices to establish a secure connection) from five available TLS servers in under 30 seconds. This sequential-to-parallel transformation of such attacks can be of independent interest, speeding up and facilitating other side channel attacks on RSA implementations.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Fuzzing File Systems via Two-Dimensional Input Space Exploration 通过二维输入空间探索模糊化文件系统
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00035
Wen Xu, Hyungon Moon, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim
File systems, a basic building block of an OS, are too big and too complex to be bug free. Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find bugs, which are limited due to the ever-increasing complexity of both file systems and OSes. Thus, fuzzing, proven to be an effective and a practical approach, becomes a preferable choice, as it does not need much knowledge about a target. However, three main challenges exist in fuzzing file systems: mutating a large image blob that degrades overall performance, generating image-dependent file operations, and reproducing found bugs, which is difficult for existing OS fuzzers. Hence, we present JANUS, the first feedback-driven fuzzer that explores the two-dimensional input space of a file system, i.e., mutating metadata on a large image, while emitting image-directed file operations. In addition, JANUS relies on a library OS rather than on traditional VMs for fuzzing, which enables JANUS to load a fresh copy of the OS, thereby leading to better reproducibility of bugs. We evaluate JANUS on eight file systems and found 90 bugs in the upstream Linux kernel, 62 of which have been acknowledged. Forty-three bugs have been fixed with 32 CVEs assigned. In addition, JANUS achieves higher code coverage on all the file systems after fuzzing 12 hours, when compared with the state-of-the-art fuzzer Syzkaller for fuzzing file systems. JANUS visits 4.19x and 2.01x more code paths in Btrfs and ext4, respectively. Moreover, JANUS is able to reproduce 88–100% of the crashes, while Syzkaller fails on all of them.
文件系统是操作系统的一个基本组成部分,它太大太复杂,不可能没有bug。然而,文件系统依赖于常规的压力测试工具和正式的检查器来发现错误,由于文件系统和操作系统的复杂性不断增加,这些工具的使用受到了限制。因此,模糊测试被证明是一种有效和实用的方法,成为一个更可取的选择,因为它不需要对目标有太多的了解。然而,模糊文件系统存在三个主要挑战:改变会降低整体性能的大型映像blob、生成依赖映像的文件操作以及重现发现的错误,这对于现有的操作系统模糊器来说是困难的。因此,我们提出了JANUS,这是第一个反馈驱动的模糊器,它探索文件系统的二维输入空间,即,在大图像上改变元数据,同时发出图像导向的文件操作。此外,JANUS依赖于库操作系统而不是传统的虚拟机进行模糊测试,这使JANUS能够加载操作系统的新副本,从而更好地再现错误。我们在8个文件系统上对JANUS进行了评估,在上游Linux内核中发现了90个bug,其中62个已经被确认。修复了43个bug,分配了32个cve。此外,与用于模糊文件系统的最先进的模糊器Syzkaller相比,在模糊测试12小时后,JANUS在所有文件系统上实现了更高的代码覆盖率。JANUS在Btrfs和ext4中分别访问了4.19倍和2.01倍的代码路径。此外,JANUS能够再现88-100%的崩溃,而Syzkaller在所有崩溃中都失败了。
{"title":"Fuzzing File Systems via Two-Dimensional Input Space Exploration","authors":"Wen Xu, Hyungon Moon, Sanidhya Kashyap, Po-Ning Tseng, Taesoo Kim","doi":"10.1109/SP.2019.00035","DOIUrl":"https://doi.org/10.1109/SP.2019.00035","url":null,"abstract":"File systems, a basic building block of an OS, are too big and too complex to be bug free. Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find bugs, which are limited due to the ever-increasing complexity of both file systems and OSes. Thus, fuzzing, proven to be an effective and a practical approach, becomes a preferable choice, as it does not need much knowledge about a target. However, three main challenges exist in fuzzing file systems: mutating a large image blob that degrades overall performance, generating image-dependent file operations, and reproducing found bugs, which is difficult for existing OS fuzzers. Hence, we present JANUS, the first feedback-driven fuzzer that explores the two-dimensional input space of a file system, i.e., mutating metadata on a large image, while emitting image-directed file operations. In addition, JANUS relies on a library OS rather than on traditional VMs for fuzzing, which enables JANUS to load a fresh copy of the OS, thereby leading to better reproducibility of bugs. We evaluate JANUS on eight file systems and found 90 bugs in the upstream Linux kernel, 62 of which have been acknowledged. Forty-three bugs have been fixed with 32 CVEs assigned. In addition, JANUS achieves higher code coverage on all the file systems after fuzzing 12 hours, when compared with the state-of-the-art fuzzer Syzkaller for fuzzing file systems. JANUS visits 4.19x and 2.01x more code paths in Btrfs and ext4, respectively. Moreover, JANUS is able to reproduce 88–100% of the crashes, while Syzkaller fails on all of them.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Drones' Cryptanalysis - Smashing Cryptography with a Flicker 无人机的密码分析-用闪烁粉碎密码
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00051
Ben Nassi, Raz Ben-Netanel, A. Shamir, Y. Elovici
In an "open skies" era in which drones fly among us, a new question arises: how can we tell whether a passing drone is being used by its operator for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)? Over the years, many methods have been suggested to detect the presence of a drone in a specific location, however since populated areas are no longer off limits for drone flights, the previously suggested methods for detecting a privacy invasion attack are irrelevant. In this paper, we present a new method that can detect whether a specific POI (point of interest) is being video streamed by a drone. We show that applying a periodic physical stimulus on a target/victim being video streamed by a drone causes a watermark to be added to the encrypted video traffic that is sent from the drone to its operator and how this watermark can be detected using interception. Based on this method, we present an algorithm for detecting a privacy invasion attack. We analyze the performance of our algorithm using four commercial drones (DJI Mavic Air, Parrot Bebop 2, DJI Spark, and DJI Mavic Pro). We show how our method can be used to (1) determine whether a detected FPV (first-person view) channel is being used to video stream a POI by a drone, and (2) locate a spying drone in space; we also demonstrate how the physical stimulus can be applied covertly. In addition, we present a classification algorithm that differentiates FPV transmissions from other suspicious radio transmissions. We implement this algorithm in a new invasion attack detection system which we evaluate in two use cases (when the victim is inside his/her house and when the victim is being tracked by a drone while driving his/her car); our evaluation shows that a privacy invasion attack can be detected by our system in about 2-3 seconds.
在一个无人机在我们中间飞行的“开放天空”时代,一个新的问题出现了:我们如何判断一架经过的无人机是被其操作员用于合法目的(例如,送披萨)还是非法目的(例如,偷看一个人在他/她自己的房子里洗澡)?多年来,已经提出了许多方法来检测无人机在特定位置的存在,然而,由于人口稠密的地区不再禁止无人机飞行,以前建议的检测隐私侵犯攻击的方法是无关紧要的。在本文中,我们提出了一种新的方法,可以检测特定的POI(兴趣点)是否正在被无人机视频流传输。我们表明,应用周期性的物理刺激的目标/受害者正在视频流由无人机导致水印被添加到加密的视频流量,从无人机发送到其操作员,以及如何使用拦截可以检测到这个水印。在此基础上,提出了一种检测隐私入侵攻击的算法。我们使用四架商用无人机(DJI Mavic Air, Parrot Bebop 2, DJI Spark和DJI Mavic Pro)分析了我们的算法的性能。我们展示了如何使用我们的方法来(1)确定检测到的FPV(第一人称视角)通道是否被用于无人机视频流POI,以及(2)在空间中定位间谍无人机;我们还演示了如何隐蔽地应用物理刺激。此外,我们提出了一种分类算法,将FPV传输与其他可疑的无线电传输区分开来。我们在一个新的入侵攻击检测系统中实现了这个算法,我们在两个用例中进行了评估(当受害者在他/她的房子里,当受害者在驾驶他/她的车时被无人机跟踪);我们的评估表明,我们的系统可以在大约2-3秒内检测到隐私入侵攻击。
{"title":"Drones' Cryptanalysis - Smashing Cryptography with a Flicker","authors":"Ben Nassi, Raz Ben-Netanel, A. Shamir, Y. Elovici","doi":"10.1109/SP.2019.00051","DOIUrl":"https://doi.org/10.1109/SP.2019.00051","url":null,"abstract":"In an \"open skies\" era in which drones fly among us, a new question arises: how can we tell whether a passing drone is being used by its operator for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)? Over the years, many methods have been suggested to detect the presence of a drone in a specific location, however since populated areas are no longer off limits for drone flights, the previously suggested methods for detecting a privacy invasion attack are irrelevant. In this paper, we present a new method that can detect whether a specific POI (point of interest) is being video streamed by a drone. We show that applying a periodic physical stimulus on a target/victim being video streamed by a drone causes a watermark to be added to the encrypted video traffic that is sent from the drone to its operator and how this watermark can be detected using interception. Based on this method, we present an algorithm for detecting a privacy invasion attack. We analyze the performance of our algorithm using four commercial drones (DJI Mavic Air, Parrot Bebop 2, DJI Spark, and DJI Mavic Pro). We show how our method can be used to (1) determine whether a detected FPV (first-person view) channel is being used to video stream a POI by a drone, and (2) locate a spying drone in space; we also demonstrate how the physical stimulus can be applied covertly. In addition, we present a classification algorithm that differentiates FPV transmissions from other suspicious radio transmissions. We implement this algorithm in a new invasion attack detection system which we evaluate in two use cases (when the victim is inside his/her house and when the victim is being tracked by a drone while driving his/her car); our evaluation shows that a privacy invasion attack can be detected by our system in about 2-3 seconds.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis 碘:使用无回滚乐观混合分析的快速动态污点跟踪
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00043
Subarno Banerjee, David Devecsery, Peter M. Chen, S. Narayanasamy
Dynamic information-flow tracking (DIFT) is useful for enforcing security policies, but rarely used in practice, as it can slow down a program by an order of magnitude. Static program analyses can be used to prove safe execution states and elide unnecessary DIFT monitors, but the performance improvement from these analyses is limited by their need to maintain soundness. In this paper, we present a novel optimistic hybrid analysis (OHA) to significantly reduce DIFT overhead while still guaranteeing sound results. It consists of a predicated whole-program static taint analysis, which assumes likely invariants gathered from profiles to dramatically improve precision. The optimized DIFT is sound for executions in which those invariants hold true, and recovers to a conservative DIFT for executions in which those invariants are false. We show how to overcome the main problem with using OHA to optimize live executions, which is the possibility of unbounded rollbacks. We eliminate the need for any rollback during recovery by tailoring our predicated static analysis to eliminate only safe elisions of noop monitors. Our tool, Iodine, reduces the overhead of DIFT for enforcing security policies to 9%, which is 4.4x lower than that with traditional hybrid analysis, while still being able to be run on live systems.
动态信息流跟踪(DIFT)对于执行安全策略很有用,但在实践中很少使用,因为它会使程序的运行速度降低一个数量级。静态程序分析可以用来证明安全的执行状态,并省略不必要的DIFT监视器,但是这些分析的性能改进由于需要保持可靠性而受到限制。在本文中,我们提出了一种新的乐观混合分析(OHA),以显着降低DIFT开销,同时仍然保证良好的结果。它包括一个预测的整个程序静态污染分析,它假设从配置文件收集的可能的不变量,以显着提高精度。优化后的DIFT对于那些不变量为真的执行是合理的,对于那些不变量为假的执行恢复为保守的DIFT。我们将展示如何克服使用OHA优化实时执行的主要问题,即无限回滚的可能性。通过调整我们的预测静态分析,只删除noop监视器的安全片段,我们消除了恢复期间任何回滚的需要。我们的工具碘将DIFT用于执行安全策略的开销减少到9%,比传统的混合分析低4.4倍,同时仍然能够在活动系统上运行。
{"title":"Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis","authors":"Subarno Banerjee, David Devecsery, Peter M. Chen, S. Narayanasamy","doi":"10.1109/SP.2019.00043","DOIUrl":"https://doi.org/10.1109/SP.2019.00043","url":null,"abstract":"Dynamic information-flow tracking (DIFT) is useful for enforcing security policies, but rarely used in practice, as it can slow down a program by an order of magnitude. Static program analyses can be used to prove safe execution states and elide unnecessary DIFT monitors, but the performance improvement from these analyses is limited by their need to maintain soundness. In this paper, we present a novel optimistic hybrid analysis (OHA) to significantly reduce DIFT overhead while still guaranteeing sound results. It consists of a predicated whole-program static taint analysis, which assumes likely invariants gathered from profiles to dramatically improve precision. The optimized DIFT is sound for executions in which those invariants hold true, and recovers to a conservative DIFT for executions in which those invariants are false. We show how to overcome the main problem with using OHA to optimize live executions, which is the possibility of unbounded rollbacks. We eliminate the need for any rollback during recovery by tailoring our predicated static analysis to eliminate only safe elisions of noop monitors. Our tool, Iodine, reduces the overhead of DIFT for enforcing security policies to 9%, which is 4.4x lower than that with traditional hybrid analysis, while still being able to be run on live systems.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131681168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples 我的结果有多好概括?比较来自MTurk、Web和电话样本的安全和隐私调查结果
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00014
Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk (MTurk) to evaluate security tools, to understand users' privacy preferences and to measure online behavior. Yet, little is known about how well Turkers' survey responses and performance on security- and privacy-related tasks generalizes to a broader population. This paper takes a first step toward understanding the generalizability of security and privacy user studies by comparing users' self-reports of their security and privacy knowledge, past experiences, advice sources, and behavior across samples collected using MTurk (n=480), a census-representative web-panel (n=428), and a probabilistic telephone sample (n=3,000) statistically weighted to be accurate within 2.7% of the true prevalence in the U.S. Surprisingly, the results suggest that: (1) MTurk responses regarding security and privacy experiences, advice sources, and knowledge are more representative of the U.S. population than are responses from the census-representative panel; (2) MTurk and general population reports of security and privacy experiences, knowledge, and advice sources are quite similar for respondents who are younger than 50 or who have some college education; and (3) respondents' answers to the survey questions we ask are stable over time and robust to relevant, broadly-reported news events. Further, differences in responses cannot be ameliorated with simple demographic weighting, possibly because MTurk and panel participants have more internet experience compared to their demographic peers. Together, these findings lend tempered support for the generalizability of prior crowdsourced security and privacy user studies; provide context to more accurately interpret the results of such studies; and suggest rich directions for future work to mitigate experience- rather than demographic-related sample biases.
安全和隐私研究人员经常依靠从亚马逊土耳其机器人(MTurk)收集的数据来评估安全工具,了解用户的隐私偏好,并衡量在线行为。然而,对于Turkers在安全和隐私相关任务上的调查反应和表现在更广泛的人群中有多普遍,我们知之甚少。本文通过比较使用MTurk (n=480)、人口普查代表性网络面板(n=428)和概率电话样本(n= 3000)收集的样本中用户对其安全和隐私知识、过去经验、建议来源和行为的自我报告,向理解安全和隐私用户研究的普遍性迈出了第一步,这些样本的统计加权在美国真实患病率的2.7%内准确。令人惊讶的是,结果表明:(1)土耳其人关于安全和隐私经验、建议来源和知识的回答比人口普查代表小组的回答更能代表美国人口;(2)对于年龄在50岁以下或受过一些大学教育的受访者来说,MTurk和一般人群在安全和隐私经验、知识和建议来源方面的报告非常相似;(3)受访者对我们提出的调查问题的回答随着时间的推移是稳定的,并且对于相关的、广泛报道的新闻事件是稳健的。此外,反应的差异不能通过简单的人口加权来改善,可能是因为MTurk和小组参与者比他们的人口统计学同龄人有更多的互联网经验。总之,这些发现为先前众包安全和隐私用户研究的普遍性提供了有限的支持;提供背景,以便更准确地解释此类研究的结果;并为未来的工作提出丰富的方向,以减轻经验,而不是人口统计相关的样本偏差。
{"title":"How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples","authors":"Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek","doi":"10.1109/SP.2019.00014","DOIUrl":"https://doi.org/10.1109/SP.2019.00014","url":null,"abstract":"Security and privacy researchers often rely on data collected from Amazon Mechanical Turk (MTurk) to evaluate security tools, to understand users' privacy preferences and to measure online behavior. Yet, little is known about how well Turkers' survey responses and performance on security- and privacy-related tasks generalizes to a broader population. This paper takes a first step toward understanding the generalizability of security and privacy user studies by comparing users' self-reports of their security and privacy knowledge, past experiences, advice sources, and behavior across samples collected using MTurk (n=480), a census-representative web-panel (n=428), and a probabilistic telephone sample (n=3,000) statistically weighted to be accurate within 2.7% of the true prevalence in the U.S. Surprisingly, the results suggest that: (1) MTurk responses regarding security and privacy experiences, advice sources, and knowledge are more representative of the U.S. population than are responses from the census-representative panel; (2) MTurk and general population reports of security and privacy experiences, knowledge, and advice sources are quite similar for respondents who are younger than 50 or who have some college education; and (3) respondents' answers to the survey questions we ask are stable over time and robust to relevant, broadly-reported news events. Further, differences in responses cannot be ameliorated with simple demographic weighting, possibly because MTurk and panel participants have more internet experience compared to their demographic peers. Together, these findings lend tempered support for the generalizability of prior crowdsourced security and privacy user studies; provide context to more accurately interpret the results of such studies; and suggest rich directions for future work to mitigate experience- rather than demographic-related sample biases.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning 环上主动安全MPC的新原语及其在私有机器学习中的应用
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00078
I. Damgård, Daniel E. Escudero, T. Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
At CRYPTO 2018 Cramer et al. presented SPDZ2k , a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Their protocol uses slightly more communication than competitive schemes working over fields. However, implementation-wise, their approach allows for arithmetic to be carried out using native 32 or 64-bit CPU operations rather than modulo a large prime. The authors thus conjectured that the increased communication would be more than made up for by the increased efficiency of implementations. In this work we answer their conjecture in the affirmative. We do so by implementing their scheme, and designing and implementing new efficient protocols for equality test, comparison, and truncation over rings. We further show that these operations find application in the machine learning domain, and indeed significantly outperform their field-based competitors. In particular, we implement and benchmark oblivious algorithms for decision tree and support vector machine (SVM) evaluation.
在CRYPTO 2018上,Cramer等人提出了SPDZ2k,这是一种新的基于秘密共享的协议,用于针对不诚实的多数进行主动安全的多方计算,该协议通过环而不是字段工作。他们的协议比在田野上工作的竞争方案使用更多的通信。然而,在实现方面,他们的方法允许使用本地32位或64位CPU操作来执行算术运算,而不是对一个大素数取模。因此,作者推测,增加的通信将被实现效率的提高所弥补。在这项工作中,我们肯定地回答了他们的猜想。为此,我们实现了他们的方案,并设计和实现了新的有效协议,用于环上的相等性测试、比较和截断。我们进一步表明,这些操作在机器学习领域得到了应用,并且确实显著优于基于该领域的竞争对手。特别地,我们实现和基准无关算法的决策树和支持向量机(SVM)评估。
{"title":"New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning","authors":"I. Damgård, Daniel E. Escudero, T. Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev","doi":"10.1109/SP.2019.00078","DOIUrl":"https://doi.org/10.1109/SP.2019.00078","url":null,"abstract":"At CRYPTO 2018 Cramer et al. presented SPDZ2k , a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Their protocol uses slightly more communication than competitive schemes working over fields. However, implementation-wise, their approach allows for arithmetic to be carried out using native 32 or 64-bit CPU operations rather than modulo a large prime. The authors thus conjectured that the increased communication would be more than made up for by the increased efficiency of implementations. In this work we answer their conjecture in the affirmative. We do so by implementing their scheme, and designing and implementing new efficient protocols for equality test, comparison, and truncation over rings. We further show that these operations find application in the machine learning domain, and indeed significantly outperform their field-based competitors. In particular, we implement and benchmark oblivious algorithms for decision tree and support vector machine (SVM) evaluation.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
期刊
2019 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1