首页 > 最新文献

2019 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems 危险技能:了解和降低虚拟个人助理系统中语音控制第三方功能的安全风险
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00016
N. Zhang, Xianghang Mi, Xuan Feng, Xiaofeng Wang, Yuan Tian, Feng Qian
Virtual personal assistants (VPA) (e.g., Amazon Alexa and Google Assistant) today mostly rely on the voice channel to communicate with their users, which however is known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA service to the user, has emerged with the rapid growth of the VPA ecosystem, which allows a third party to publish a function (called skill) for the service and therefore can be exploited to spread malicious skills to a large audience during their interactions with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large-scale attacks are indeed realistic. We discovered two new attacks: voice squatting in which the adversary exploits the way a skill is invoked (e.g., ``open capital one''), using a malicious skill with a similarly pronounced name (e.g., ``capital won'') or a paraphrased name (e.g., ``capital one please'') to hijack the voice command meant for a legitimate skill (e.g., ``capital one''), and voice masquerading in which a malicious skill impersonates the VPA service or a legitimate skill during the user's conversation with the service to steal her personal information. These attacks aim at the way VPAs work or the user's misconceptions about their functionalities, and are found to pose a realistic threat by our experiments (including user studies and real-world deployments) on Amazon Echo and Google Home. The significance of our findings has already been acknowledged by Amazon and Google, and further evidenced by the risky skills found on Alexa and Google markets by the new squatting detector we built. We further developed a technique that automatically captures an ongoing masquerading attack and demonstrated its efficacy.
虚拟个人助理(VPA)(例如,亚马逊Alexa和谷歌助理)今天主要依靠语音通道与用户进行通信,然而,众所周知,这是脆弱的,缺乏适当的认证(从用户到VPA)。随着VPA生态系统的快速发展,从VPA服务到用户的新的身份验证挑战已经出现,它允许第三方发布服务的功能(称为技能),因此可以利用恶意技能向大量受众传播他们与智能扬声器(如Amazon Echo和Google Home)的互动。在本文中,我们报告了一项研究,结论是这种远程大规模攻击确实是现实的。我们发现了两个新的攻击:语音抢注,攻击者利用调用技能的方式(例如“open capital one”),使用具有类似发音的恶意技能(例如“capital won”)或改述的名称(例如“capital one please”)来劫持用于合法技能(例如“capital one”)的语音命令。以及语音伪装,在用户与VPA服务的对话中,恶意技能冒充VPA服务或合法技能窃取用户的个人信息。这些攻击的目标是vpa的工作方式或用户对其功能的误解,并且通过我们在Amazon Echo和Google Home上的实验(包括用户研究和实际部署)发现这些攻击构成了现实的威胁。我们的发现的重要性已经得到了亚马逊和谷歌的认可,我们建立的新蹲式检测器在Alexa和谷歌市场上发现的风险技能进一步证明了这一点。我们进一步开发了一种技术,可以自动捕获正在进行的伪装攻击,并证明了其有效性。
{"title":"Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems","authors":"N. Zhang, Xianghang Mi, Xuan Feng, Xiaofeng Wang, Yuan Tian, Feng Qian","doi":"10.1109/SP.2019.00016","DOIUrl":"https://doi.org/10.1109/SP.2019.00016","url":null,"abstract":"Virtual personal assistants (VPA) (e.g., Amazon Alexa and Google Assistant) today mostly rely on the voice channel to communicate with their users, which however is known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA service to the user, has emerged with the rapid growth of the VPA ecosystem, which allows a third party to publish a function (called skill) for the service and therefore can be exploited to spread malicious skills to a large audience during their interactions with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large-scale attacks are indeed realistic. We discovered two new attacks: voice squatting in which the adversary exploits the way a skill is invoked (e.g., ``open capital one''), using a malicious skill with a similarly pronounced name (e.g., ``capital won'') or a paraphrased name (e.g., ``capital one please'') to hijack the voice command meant for a legitimate skill (e.g., ``capital one''), and voice masquerading in which a malicious skill impersonates the VPA service or a legitimate skill during the user's conversation with the service to steal her personal information. These attacks aim at the way VPAs work or the user's misconceptions about their functionalities, and are found to pose a realistic threat by our experiments (including user studies and real-world deployments) on Amazon Echo and Google Home. The significance of our findings has already been acknowledged by Amazon and Google, and further evidenced by the risky skills found on Alexa and Google markets by the new squatting detector we built. We further developed a technique that automatically captures an ongoing masquerading attack and demonstrated its efficacy.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133759020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks 学习重构:统计学习理论和加密数据库攻击
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00030
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, K. Paterson
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses. First, we address the problem of ε-approximate database reconstruction (ε-ADR) from range query leakage, giving attacks whose query cost scales only with the relative error ε, and is independent of the size of the database, or the number N of possible values of data items. This already goes significantly beyond the state-of-the-art for such attacks, as represented by Kellaris et al. (ACM CCS 2016) and Lacharité et al. (IEEE S&P 2018). We also study the new problem of ε-approximate order reconstruction (ε-AOR), where the adversary is tasked with reconstructing the order of records, except for records whose values are approximately equal. We show that as few as O(ε^−1 log ε^−1) uniformly random range queries suffice. Our analysis relies on an application of learning theory to PQ-trees, special data structures tuned to compactly record certain ordering constraints. We then show that when an auxiliary distribution is available, ε-AOR can be enhanced to achieve ε-ADR; using real data, we show that devastatingly small numbers of queries are needed to attain very accurate database reconstruction. Finally, we generalize from ranges to consider what learning theory tells us about the impact of access pattern leakage for other classes of queries, focusing on prefix and suffix queries. We illustrate this with both concrete attacks for prefix queries and with a general lower bound for all query classes. We also show a very general reduction from reconstruction with known or chosen queries to PAC learning.
我们证明了从访问模式泄漏中重构加密数据库的问题与统计学习理论密切相关。这个新的观点使我们能够开发更广泛的攻击,这些攻击是由流线型性能分析支持的。首先,我们解决了范围查询泄漏的ε-近似数据库重构(ε- adr)问题,给出了查询代价仅与相对误差ε相关的攻击,并且与数据库的大小或数据项的可能值的个数N无关。这已经大大超过了Kellaris等人(ACM CCS 2016)和lacharit等人(IEEE S&P 2018)所代表的此类攻击的最新技术。我们还研究了ε-近似顺序重建(ε-AOR)的新问题,其中对手的任务是重建记录的顺序,除了值近似相等的记录。我们证明只需O(ε^−1 log ε^−1)均匀随机范围查询就足够了。我们的分析依赖于学习理论对pq树的应用,pq树是一种特殊的数据结构,用于紧凑地记录某些排序约束。当有辅助分布时,可以增强ε-AOR以达到ε-ADR;通过使用真实数据,我们可以看到,只需要很少的查询就可以获得非常精确的数据库重建。最后,我们从范围进行推广,以考虑学习理论告诉我们访问模式泄漏对其他查询类的影响,重点关注前缀和后缀查询。我们用前缀查询的具体攻击和所有查询类的一般下界来说明这一点。我们还展示了从使用已知或选择的查询进行重构到PAC学习的非常普遍的简化。
{"title":"Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks","authors":"Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, K. Paterson","doi":"10.1109/SP.2019.00030","DOIUrl":"https://doi.org/10.1109/SP.2019.00030","url":null,"abstract":"We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses. First, we address the problem of ε-approximate database reconstruction (ε-ADR) from range query leakage, giving attacks whose query cost scales only with the relative error ε, and is independent of the size of the database, or the number N of possible values of data items. This already goes significantly beyond the state-of-the-art for such attacks, as represented by Kellaris et al. (ACM CCS 2016) and Lacharité et al. (IEEE S&P 2018). We also study the new problem of ε-approximate order reconstruction (ε-AOR), where the adversary is tasked with reconstructing the order of records, except for records whose values are approximately equal. We show that as few as O(ε^−1 log ε^−1) uniformly random range queries suffice. Our analysis relies on an application of learning theory to PQ-trees, special data structures tuned to compactly record certain ordering constraints. We then show that when an auxiliary distribution is available, ε-AOR can be enhanced to achieve ε-ADR; using real data, we show that devastatingly small numbers of queries are needed to attain very accurate database reconstruction. Finally, we generalize from ranges to consider what learning theory tells us about the impact of access pattern leakage for other classes of queries, focusing on prefix and suffix queries. We illustrate this with both concrete attacks for prefix queries and with a general lower bound for all query classes. We also show a very general reduction from reconstruction with known or chosen queries to PAC learning.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122066274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization 增强二进制克隆搜索对代码混淆和编译器优化的静态表示鲁棒性
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00003
Steven H. H. Ding, B. Fung, P. Charland
Reverse engineering is a manually intensive but necessary technique for understanding the inner workings of new malware, finding vulnerabilities in existing systems, and detecting patent infringements in released software. An assembly clone search engine facilitates the work of reverse engineers by identifying those duplicated or known parts. However, it is challenging to design a robust clone search engine, since there exist various compiler optimization options and code obfuscation techniques that make logically similar assembly functions appear to be very different. A practical clone search engine relies on a robust vector representation of assembly code. However, the existing clone search approaches, which rely on a manual feature engineering process to form a feature vector for an assembly function, fail to consider the relationships between features and identify those unique patterns that can statistically distinguish assembly functions. To address this problem, we propose to jointly learn the lexical semantic relationships and the vector representation of assembly functions based on assembly code. We have developed an assembly code representation learning model emph{Asm2Vec}. It only needs assembly code as input and does not require any prior knowledge such as the correct mapping between assembly functions. It can find and incorporate rich semantic relationships among tokens appearing in assembly code. We conduct extensive experiments and benchmark the learning model with state-of-the-art static and dynamic clone search approaches. We show that the learned representation is more robust and significantly outperforms existing methods against changes introduced by obfuscation and optimizations.
逆向工程是一种人工密集型技术,但对于理解新恶意软件的内部工作原理、发现现有系统中的漏洞以及检测已发布软件中的专利侵权是必要的。装配克隆搜索引擎通过识别那些重复的或已知的部件,方便了逆向工程师的工作。然而,设计一个健壮的克隆搜索引擎是具有挑战性的,因为存在各种编译器优化选项和代码混淆技术,使得逻辑上相似的汇编函数看起来非常不同。一个实用的克隆搜索引擎依赖于汇编代码的鲁棒向量表示。然而,现有的克隆搜索方法依赖于手动特征工程过程来形成装配函数的特征向量,没有考虑特征之间的关系,也没有识别出那些可以统计区分装配函数的唯一模式。为了解决这个问题,我们提出了基于汇编代码的汇编函数的词法语义关系和向量表示的联合学习。我们开发了一个汇编代码表示学习模型emph{Asm2Vec}。它只需要汇编代码作为输入,不需要任何先验知识,例如汇编函数之间的正确映射。它可以发现并合并汇编代码中出现的标记之间丰富的语义关系。我们进行了大量的实验,并使用最先进的静态和动态克隆搜索方法对学习模型进行基准测试。我们表明,学习到的表示更鲁棒,并且明显优于现有的方法,以防止混淆和优化引入的变化。
{"title":"Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization","authors":"Steven H. H. Ding, B. Fung, P. Charland","doi":"10.1109/SP.2019.00003","DOIUrl":"https://doi.org/10.1109/SP.2019.00003","url":null,"abstract":"Reverse engineering is a manually intensive but necessary technique for understanding the inner workings of new malware, finding vulnerabilities in existing systems, and detecting patent infringements in released software. An assembly clone search engine facilitates the work of reverse engineers by identifying those duplicated or known parts. However, it is challenging to design a robust clone search engine, since there exist various compiler optimization options and code obfuscation techniques that make logically similar assembly functions appear to be very different. A practical clone search engine relies on a robust vector representation of assembly code. However, the existing clone search approaches, which rely on a manual feature engineering process to form a feature vector for an assembly function, fail to consider the relationships between features and identify those unique patterns that can statistically distinguish assembly functions. To address this problem, we propose to jointly learn the lexical semantic relationships and the vector representation of assembly functions based on assembly code. We have developed an assembly code representation learning model emph{Asm2Vec}. It only needs assembly code as input and does not require any prior knowledge such as the correct mapping between assembly functions. It can find and incorporate rich semantic relationships among tokens appearing in assembly code. We conduct extensive experiments and benchmark the learning model with state-of-the-art static and dynamic clone search approaches. We show that the learned representation is more robust and significantly outperforms existing methods against changes introduced by obfuscation and optimizations.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125315362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 251
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane 触碰触碰:LTE控制平面的动态安全分析
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00038
Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim
This paper presents our extensive investigation of the security aspects of control plane procedures based on dynamic testing of the control components in operational Long Term Evolution (LTE) networks. For dynamic testing in LTE networks, we implemented a semi-automated testing tool, named LTEFuzz, by using open-source LTE software over which the user has full control. We systematically generated test cases by defining three basic security properties by closely analyzing the standards. Based on the security property, LTEFuzz generates and sends the test cases to a target network, and classifies the problematic behavior by only monitoring the device-side logs. Accordingly, we uncovered 36 vulnerabilities, which have not been disclosed previously. These findings are categorized into five types: Improper handling of (1) unprotected initial procedure, (2) crafted plain requests, (3) messages with invalid integrity protection, (4) replayed messages, and (5) security procedure bypass. We confirmed those vulnerabilities by demonstrating proof-of-concept attacks against operational LTE networks. The impact of the attacks is to either deny LTE services to legitimate users, spoof SMS messages, or eavesdrop/manipulate user data traffic. Precise root cause analysis and potential countermeasures to address these problems are presented as well. Cellular carriers were partially involved to maintain ethical standards as well as verify our findings in commercial LTE networks.
本文介绍了我们在长期演进(LTE)网络运行控制组件动态测试的基础上对控制平面程序安全方面的广泛调查。对于LTE网络中的动态测试,我们通过使用用户可以完全控制的开源LTE软件实现了一个名为LTEFuzz的半自动测试工具。通过仔细分析标准,我们通过定义三个基本的安全性属性,系统地生成了测试用例。基于安全属性,LTEFuzz生成测试用例并将其发送到目标网络,并仅通过监视设备端日志对问题行为进行分类。因此,我们发现了36个以前未披露的漏洞。这些发现可分为五种类型:处理不当:(1)未受保护的初始过程,(2)精心制作的普通请求,(3)具有无效完整性保护的消息,(4)重播消息,以及(5)安全过程绕过。我们通过演示针对运营LTE网络的概念验证攻击来确认这些漏洞。攻击的影响是拒绝向合法用户提供LTE服务,欺骗SMS消息,或窃听/操纵用户数据流量。并提出了准确的根本原因分析和解决这些问题的潜在对策。蜂窝运营商部分参与维护道德标准,并在商用LTE网络中验证我们的发现。
{"title":"Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane","authors":"Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim","doi":"10.1109/SP.2019.00038","DOIUrl":"https://doi.org/10.1109/SP.2019.00038","url":null,"abstract":"This paper presents our extensive investigation of the security aspects of control plane procedures based on dynamic testing of the control components in operational Long Term Evolution (LTE) networks. For dynamic testing in LTE networks, we implemented a semi-automated testing tool, named LTEFuzz, by using open-source LTE software over which the user has full control. We systematically generated test cases by defining three basic security properties by closely analyzing the standards. Based on the security property, LTEFuzz generates and sends the test cases to a target network, and classifies the problematic behavior by only monitoring the device-side logs. Accordingly, we uncovered 36 vulnerabilities, which have not been disclosed previously. These findings are categorized into five types: Improper handling of (1) unprotected initial procedure, (2) crafted plain requests, (3) messages with invalid integrity protection, (4) replayed messages, and (5) security procedure bypass. We confirmed those vulnerabilities by demonstrating proof-of-concept attacks against operational LTE networks. The impact of the attacks is to either deny LTE services to legitimate users, spoof SMS messages, or eavesdrop/manipulate user data traffic. Precise root cause analysis and potential countermeasures to address these problems are presented as well. Cellular carriers were partially involved to maintain ethical standards as well as verify our findings in commercial LTE networks.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126562089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
SoK: General Purpose Compilers for Secure Multi-Party Computation 安全多方计算的通用编译器
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00028
Marcella Hastings, B. Hemenway, D. Noble, S. Zdancewic
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to compute a joint function on their inputs without revealing any information beyond the result of the computation. This type of computation is extremely powerful and has wide-ranging applications in academia, industry, and government. Protocols for secure computation have existed for decades, but only recently have general-purpose compilers for executing MPC on arbitrary functions been developed. These projects rapidly improved the state of the art, and began to make MPC accessible to non-expert users. However, the field is changing so rapidly that it is difficult even for experts to keep track of the varied capabilities of modern frameworks. In this work, we survey general-purpose compilers for secure multi-party computation. These tools provide high-level abstractions to describe arbitrary functions and execute secure computation protocols. We consider eleven systems: EMP-toolkit, Obliv-C, ObliVM, TinyGarble, SCALE-MAMBA (formerly SPDZ), Wysteria, Sharemind, PICCO, ABY, Frigate and CBMC-GC. We evaluate these systems on a range of criteria, including language expressibility, capabilities of the cryptographic back-end, and accessibility to developers. We advocate for improved documentation of MPC frameworks, standardization within the community, and make recommendations for future directions in compiler development. Installing and running these systems can be challenging, and for each system, we also provide a complete virtual environment (Docker container) with all the necessary dependencies to run the compiler and our example programs.
安全多方计算(MPC)允许一组相互不信任的各方在其输入的基础上计算联合函数,而不泄露计算结果之外的任何信息。这种类型的计算非常强大,在学术界、工业界和政府中有着广泛的应用。用于安全计算的协议已经存在了几十年,但直到最近才开发出用于在任意函数上执行MPC的通用编译器。这些项目迅速提高了技术水平,并开始向非专业用户开放MPC。然而,该领域变化如此之快,以至于即使是专家也很难跟踪现代框架的各种功能。在这项工作中,我们概述了用于安全多方计算的通用编译器。这些工具提供高级抽象来描述任意函数和执行安全计算协议。我们考虑了11个系统:EMP-toolkit、Obliv-C、ObliVM、TinyGarble、SCALE-MAMBA(以前的SPDZ)、Wysteria、Sharemind、PICCO、ABY、Frigate和CBMC-GC。我们根据一系列标准评估这些系统,包括语言可表达性、加密后端功能和开发人员的可访问性。我们提倡改进MPC框架的文档、社区内的标准化,并对编译器开发的未来方向提出建议。安装和运行这些系统可能具有挑战性,对于每个系统,我们还提供了一个完整的虚拟环境(Docker容器),其中包含运行编译器和示例程序所需的所有依赖项。
{"title":"SoK: General Purpose Compilers for Secure Multi-Party Computation","authors":"Marcella Hastings, B. Hemenway, D. Noble, S. Zdancewic","doi":"10.1109/SP.2019.00028","DOIUrl":"https://doi.org/10.1109/SP.2019.00028","url":null,"abstract":"Secure multi-party computation (MPC) allows a group of mutually distrustful parties to compute a joint function on their inputs without revealing any information beyond the result of the computation. This type of computation is extremely powerful and has wide-ranging applications in academia, industry, and government. Protocols for secure computation have existed for decades, but only recently have general-purpose compilers for executing MPC on arbitrary functions been developed. These projects rapidly improved the state of the art, and began to make MPC accessible to non-expert users. However, the field is changing so rapidly that it is difficult even for experts to keep track of the varied capabilities of modern frameworks. In this work, we survey general-purpose compilers for secure multi-party computation. These tools provide high-level abstractions to describe arbitrary functions and execute secure computation protocols. We consider eleven systems: EMP-toolkit, Obliv-C, ObliVM, TinyGarble, SCALE-MAMBA (formerly SPDZ), Wysteria, Sharemind, PICCO, ABY, Frigate and CBMC-GC. We evaluate these systems on a range of criteria, including language expressibility, capabilities of the cryptographic back-end, and accessibility to developers. We advocate for improved documentation of MPC frameworks, standardization within the community, and make recommendations for future directions in compiler development. Installing and running these systems can be challenging, and for each system, we also provide a complete virtual environment (Docker container) with all the necessary dependencies to run the compiler and our example programs.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Title Page i 第1页
Pub Date : 2019-05-01 DOI: 10.1109/sp.2019.00097
{"title":"Title Page i","authors":"","doi":"10.1109/sp.2019.00097","DOIUrl":"https://doi.org/10.1109/sp.2019.00097","url":null,"abstract":"","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World 攻击目录,而不是缓存:非包容性世界中的侧通道攻击
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00004
Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, R. Campbell, J. Torrellas
Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have proved to be a large security problem. However, despite the past effectiveness of cache attacks, their viability has recently been called into question on modern systems, due to trends in cache hierarchy design moving away from inclusive cache hierarchies. In this paper, we reverse engineer the structure of the directory in a sliced, non-inclusive cache hierarchy, and prove that the directory can be used to bootstrap conflict-based cache attacks on the last-level cache. We design the first cross-core Prime+Probe attack on non-inclusive caches. This attack works with minimal assumptions: the adversary does not need to share any virtual memory with the victim, nor run on the same processor core. We also show the first high-bandwidth Evict+Reload attack on the same hardware. We demonstrate both attacks by extracting key bits during RSA operations in GnuPG on a state-of-the-art non-inclusive Intel Skylake-X server.
尽管云具有强大的虚拟内存隔离保证,但来自共享缓存的缓存攻击已被证明是一个很大的安全问题。然而,尽管过去缓存攻击是有效的,但由于缓存层次结构设计的趋势正在远离包容性缓存层次结构,它们的可行性最近在现代系统中受到了质疑。在本文中,我们对一个切片的、不包含的缓存层次结构中的目录结构进行了逆向工程,并证明了该目录可以用于在最后一级缓存上引导基于冲突的缓存攻击。我们设计了第一个针对非包容性缓存的跨核Prime+Probe攻击。这种攻击的前提条件很简单:攻击者不需要与受害者共享任何虚拟内存,也不需要在相同的处理器核心上运行。我们还展示了同一硬件上的第一个高带宽Evict+Reload攻击。我们通过在GnuPG中最先进的非包容性英特尔Skylake-X服务器上提取RSA操作期间的密钥位来演示这两种攻击。
{"title":"Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World","authors":"Mengjia Yan, Read Sprabery, Bhargava Gopireddy, Christopher W. Fletcher, R. Campbell, J. Torrellas","doi":"10.1109/SP.2019.00004","DOIUrl":"https://doi.org/10.1109/SP.2019.00004","url":null,"abstract":"Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have proved to be a large security problem. However, despite the past effectiveness of cache attacks, their viability has recently been called into question on modern systems, due to trends in cache hierarchy design moving away from inclusive cache hierarchies. In this paper, we reverse engineer the structure of the directory in a sliced, non-inclusive cache hierarchy, and prove that the directory can be used to bootstrap conflict-based cache attacks on the last-level cache. We design the first cross-core Prime+Probe attack on non-inclusive caches. This attack works with minimal assumptions: the adversary does not need to share any virtual memory with the victim, nor run on the same processor core. We also show the first high-bandwidth Evict+Reload attack on the same hardware. We demonstrate both attacks by extracting key bits during RSA operations in GnuPG on a state-of-the-art non-inclusive Intel Skylake-X server.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131519203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 134
Formally Verified Cryptographic Web Applications in WebAssembly WebAssembly中经过正式验证的加密Web应用程序
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00064
Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, K. Bhargavan
After suffering decades of high-profile attacks, the need for formal verification of security-critical software has never been clearer. Verification-oriented programming languages like F* are now being used to build high-assurance cryptographic libraries and implementations of standard protocols like TLS. In this paper, we seek to apply these verification techniques to modern Web applications, like WhatsApp, that embed sophisticated custom cryptographic components. The problem is that these components are often implemented in JavaScript, a language that is both hostile to cryptographic code and hard to reason about. So we instead target WebAssembly, a new instruction set that is supported by all major JavaScript runtimes. We present a new toolchain that compiles Low*, a low-level subset of the F* programming language, into WebAssembly. Unlike other WebAssembly compilers like Emscripten, our compilation pipeline is focused on compactness and auditability: we formalize the full translation rules in the paper and implement it in a few thousand lines of OCaml. Using this toolchain, we present two case studies. First, we build WHACL*, a WebAssembly version of the existing, verified HACL* cryptographic library. Then, we present LibSignal*, a brand new, verified implementation of the Signal protocol in WebAssembly, that can be readily used by messaging applications like WhatsApp, Skype, and Signal.
在经历了数十年备受瞩目的攻击之后,对安全关键软件进行正式验证的必要性从未如此清晰。像F*这样面向验证的编程语言现在被用于构建高保证的加密库和实现像TLS这样的标准协议。在本文中,我们试图将这些验证技术应用于嵌入复杂自定义加密组件的现代Web应用程序,如WhatsApp。问题是,这些组件通常是用JavaScript实现的,而JavaScript是一种既不支持加密代码又难以推理的语言。因此,我们转而瞄准WebAssembly,这是一个新的指令集,所有主要的JavaScript运行时都支持它。我们提出了一个新的工具链,它将Low* (F*编程语言的一个低级子集)编译到WebAssembly中。与其他WebAssembly编译器(如Emscripten)不同,我们的编译管道专注于紧凑性和可审计性:我们在论文中形式化了完整的翻译规则,并在几千行OCaml中实现了它。使用这个工具链,我们给出了两个案例研究。首先,我们构建WHACL*,这是现有的经过验证的HACL*加密库的WebAssembly版本。然后,我们提出了LibSignal*,这是WebAssembly中一个全新的、经过验证的信号协议实现,可以很容易地被WhatsApp、Skype和Signal等消息传递应用程序使用。
{"title":"Formally Verified Cryptographic Web Applications in WebAssembly","authors":"Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, K. Bhargavan","doi":"10.1109/SP.2019.00064","DOIUrl":"https://doi.org/10.1109/SP.2019.00064","url":null,"abstract":"After suffering decades of high-profile attacks, the need for formal verification of security-critical software has never been clearer. Verification-oriented programming languages like F* are now being used to build high-assurance cryptographic libraries and implementations of standard protocols like TLS. In this paper, we seek to apply these verification techniques to modern Web applications, like WhatsApp, that embed sophisticated custom cryptographic components. The problem is that these components are often implemented in JavaScript, a language that is both hostile to cryptographic code and hard to reason about. So we instead target WebAssembly, a new instruction set that is supported by all major JavaScript runtimes. We present a new toolchain that compiles Low*, a low-level subset of the F* programming language, into WebAssembly. Unlike other WebAssembly compilers like Emscripten, our compilation pipeline is focused on compactness and auditability: we formalize the full translation rules in the paper and implement it in a few thousand lines of OCaml. Using this toolchain, we present two case studies. First, we build WHACL*, a WebAssembly version of the existing, verified HACL* cryptographic library. Then, we present LibSignal*, a brand new, verified implementation of the Signal protocol in WebAssembly, that can be readily used by messaging applications like WhatsApp, Skype, and Signal.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121608977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
SensorID: Sensor Calibration Fingerprinting for Smartphones SensorID:智能手机传感器校准指纹识别
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00072
Jiexin Zhang, A. Beresford, I. Sheret
Sensors are an essential component of many computer systems today. Mobile devices are a good example, containing a vast array of sensors from accelerometers and GPS units, to cameras and microphones. Data from these sensors are accessible to application programmers who can use this data to build context-aware applications. Good sensor accuracy is often crucial, and therefore manufacturers often use per-device factory calibration to compensate for systematic errors introduced during manufacture. In this paper we explore a new type of fingerprinting attack on sensor data: calibration fingerprinting. A calibration fingerprinting attack infers the per-device factory calibration data from a device by careful analysis of the sensor output alone. Such an attack does not require direct access to any calibration parameters since these are often embedded inside the firmware of the device and are not directly accessible by application developers. We demonstrate the potential of this new class of attack by performing calibration fingerprinting attacks on the inertial measurement unit sensors found in iOS and Android devices. These sensors are good candidates because access to these sensors does not require any special permissions, and the data can be accessed via both a native app installed on a device and also by JavaScript when visiting a website on an iOS and Android device. We find we are able to perform a very effective calibration fingerprinting attack: our approach requires fewer than 100 samples of sensor data and takes less than one second to collect and process into a device fingerprint that does not change over time or after factory reset. We demonstrate that our approach is very likely to produce globally unique fingerprints for iOS devices, with an estimated 67 bits of entropy in the fingerprint for iPhone 6S devices. In addition, we find that the accelerometer of Google Pixel 2 and Pixel 3 devices can also be fingerprinted by our approach.
传感器是当今许多计算机系统的重要组成部分。移动设备就是一个很好的例子,它包含大量的传感器,从加速度计和GPS装置,到摄像头和麦克风。应用程序程序员可以访问来自这些传感器的数据,他们可以使用这些数据构建上下文感知的应用程序。良好的传感器精度通常是至关重要的,因此制造商通常使用每个设备的出厂校准来补偿制造过程中引入的系统误差。本文探讨了一种针对传感器数据的新型指纹攻击:校准指纹。校准指纹攻击仅通过仔细分析传感器输出就可以推断出设备的每个设备出厂校准数据。这种攻击不需要直接访问任何校准参数,因为这些参数通常嵌入在设备的固件中,应用程序开发人员无法直接访问。我们通过对iOS和Android设备中的惯性测量单元传感器执行校准指纹攻击来证明这种新型攻击的潜力。这些传感器是很好的选择,因为访问这些传感器不需要任何特殊权限,数据可以通过安装在设备上的本地应用程序访问,也可以在访问iOS和Android设备上的网站时通过JavaScript访问。我们发现我们能够执行非常有效的校准指纹攻击:我们的方法需要少于100个传感器数据样本,并且需要不到一秒钟的时间来收集和处理成不随时间或出厂重置后改变的设备指纹。我们证明,我们的方法很可能为iOS设备产生全球唯一的指纹,iPhone 6S设备的指纹中估计有67位熵。此外,我们发现Google Pixel 2和Pixel 3设备的加速度计也可以通过我们的方法进行指纹识别。
{"title":"SensorID: Sensor Calibration Fingerprinting for Smartphones","authors":"Jiexin Zhang, A. Beresford, I. Sheret","doi":"10.1109/SP.2019.00072","DOIUrl":"https://doi.org/10.1109/SP.2019.00072","url":null,"abstract":"Sensors are an essential component of many computer systems today. Mobile devices are a good example, containing a vast array of sensors from accelerometers and GPS units, to cameras and microphones. Data from these sensors are accessible to application programmers who can use this data to build context-aware applications. Good sensor accuracy is often crucial, and therefore manufacturers often use per-device factory calibration to compensate for systematic errors introduced during manufacture. In this paper we explore a new type of fingerprinting attack on sensor data: calibration fingerprinting. A calibration fingerprinting attack infers the per-device factory calibration data from a device by careful analysis of the sensor output alone. Such an attack does not require direct access to any calibration parameters since these are often embedded inside the firmware of the device and are not directly accessible by application developers. We demonstrate the potential of this new class of attack by performing calibration fingerprinting attacks on the inertial measurement unit sensors found in iOS and Android devices. These sensors are good candidates because access to these sensors does not require any special permissions, and the data can be accessed via both a native app installed on a device and also by JavaScript when visiting a website on an iOS and Android device. We find we are able to perform a very effective calibration fingerprinting attack: our approach requires fewer than 100 samples of sensor data and takes less than one second to collect and process into a device fingerprint that does not change over time or after factory reset. We demonstrate that our approach is very likely to produce globally unique fingerprints for iOS devices, with an estimated 67 bits of entropy in the fingerprint for iPhone 6S devices. In addition, we find that the accelerometer of Google Pixel 2 and Pixel 3 devices can also be fingerprinted by our approach.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks 利用纠错码:ECC内存抗鲁瓦默攻击的有效性研究
Pub Date : 2019-05-01 DOI: 10.1109/SP.2019.00089
L. Cojocar, Kaveh Razavi, Cristiano Giuffrida, H. Bos
Given the increasing impact of Rowhammer, and the dearth of adequate other hardware defenses, many in the security community have pinned their hopes on error-correcting code (ECC) memory as one of the few practical defenses against Rowhammer attacks. Specifically, the expectation is that the ECC algorithm will correct or detect any bits they manage to flip in memory in real-world settings. However, the extent to which ECC really protects against Rowhammer is an open research question, due to two key challenges. First, the details of the ECC implementations in commodity systems are not known. Second, existing Rowhammer exploitation techniques cannot yield reliable attacks in presence of ECC memory. In this paper, we address both challenges and provide concrete evidence of the susceptibility of ECC memory to Rowhammer attacks. To address the first challenge, we describe a novel approach that combines a custom-made hardware probe, Rowhammer bit flips, and a cold boot attack to reverse engineer ECC functions on commodity AMD and Intel processors. To address the second challenge, we present ECCploit, a new Rowhammer attack based on composable, data-controlled bit flips and a novel side channel in the ECC memory controller. We show that, while ECC memory does reduce the attack surface for Rowhammer, ECCploit still allows an attacker to mount reliable Rowhammer attacks against vulnerable ECC memory on a variety of systems and configurations. In addition, we show that, despite the non-trivial constraints imposed by ECC, ECCploit can still be powerful in practice and mimic the behavior of prior Rowhammer exploits.
鉴于Rowhammer的影响越来越大,而缺乏足够的其他硬件防御,安全社区中的许多人将希望寄托在纠错码(ECC)内存上,将其作为抵御Rowhammer攻击的为数不多的实用防御手段之一。具体来说,期望是ECC算法将纠正或检测他们在现实世界设置中设法在内存中翻转的任何位。然而,由于两个关键的挑战,ECC在多大程度上真正保护了对Rowhammer的防御,这是一个开放的研究问题。首先,商品系统中ECC实现的细节尚不清楚。其次,现有的Rowhammer利用技术无法在ECC内存存在的情况下产生可靠的攻击。在本文中,我们解决了这两个挑战,并提供了ECC内存对Rowhammer攻击易感性的具体证据。为了解决第一个挑战,我们描述了一种结合定制硬件探针、Rowhammer位翻转和冷启动攻击的新方法,以在商用AMD和英特尔处理器上逆向工程ECC功能。为了解决第二个挑战,我们提出了ECCploit,这是一种基于可组合、数据控制的位翻转和ECC内存控制器中的新侧通道的新Rowhammer攻击。我们表明,虽然ECC内存确实减少了Rowhammer的攻击面,但ECCploit仍然允许攻击者在各种系统和配置上对易受攻击的ECC内存进行可靠的Rowhammer攻击。此外,我们表明,尽管ECC施加了重要的约束,但ECCploit在实践中仍然可以很强大,并模仿先前的Rowhammer漏洞的行为。
{"title":"Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks","authors":"L. Cojocar, Kaveh Razavi, Cristiano Giuffrida, H. Bos","doi":"10.1109/SP.2019.00089","DOIUrl":"https://doi.org/10.1109/SP.2019.00089","url":null,"abstract":"Given the increasing impact of Rowhammer, and the dearth of adequate other hardware defenses, many in the security community have pinned their hopes on error-correcting code (ECC) memory as one of the few practical defenses against Rowhammer attacks. Specifically, the expectation is that the ECC algorithm will correct or detect any bits they manage to flip in memory in real-world settings. However, the extent to which ECC really protects against Rowhammer is an open research question, due to two key challenges. First, the details of the ECC implementations in commodity systems are not known. Second, existing Rowhammer exploitation techniques cannot yield reliable attacks in presence of ECC memory. In this paper, we address both challenges and provide concrete evidence of the susceptibility of ECC memory to Rowhammer attacks. To address the first challenge, we describe a novel approach that combines a custom-made hardware probe, Rowhammer bit flips, and a cold boot attack to reverse engineer ECC functions on commodity AMD and Intel processors. To address the second challenge, we present ECCploit, a new Rowhammer attack based on composable, data-controlled bit flips and a novel side channel in the ECC memory controller. We show that, while ECC memory does reduce the attack surface for Rowhammer, ECCploit still allows an attacker to mount reliable Rowhammer attacks against vulnerable ECC memory on a variety of systems and configurations. In addition, we show that, despite the non-trivial constraints imposed by ECC, ECCploit can still be powerful in practice and mimic the behavior of prior Rowhammer exploits.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
期刊
2019 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1