首页 > 最新文献

2019 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale KHyperLogLog:估计大规模大数据的可识别性和可接合性
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00046
Pern Hui Chia, Damien Desfontaines, Irippuge Milinda Perera, Daniel Simmons-Marengo, Chao Li, Wei-Yen Day, Qiushi Wang, Miguel Guevara
Understanding the privacy relevant characteristics of data sets, such as reidentifiability and joinability, is crucial for data governance, yet can be difficult for large data sets. While computing the data characteristics by brute force is straightforward, the scale of systems and data collected by large organizations demands an efficient approach. We present KHyperLogLog (KHLL), an algorithm based on approximate counting techniques that can estimate the reidentifiability and joinability risks of very large databases using linear runtime and minimal memory. KHLL enables one to measure reidentifiability of data quantitatively, rather than based on expert judgement or manual reviews. Meanwhile, joinability analysis using KHLL helps ensure the separation of pseudonymous and identified data sets. We describe how organizations can use KHLL to improve protection of user privacy. The efficiency of KHLL allows one to schedule periodic analyses that detect any deviations from the expected risks over time as a regression test for privacy. We validate the performance and accuracy of KHLL through experiments using proprietary and publicly available data sets.
了解数据集的隐私相关特征(如可识别性和可连接性)对于数据治理至关重要,但对于大型数据集来说可能很困难。虽然通过蛮力计算数据特征很简单,但大型组织收集的系统和数据的规模需要一种有效的方法。我们提出了KHyperLogLog (KHLL),这是一种基于近似计数技术的算法,可以使用线性运行时和最小内存来估计超大型数据库的可识别性和可连接性风险。KHLL使人们能够定量地衡量数据的可识别性,而不是基于专家判断或人工审查。同时,使用KHLL的可接合性分析有助于确保假名数据集和已识别数据集的分离。我们描述了组织如何使用KHLL来改进用户隐私保护。KHLL的效率允许安排定期分析,以检测随着时间的推移与预期风险的任何偏差,作为隐私的回归测试。我们通过使用专有和公开数据集的实验验证了KHLL的性能和准确性。
{"title":"KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale","authors":"Pern Hui Chia, Damien Desfontaines, Irippuge Milinda Perera, Daniel Simmons-Marengo, Chao Li, Wei-Yen Day, Qiushi Wang, Miguel Guevara","doi":"10.1109/SP.2019.00046","DOIUrl":"https://doi.org/10.1109/SP.2019.00046","url":null,"abstract":"Understanding the privacy relevant characteristics of data sets, such as reidentifiability and joinability, is crucial for data governance, yet can be difficult for large data sets. While computing the data characteristics by brute force is straightforward, the scale of systems and data collected by large organizations demands an efficient approach. We present KHyperLogLog (KHLL), an algorithm based on approximate counting techniques that can estimate the reidentifiability and joinability risks of very large databases using linear runtime and minimal memory. KHLL enables one to measure reidentifiability of data quantitatively, rather than based on expert judgement or manual reviews. Meanwhile, joinability analysis using KHLL helps ensure the separation of pseudonymous and identified data sets. We describe how organizations can use KHLL to improve protection of user privacy. The efficiency of KHLL allows one to schedule periodic analyses that detect any deviations from the expected risks over time as a regression test for privacy. We validate the performance and accuracy of KHLL through experiments using proprietary and publicly available data sets.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers 流氓之吻:评估在加油站刷卡的可探测性
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00077
Nolen Scaife, Jasmine Bowers, Christian Peeters, Grant Hernandez, Imani N. Sherman, Patrick Traynor, Lisa Anthony
Credit and debit cards enable financial transactions at unattended "pay-at-the-pump" gas station terminals across North America. Attackers discreetly open these pumps and install skimmers, which copy sensitive card data. While EMV (“chip-and-PIN”) has made substantial inroads in traditional retailers, such systems have virtually no deployment at pay-at-the-pump terminals due to dramatically higher costs and logistical/regulatory constraints, leaving consumers vulnerable in these contexts. In an effort to improve security, station owners have deployed security indicators such as low-cost tamper-evident seals, and technologists have developed skimmer detection apps for mobile phones. Not only do these solutions put the onus on consumers to notice and react to security concerns at the pump, but the efficacy of these solutions has not been measured. In this paper, we evaluate the indicators available to consumers to detect skimmers. We perform a comprehensive teardown of all known skimmer detection apps for iOS and Android devices, and then conduct a forensic analysis of real-world gas pump skimmer hardware recovered by multiple law enforcement agencies. Finally, we analyze anti-skimmer mechanisms deployed by pump owners/operators, and augment this investigation with an analysis of skimmer reports and accompanying security measures collected by the Florida Department of Agriculture and Consumer Services over four years, making this the most comprehensive long-term study of such devices. Our results show that common gas pump security indicators are not only ineffective at empowering consumers to detect tampering, but may be providing a false sense of security. Accordingly, stronger, reliable, inexpensive measures must be developed to protect consumers and merchants from fraud.
信用卡和借记卡使金融交易可以在北美无人值守的加油站终端进行。攻击者会小心翼翼地打开这些泵并安装读取器,从而复制敏感的信用卡数据。虽然EMV(“芯片和密码”)已经在传统零售商中取得了重大进展,但由于成本高得多,加上物流/监管方面的限制,这种系统在加油站支付终端中几乎没有部署,这使得消费者在这些情况下容易受到伤害。为了提高安全性,加油站老板已经部署了安全指标,比如低成本的防篡改封条,技术人员已经开发了手机上的撇油器检测应用程序。这些解决方案不仅让消费者有责任注意到泵的安全问题并作出反应,而且这些解决方案的功效尚未得到衡量。在本文中,我们评估了消费者可用来检测撇脂者的指标。我们对iOS和Android设备上所有已知的撇脂器检测应用程序进行了全面的拆解,然后对多个执法机构恢复的真实加油站撇脂器硬件进行了法医分析。最后,我们分析了泵所有者/运营商部署的反撇油器机制,并通过分析佛罗里达州农业和消费者服务部在过去四年中收集的撇油器报告和附带的安全措施来扩大这项调查,使其成为此类设备最全面的长期研究。我们的研究结果表明,常见的气泵安全指标不仅在赋予消费者检测篡改的能力方面是无效的,而且可能提供一种虚假的安全感。因此,必须制定更有力、可靠、廉价的措施,保护消费者和商家免受欺诈。
{"title":"Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers","authors":"Nolen Scaife, Jasmine Bowers, Christian Peeters, Grant Hernandez, Imani N. Sherman, Patrick Traynor, Lisa Anthony","doi":"10.1109/SP.2019.00077","DOIUrl":"https://doi.org/10.1109/SP.2019.00077","url":null,"abstract":"Credit and debit cards enable financial transactions at unattended \"pay-at-the-pump\" gas station terminals across North America. Attackers discreetly open these pumps and install skimmers, which copy sensitive card data. While EMV (“chip-and-PIN”) has made substantial inroads in traditional retailers, such systems have virtually no deployment at pay-at-the-pump terminals due to dramatically higher costs and logistical/regulatory constraints, leaving consumers vulnerable in these contexts. In an effort to improve security, station owners have deployed security indicators such as low-cost tamper-evident seals, and technologists have developed skimmer detection apps for mobile phones. Not only do these solutions put the onus on consumers to notice and react to security concerns at the pump, but the efficacy of these solutions has not been measured. In this paper, we evaluate the indicators available to consumers to detect skimmers. We perform a comprehensive teardown of all known skimmer detection apps for iOS and Android devices, and then conduct a forensic analysis of real-world gas pump skimmer hardware recovered by multiple law enforcement agencies. Finally, we analyze anti-skimmer mechanisms deployed by pump owners/operators, and augment this investigation with an analysis of skimmer reports and accompanying security measures collected by the Florida Department of Agriculture and Consumer Services over four years, making this the most comprehensive long-term study of such devices. Our results show that common gas pump security indicators are not only ineffective at empowering consumers to detect tampering, but may be providing a false sense of security. Accordingly, stronger, reliable, inexpensive measures must be developed to protect consumers and merchants from fraud.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SoK: Security Evaluation of Home-Based IoT Deployments SoK:家庭物联网部署的安全评估
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00013
Omar Alrawi, Chaz Lever, M. Antonakakis, F. Monrose
Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but this work finds that to be a naive assumption. The truth is, IoT deployments, at their core, utilize traditional compute systems, such as embedded, mobile, and network. These components have many unexplored challenges such as the effect of over-privileged mobile applications on embedded devices. Our work proposes a methodology that researchers and practitioners could employ to analyze security properties for home-based IoT devices. We systematize the literature for home-based IoT using this methodology in order to understand attack techniques, mitigations, and stakeholders. Further, we evaluate numDevices devices to augment the systematized literature in order to identify neglected research areas. To make this analysis transparent and easier to adapt by the community, we provide a public portal to share our evaluation data and invite the community to contribute their independent findings.
基于家庭的物联网设备在安全实践方面名声不佳。从表面上看,物联网设备的不安全似乎是由集成问题引起的,这些问题可以通过简单的措施解决,但这项工作发现这是一个天真的假设。事实是,物联网部署的核心是利用传统的计算系统,如嵌入式、移动和网络。这些组件有许多未开发的挑战,例如对嵌入式设备的过度特权移动应用程序的影响。我们的工作提出了一种方法,研究人员和从业人员可以使用它来分析基于家庭的物联网设备的安全属性。我们使用这种方法对基于家庭的物联网的文献进行了系统化,以便了解攻击技术、缓解措施和利益相关者。此外,我们评估numDevices设备,以增加系统化的文献,以确定被忽视的研究领域。为了使分析透明,更容易被社区采用,我们提供了一个公共门户网站来分享我们的评估数据,并邀请社区贡献他们的独立发现。
{"title":"SoK: Security Evaluation of Home-Based IoT Deployments","authors":"Omar Alrawi, Chaz Lever, M. Antonakakis, F. Monrose","doi":"10.1109/SP.2019.00013","DOIUrl":"https://doi.org/10.1109/SP.2019.00013","url":null,"abstract":"Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but this work finds that to be a naive assumption. The truth is, IoT deployments, at their core, utilize traditional compute systems, such as embedded, mobile, and network. These components have many unexplored challenges such as the effect of over-privileged mobile applications on embedded devices. Our work proposes a methodology that researchers and practitioners could employ to analyze security properties for home-based IoT devices. We systematize the literature for home-based IoT using this methodology in order to understand attack techniques, mitigations, and stakeholders. Further, we evaluate numDevices devices to augment the systematized literature in order to identify neglected research areas. To make this analysis transparent and easier to adapt by the community, we provide a public portal to share our evaluation data and invite the community to contribute their independent findings.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132949869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 280
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens Tap 'n Ghost:针对智能手机触摸屏的新攻击技术汇编
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00037
S. Maruyama, Satohiro Wakabayashi, Tatsuya Mori
We present a novel attack named "Tap 'n Ghost", which aims to attack the touchscreens of NFC-enabled mobile devices such as smartphones. Tap 'n Ghost consists of two striking attack techniques --- "Tag-based Adaptive Ploy (TAP)" and "Ghost Touch Generator." First, using a NFC card emulator embedded in a common object such as table, a TAP system performs tailored attacks on the victim's smartphone by employing device fingerprinting; e.g., popping up a customized dialogue box asking whether or not to connect to an attacker's Bluetooth mouse. Further, Ghost Touch Generator forces the victim to connect to the mouse even if she or he aimed to cancel the dialogue by touching the "cancel" button; i.e., it alters the selection of a button on a screen. After the connection is established, the attacker can remotely take control of the smartphone, with the knowledge about the layout of the screen derived from the device fingerprinting. To evaluate the reality of the attack, we perform an online survey with 300 respondents and a user study involving 16 participants. The results demonstrate that the attack is realistic. We additionally discuss the possible countermeasures against the threats posed by Tap 'n Ghost.
我们提出了一种名为“Tap 'n Ghost”的新型攻击,旨在攻击支持nfc的移动设备(如智能手机)的触摸屏。Tap 'n Ghost包括两种引人注目的攻击技术——“基于标签的自适应策略(Tap)”和“鬼触发生器”。首先,使用嵌入在普通物体(如桌子)中的NFC卡模拟器,TAP系统通过使用设备指纹对受害者的智能手机执行定制攻击;例如,弹出一个定制的对话框,询问是否连接到攻击者的蓝牙鼠标。此外,《Ghost Touch Generator》强迫受害者连接鼠标,即使她或他想通过触碰“取消”按钮来取消对话;也就是说,它改变了屏幕上按钮的选择。连接建立后,攻击者可以远程控制智能手机,通过设备指纹获取屏幕布局信息。为了评估攻击的真实性,我们对300名受访者进行了在线调查,并对16名参与者进行了用户研究。结果表明,该攻击是可行的。我们还讨论了针对Tap 'n Ghost所构成威胁的可能对策。
{"title":"Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens","authors":"S. Maruyama, Satohiro Wakabayashi, Tatsuya Mori","doi":"10.1109/SP.2019.00037","DOIUrl":"https://doi.org/10.1109/SP.2019.00037","url":null,"abstract":"We present a novel attack named \"Tap 'n Ghost\", which aims to attack the touchscreens of NFC-enabled mobile devices such as smartphones. Tap 'n Ghost consists of two striking attack techniques --- \"Tag-based Adaptive Ploy (TAP)\" and \"Ghost Touch Generator.\" First, using a NFC card emulator embedded in a common object such as table, a TAP system performs tailored attacks on the victim's smartphone by employing device fingerprinting; e.g., popping up a customized dialogue box asking whether or not to connect to an attacker's Bluetooth mouse. Further, Ghost Touch Generator forces the victim to connect to the mouse even if she or he aimed to cancel the dialogue by touching the \"cancel\" button; i.e., it alters the selection of a button on a screen. After the connection is established, the attacker can remotely take control of the smartphone, with the knowledge about the layout of the screen derived from the device fingerprinting. To evaluate the reality of the attack, we perform an online survey with 300 respondents and a user study involving 16 participants. The results demonstrate that the attack is realistic. We additionally discuss the possible countermeasures against the threats posed by Tap 'n Ghost.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Characterizing Pixel Tracking through the Lens of Disposable Email Services 通过一次性电子邮件服务来描述像素跟踪
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00033
Hang Hu, Peng Peng, G. Wang
Disposable email services provide temporary email addresses, which allows people to register online accounts without exposing their real email addresses. In this paper, we perform the first measurement study on disposable email services with two main goals. First, we aim to understand what disposable email services are used for, and what risks (if any) are involved in the common use cases. Second, we use the disposable email services as a public gateway to collect a large-scale email dataset for measuring email tracking. Over three months, we collected a dataset from 7 popular disposable email services which contain 2.3 million emails sent by 210K domains. We show that online accounts registered through disposable email addresses can be easily hijacked, leading to potential information leakage and financial loss. By empirically analyzing email tracking, we find that third-party tracking is highly prevalent, especially in the emails sent by popular services. We observe that trackers are using various methods to hide their tracking behavior such as falsely claiming the size of tracking images or hiding real trackers behind redirections. A few top trackers stand out in the tracking ecosystem but are not yet dominating the market.
一次性电子邮件服务提供临时电子邮件地址,人们可以在不暴露真实电子邮件地址的情况下注册在线帐户。在本文中,我们对一次性电子邮件服务进行了第一次测量研究,主要有两个目标。首先,我们的目标是了解一次性电子邮件服务的用途,以及在常见用例中涉及的风险(如果有的话)。其次,我们使用一次性电子邮件服务作为公共网关来收集大规模的电子邮件数据集,用于测量电子邮件跟踪。在三个多月的时间里,我们收集了7个流行的一次性电子邮件服务的数据集,其中包含210万个域名发送的230万封电子邮件。我们表明,通过一次性电子邮件地址注册的在线账户很容易被劫持,导致潜在的信息泄露和经济损失。通过实证分析电子邮件跟踪,我们发现第三方跟踪非常普遍,特别是在流行服务发送的电子邮件中。我们观察到跟踪器正在使用各种方法来隐藏其跟踪行为,例如错误地声明跟踪图像的大小或在重定向后隐藏真正的跟踪器。一些顶级追踪器在追踪生态系统中脱颖而出,但尚未主导市场。
{"title":"Characterizing Pixel Tracking through the Lens of Disposable Email Services","authors":"Hang Hu, Peng Peng, G. Wang","doi":"10.1109/SP.2019.00033","DOIUrl":"https://doi.org/10.1109/SP.2019.00033","url":null,"abstract":"Disposable email services provide temporary email addresses, which allows people to register online accounts without exposing their real email addresses. In this paper, we perform the first measurement study on disposable email services with two main goals. First, we aim to understand what disposable email services are used for, and what risks (if any) are involved in the common use cases. Second, we use the disposable email services as a public gateway to collect a large-scale email dataset for measuring email tracking. Over three months, we collected a dataset from 7 popular disposable email services which contain 2.3 million emails sent by 210K domains. We show that online accounts registered through disposable email addresses can be easily hijacked, leading to potential information leakage and financial loss. By empirically analyzing email tracking, we find that third-party tracking is highly prevalent, especially in the emails sent by popular services. We observe that trackers are using various methods to hide their tracking behavior such as falsely claiming the size of tracking images or hiding real trackers behind redirections. A few top trackers stand out in the tracking ecosystem but are not yet dominating the market.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"59 4 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery ProFuzzer:实时输入类型探测,更好地发现零日漏洞
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00057
Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, X. Zhang, Xiaofeng Wang, Bin Liang
Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel on-the-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuzzing, no prior knowledge of the input specification is needed. During fuzzing, individual bytes are first mutated and their fuzzing results are automatically analyzed to link those related together and identify the type for the field connecting them; these bytes are further mutated together following type-specific strategies, which substantially prunes the search space. We define the probe types generally across all applications, thereby making our technique application agnostic. Our experiments on standard benchmarks and real-world applications show that ProFuzzer substantially outperforms AFL and its optimized version AFLFast, as well as other state-of-art fuzzers including VUzzer, Driller and QSYM. Within two months, it exposed 42 zero-days in 10 intensively tested programs, generating 30 CVEs.
现有的基于突变的模糊器倾向于在不了解其底层语法和语义的情况下随机改变程序的输入。在本文中,我们提出了一种新的实时探测技术(称为ProFuzzer),该技术在模糊过程中自动恢复和理解对漏洞发现至关重要的输入字段,并智能地适应突变策略以提高命中零日目标的机会。由于这种探测是透明地与常规模糊测试结合在一起的,因此不需要事先了解输入规范。在模糊测试过程中,首先对单个字节进行突变,然后自动分析其模糊测试结果,将相关的字节连接在一起,并识别连接它们的字段的类型;这些字节按照特定于类型的策略进一步变异在一起,这大大减少了搜索空间。我们通常在所有应用程序中定义探针类型,从而使我们的技术与应用程序无关。我们在标准基准测试和实际应用中进行的实验表明,ProFuzzer的性能大大优于AFL及其优化版本AFLFast,以及其他最先进的fuzzer,包括VUzzer, Driller和QSYM。在两个月内,它在10个密集测试程序中暴露了42个零日漏洞,产生了30个cve。
{"title":"ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery","authors":"Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, X. Zhang, Xiaofeng Wang, Bin Liang","doi":"10.1109/SP.2019.00057","DOIUrl":"https://doi.org/10.1109/SP.2019.00057","url":null,"abstract":"Existing mutation based fuzzers tend to randomly mutate the input of a program without understanding its underlying syntax and semantics. In this paper, we propose a novel on-the-fly probing technique (called ProFuzzer) that automatically recovers and understands input fields of critical importance to vulnerability discovery during a fuzzing process and intelligently adapts the mutation strategy to enhance the chance of hitting zero-day targets. Since such probing is transparently piggybacked to the regular fuzzing, no prior knowledge of the input specification is needed. During fuzzing, individual bytes are first mutated and their fuzzing results are automatically analyzed to link those related together and identify the type for the field connecting them; these bytes are further mutated together following type-specific strategies, which substantially prunes the search space. We define the probe types generally across all applications, thereby making our technique application agnostic. Our experiments on standard benchmarks and real-world applications show that ProFuzzer substantially outperforms AFL and its optimized version AFLFast, as well as other state-of-art fuzzers including VUzzer, Driller and QSYM. Within two months, it exposed 42 zero-days in 10 intensively tested programs, generating 30 CVEs.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation CaSym:用于侧信道检测和缓解的缓存感知符号执行
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00022
Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, M. Kandemir
Cache-based side channels are becoming an important attack vector through which secret information can be leaked to malicious parties. Previous work on cache-based side channel detection, however, suffers from the code coverage problem or does not provide diagnostic information that is crucial for applying mitigation techniques to vulnerable software. We propose CaSym, a cache-aware symbolic execution to identify and report precise information about where side channels occur in an input program. Compared with existing work, CaSym provides several unique features: (1) CaSym enables verification against various attack models and cache models, (2) unlike many symbolic-execution systems for bug finding, CaSym verifies all program execution paths in a sound way, (3) CaSym uses two novel abstract cache models that provide good balance between analysis scalability and precision, and (4) CaSym provides sufficient information on where and how to mitigate the identified side channels through techniques including preloading and pinning. Evaluation on a set of crypto and database benchmarks shows that CaSym is effective at identifying and mitigating side channels, with reasonable efficiency. Keywords-side-channels; symbolic execution; cache
基于缓存的侧通道正在成为一种重要的攻击载体,通过它可以将机密信息泄露给恶意方。但是,以前关于基于缓存的侧通道检测的工作存在代码覆盖问题,或者没有提供诊断信息,而这些信息对于将缓解技术应用于易受攻击的软件至关重要。我们提出了CaSym,一个缓存感知的符号执行来识别和报告关于输入程序中发生的侧通道的精确信息。与现有工作相比,CaSym提供了几个独特的功能:(1) CaSym能够针对各种攻击模型和缓存模型进行验证;(2)与许多用于查找bug的符号执行系统不同,CaSym以合理的方式验证所有程序执行路径;(3)CaSym使用两种新颖的抽象缓存模型,在分析可扩展性和精度之间提供了良好的平衡;(4)CaSym提供了足够的信息,说明在哪里以及如何通过包括预加载和固定在内的技术减轻已识别的侧通道。对一组加密货币和数据库基准的评估表明,CaSym在识别和减轻侧信道方面是有效的,效率合理。Keywords-side-channels;符号执行;缓存
{"title":"CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation","authors":"Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, M. Kandemir","doi":"10.1109/SP.2019.00022","DOIUrl":"https://doi.org/10.1109/SP.2019.00022","url":null,"abstract":"Cache-based side channels are becoming an important attack vector through which secret information can be leaked to malicious parties. Previous work on cache-based side channel detection, however, suffers from the code coverage problem or does not provide diagnostic information that is crucial for applying mitigation techniques to vulnerable software. We propose CaSym, a cache-aware symbolic execution to identify and report precise information about where side channels occur in an input program. Compared with existing work, CaSym provides several unique features: (1) CaSym enables verification against various attack models and cache models, (2) unlike many symbolic-execution systems for bug finding, CaSym verifies all program execution paths in a sound way, (3) CaSym uses two novel abstract cache models that provide good balance between analysis scalability and precision, and (4) CaSym provides sufficient information on where and how to mitigate the identified side channels through techniques including preloading and pinning. Evaluation on a set of crypto and database benchmarks shows that CaSym is effective at identifying and mitigating side channels, with reasonable efficiency. Keywords-side-channels; symbolic execution; cache","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115183606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Understanding the Security of ARM Debugging Features 了解ARM调试功能的安全性
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00061
Zhenyu Ning, Fengwei Zhang
Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of CoreSight components and debug registers to aid the system debugging, and a group of debug authentication signals are designed to restrict the usage of these components and registers. Meantime, the security of the debugging features is under-examined since it normally requires physical access to use these features in the traditional debugging model. However, ARM introduces a new debugging model that requires no physical access since ARMv7, which exacerbates our concern on the security of the debugging features. In this paper, we perform a comprehensive security analysis of the ARM debugging features, and summarize the security and vulnerability implications. To understand the impact of the implications, we also investigate a series of ARM-based platforms in different product domains (i.e., development boards, IoT devices, cloud servers, and mobile devices). We consider the analysis and investigation expose a new attacking surface that universally exists in ARM-based platforms. To verify our concern, we further craft Nailgun attack, which obtains sensitive information (e.g., AES encryption key and fingerprint image) and achieves arbitrary payload execution in a high-privilege mode from a low-privilege mode via misusing the debugging features. This attack does not rely on software bugs, and our experiments show that almost all the platforms we investigated are vulnerable to the attack. The potential mitigations are discussed from different perspectives in the ARM ecosystem.
现在的处理器一直配备有调试功能,以方便程序分析。具体来说,ARM调试架构涉及一系列CoreSight组件和调试寄存器来辅助系统调试,并设计了一组调试认证信号来限制这些组件和寄存器的使用。同时,由于在传统调试模型中使用这些特性通常需要物理访问,因此调试特性的安全性没有得到充分的检查。然而,ARM引入了一种新的调试模型,自ARMv7以来不需要物理访问,这加剧了我们对调试特性安全性的关注。在本文中,我们对ARM调试特性进行了全面的安全分析,并总结了其安全性和漏洞含义。为了了解其影响,我们还调查了不同产品领域(即开发板、物联网设备、云服务器和移动设备)中一系列基于arm的平台。我们认为分析和调查揭示了在基于arm的平台上普遍存在的新的攻击面。为了验证我们的担忧,我们进一步制作了nail - gun攻击,该攻击可以获取敏感信息(例如AES加密密钥和指纹图像),并通过滥用调试功能从低特权模式实现高特权模式下的任意有效载荷执行。这种攻击不依赖于软件漏洞,我们的实验表明,我们调查的几乎所有平台都容易受到攻击。从ARM生态系统的不同角度讨论了潜在的缓解措施。
{"title":"Understanding the Security of ARM Debugging Features","authors":"Zhenyu Ning, Fengwei Zhang","doi":"10.1109/SP.2019.00061","DOIUrl":"https://doi.org/10.1109/SP.2019.00061","url":null,"abstract":"Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of CoreSight components and debug registers to aid the system debugging, and a group of debug authentication signals are designed to restrict the usage of these components and registers. Meantime, the security of the debugging features is under-examined since it normally requires physical access to use these features in the traditional debugging model. However, ARM introduces a new debugging model that requires no physical access since ARMv7, which exacerbates our concern on the security of the debugging features. In this paper, we perform a comprehensive security analysis of the ARM debugging features, and summarize the security and vulnerability implications. To understand the impact of the implications, we also investigate a series of ARM-based platforms in different product domains (i.e., development boards, IoT devices, cloud servers, and mobile devices). We consider the analysis and investigation expose a new attacking surface that universally exists in ARM-based platforms. To verify our concern, we further craft Nailgun attack, which obtains sensitive information (e.g., AES encryption key and fingerprint image) and achieves arbitrary payload execution in a high-privilege mode from a low-privilege mode via misusing the debugging features. This attack does not rely on software bugs, and our experiments show that almost all the platforms we investigated are vulnerable to the attack. The potential mitigations are discussed from different perspectives in the ARM ecosystem.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Demystifying Hidden Privacy Settings in Mobile Apps 揭秘手机应用中隐藏的隐私设置
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00054
Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, Xiaofeng Wang, Wei Zou
Mobile apps include privacy settings that allow their users to configure how their data should be shared. These settings, however, are often hard to locate and hard to understand by the users, even in popular apps, such as Facebook. More seriously, they are often set to share user data by default, exposing her privacy without proper consent. In this paper, we report the first systematic study on the problem, which is made possible through an in-depth analysis of user perception of the privacy settings. More specifically, we first conduct two user studies (involving nearly one thousand users) to understand privacy settings from the user’s perspective, and identify these hard-to-find settings. Then we select 14 features that uniquely characterize such hidden privacy settings and utilize a novel technique called semantics- based UI tracing to extract them from a given app. On top of these features, a classifier is trained to automatically discover the hidden privacy settings, which together with other innovations, has been implemented into a tool called Hound. Over our labeled data set, the tool achieves an accuracy of 93.54%. Further running it on 100,000 latest apps from both Google Play and third-party markets, we find that over a third (36.29%) of the privacy settings identified from these apps are “hidden”. Looking into these settings, we observe that they become hard to discover and hard to understand primarily due to the problematic categorization on the apps’ user interfaces and/or confusing descriptions. Further importantly, though more privacy options have been offered to the user over time, also discovered is the persistence of their usability issue, which becomes even more serious, e.g., originally easy-to-find settings now harder to locate. And among all such hidden privacy settings, 82.16% are set to leak user privacy by default. We provide suggestions for improving the usability of these privacy settings at the end of our study.
移动应用程序包括隐私设置,允许用户配置他们的数据应该如何共享。然而,这些设置通常很难定位,用户也很难理解,即使在Facebook等流行应用程序中也是如此。更严重的是,它们通常默认设置为共享用户数据,在未经适当同意的情况下暴露了用户的隐私。在本文中,我们报告了对该问题的第一个系统研究,这是通过深入分析用户对隐私设置的感知而实现的。更具体地说,我们首先进行了两次用户研究(涉及近千名用户),从用户的角度了解隐私设置,并识别这些难以找到的设置。然后,我们选择了14个独特表征这种隐藏隐私设置的特征,并利用一种称为基于语义的UI跟踪的新技术从给定的应用程序中提取它们。在这些特征之上,训练分类器来自动发现隐藏的隐私设置,这与其他创新一起被实现到一个名为Hound的工具中。在我们的标记数据集上,该工具达到了93.54%的准确率。进一步在Google Play和第三方市场的10万款最新应用上运行,我们发现超过三分之一(36.29%)的隐私设置是“隐藏的”。通过观察这些设置,我们发现它们变得难以发现和理解,主要是由于应用程序用户界面上有问题的分类和/或令人困惑的描述。更重要的是,尽管随着时间的推移,用户可以选择更多的隐私选项,但我们也发现,它们的可用性问题持续存在,变得更加严重,例如,原本容易找到的设置现在更难找到。而在这些隐藏隐私设置中,82.16%默认设置为泄露用户隐私。在研究结束时,我们提供了改进这些隐私设置可用性的建议。
{"title":"Demystifying Hidden Privacy Settings in Mobile Apps","authors":"Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, Xiaofeng Wang, Wei Zou","doi":"10.1109/SP.2019.00054","DOIUrl":"https://doi.org/10.1109/SP.2019.00054","url":null,"abstract":"Mobile apps include privacy settings that allow their users to configure how their data should be shared. These settings, however, are often hard to locate and hard to understand by the users, even in popular apps, such as Facebook. More seriously, they are often set to share user data by default, exposing her privacy without proper consent. In this paper, we report the first systematic study on the problem, which is made possible through an in-depth analysis of user perception of the privacy settings. More specifically, we first conduct two user studies (involving nearly one thousand users) to understand privacy settings from the user’s perspective, and identify these hard-to-find settings. Then we select 14 features that uniquely characterize such hidden privacy settings and utilize a novel technique called semantics- based UI tracing to extract them from a given app. On top of these features, a classifier is trained to automatically discover the hidden privacy settings, which together with other innovations, has been implemented into a tool called Hound. Over our labeled data set, the tool achieves an accuracy of 93.54%. Further running it on 100,000 latest apps from both Google Play and third-party markets, we find that over a third (36.29%) of the privacy settings identified from these apps are “hidden”. Looking into these settings, we observe that they become hard to discover and hard to understand primarily due to the problematic categorization on the apps’ user interfaces and/or confusing descriptions. Further importantly, though more privacy options have been offered to the user over time, also discovered is the persistence of their usability issue, which becomes even more serious, e.g., originally easy-to-find settings now harder to locate. And among all such hidden privacy settings, 82.16% are set to leak user privacy by default. We provide suggestions for improving the usability of these privacy settings at the end of our study.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem 后http世界的明信片:网络生态系统中HTTPS漏洞的放大
Pub Date : 2019-05-19 DOI: 10.1109/SP.2019.00053
Stefano Calzavara, R. Focardi, Matús Nemec, Alvise Rabitti, M. Squarcina
HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TLS protocol suites that have been shown to be vulnerable to various attacks in the years. This has required fixes and mitigations both in the servers and in the browsers, producing a complicated mixture of protocol versions and implementations in the wild, which makes it unclear which attacks are still effective on the modern Web and what is their import on web application security. In this paper, we present the first systematic quantitative evaluation of web application insecurity due to cryptographic vulnerabilities. We specify attack conditions against TLS using attack trees and we crawl the Alexa Top 10k to assess the import of these issues on page integrity, authentication credentials and web tracking. Our results show that the security of a consistent number of websites is severely harmed by cryptographic weaknesses that, in many cases, are due to external or related-domain hosts. This empirically, yet systematically demonstrates how a relatively limited number of exploitable HTTPS vulnerabilities are amplified by the complexity of the web ecosystem.
HTTPS旨在通过提供加密保护层来保护Web上的通信,该保护层确保通信的机密性和完整性,并支持客户机/服务器身份验证。然而,HTTPS基于SSL/TLS协议套件,这些协议套件近年来已被证明容易受到各种攻击。这需要在服务器和浏览器中进行修复和缓解,从而产生了复杂的协议版本和实现,这使得人们不清楚哪些攻击在现代Web上仍然有效,以及它们对Web应用程序安全的影响是什么。在本文中,我们提出了由于加密漏洞导致的web应用程序不安全性的第一个系统定量评估。我们使用攻击树指定针对TLS的攻击条件,我们抓取Alexa Top 10k来评估这些问题对页面完整性,身份验证凭证和web跟踪的影响。我们的研究结果表明,一致数量的网站的安全性受到加密弱点的严重损害,在许多情况下,这些弱点是由于外部或相关域主机。这从经验上系统地证明了相对有限数量的可利用HTTPS漏洞是如何被网络生态系统的复杂性放大的。
{"title":"Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem","authors":"Stefano Calzavara, R. Focardi, Matús Nemec, Alvise Rabitti, M. Squarcina","doi":"10.1109/SP.2019.00053","DOIUrl":"https://doi.org/10.1109/SP.2019.00053","url":null,"abstract":"HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TLS protocol suites that have been shown to be vulnerable to various attacks in the years. This has required fixes and mitigations both in the servers and in the browsers, producing a complicated mixture of protocol versions and implementations in the wild, which makes it unclear which attacks are still effective on the modern Web and what is their import on web application security. In this paper, we present the first systematic quantitative evaluation of web application insecurity due to cryptographic vulnerabilities. We specify attack conditions against TLS using attack trees and we crawl the Alexa Top 10k to assess the import of these issues on page integrity, authentication credentials and web tracking. Our results show that the security of a consistent number of websites is severely harmed by cryptographic weaknesses that, in many cases, are due to external or related-domain hosts. This empirically, yet systematically demonstrates how a relatively limited number of exploitable HTTPS vulnerabilities are amplified by the complexity of the web ecosystem.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2019 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1