首页 > 最新文献

2019 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks 神经净化:识别和减轻神经网络中的后门攻击
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00031
Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao
Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor attacks, where hidden associations or triggers override normal classification to produce unexpected results. For example, a model with a backdoor always identifies a face as Bill Gates if a specific symbol is present in the input. Backdoors can stay hidden indefinitely until activated by an input, and present a serious security risk to many security or safety related applications, e.g. biometric authentication systems or self-driving cars. We present the first robust and generalizable detection and mitigation system for DNN backdoor attacks. Our techniques identify backdoors and reconstruct possible triggers. We identify multiple mitigation techniques via input filters, neuron pruning and unlearning. We demonstrate their efficacy via extensive experiments on a variety of DNNs, against two types of backdoor injection methods identified by prior work. Our techniques also prove robust against a number of variants of the backdoor attack.
深度神经网络(dnn)缺乏透明度使其容易受到后门攻击,其中隐藏的关联或触发器会覆盖正常分类以产生意想不到的结果。例如,如果输入中出现特定的符号,带有后门的模型总是将人脸识别为比尔·盖茨。后门可以无限期地隐藏,直到被输入激活,并给许多安全或安全相关应用带来严重的安全风险,例如生物识别认证系统或自动驾驶汽车。我们提出了第一个针对DNN后门攻击的鲁棒和通用的检测和缓解系统。我们的技术可以识别后门并重建可能的触发点。我们通过输入滤波器、神经元修剪和学习来识别多种缓解技术。我们通过对多种dnn的广泛实验证明了它们的有效性,以对抗先前工作确定的两种后门注射方法。我们的技术也证明了对许多后门攻击变体的鲁棒性。
{"title":"Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks","authors":"Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao","doi":"10.1109/SP.2019.00031","DOIUrl":"https://doi.org/10.1109/SP.2019.00031","url":null,"abstract":"Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor attacks, where hidden associations or triggers override normal classification to produce unexpected results. For example, a model with a backdoor always identifies a face as Bill Gates if a specific symbol is present in the input. Backdoors can stay hidden indefinitely until activated by an input, and present a serious security risk to many security or safety related applications, e.g. biometric authentication systems or self-driving cars. We present the first robust and generalizable detection and mitigation system for DNN backdoor attacks. Our techniques identify backdoors and reconstruct possible triggers. We identify multiple mitigation techniques via input filters, neuron pruning and unlearning. We demonstrate their efficacy via extensive experiments on a variety of DNNs, against two types of backdoor injection methods identified by prior work. Our techniques also prove robust against a number of variants of the backdoor attack.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 945
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone 听力硬盘:用合成麦克风窃听的磁盘
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00008
Andrew Kwong, Wenyuan Xu, Kevin Fu
Security conscious individuals may take considerable measures to disable sensors in order to protect their privacy. However, they often overlook the cyberphysical attack surface exposed by devices that were never designed to be sensors in the first place. Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech. These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive. This proof of concept attack sheds light on the possibility of invasion of privacy even in absence of traditional sensors. We also present defense mechanisms, such as the use of ultrasonic aliasing, that can mitigate acoustic eavesdropping by synthesized microphones in hard disk drives.
有安全意识的个人可能会采取相当大的措施来禁用传感器,以保护他们的隐私。然而,他们往往忽视了设备暴露的网络物理攻击面,这些设备从一开始就没有被设计成传感器。我们的研究表明,磁性硬盘驱动器中的机械部件可以作为麦克风,具有足够的精度来提取和解析人类语言。这些无意中的麦克风以足够高的保真度感应语音,使Shazam服务能够识别通过硬盘录制的歌曲。这种概念验证攻击揭示了在没有传统传感器的情况下侵犯隐私的可能性。我们还提出了防御机制,例如使用超声波混叠,可以减轻硬盘驱动器中合成麦克风的声学窃听。
{"title":"Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone","authors":"Andrew Kwong, Wenyuan Xu, Kevin Fu","doi":"10.1109/SP.2019.00008","DOIUrl":"https://doi.org/10.1109/SP.2019.00008","url":null,"abstract":"Security conscious individuals may take considerable measures to disable sensors in order to protect their privacy. However, they often overlook the cyberphysical attack surface exposed by devices that were never designed to be sensors in the first place. Our research demonstrates that the mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech. These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive. This proof of concept attack sheds light on the possibility of invasion of privacy even in absence of traditional sensors. We also present defense mechanisms, such as the use of ultrasonic aliasing, that can mitigate acoustic eavesdropping by synthesized microphones in hard disk drives.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133004320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage 具有k近邻查询泄漏的加密数据库的数据恢复
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00015
Evgenios M. Kornaropoulos, Charalampos Papamanthou, R. Tamassia
Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we develop the first data recovery attacks on encrypted databases supporting one-dimensional k-nearest neighbor (k-NN) queries, which are widely used in spatial data management. Our attacks exploit a generic k-NN query leakage profile: the attacker observes the identifiers of matched records. We consider both unordered responses, where the leakage is a set, and ordered responses, where the leakage is a k-tuple ordered by distance from the query point. As a first step, we perform a theoretical feasibility study on exact reconstruction, i.e., recovery of the exact plaintext values of the encrypted database. For ordered responses, we show that exact reconstruction is feasible if the attacker has additional access to some auxiliary information that is normally not available in practice. For unordered responses, we prove that exact reconstruction is impossible due to the infinite number of valid reconstructions. As a next step, we propose practical and more realistic approximate reconstruction attacks so as to recover an approximation of the plaintext values. For ordered responses, we show that after observing enough query responses, the attacker can approximate the client’s encrypted database with considerable accuracy. For unordered responses we characterize the set of valid reconstructions as a convex polytope in a k-dimensional space and present a rigorous attack that reconstructs the plaintext database with bounded approximation error. As multidimensional spatial data can be efficiently processed by mapping it to one dimension via Hilbert curves, we demonstrate our approximate reconstruction attacks on privacy-sensitive geolocation data. Our experiments on real-world datasets show that our attacks reconstruct the plaintext values with relative error ranging from 2.9% to 0.003%.
Kellaris等人(CCS ' 16)和Lacharite等人(SP ' 18)最近的作品展示了支持丰富查询(如范围查询)的加密数据库的数据恢复攻击。本文首次对空间数据管理中广泛使用的支持一维k-最近邻(k-NN)查询的加密数据库进行了数据恢复攻击。我们的攻击利用了一个通用的k-NN查询泄漏配置文件:攻击者观察匹配记录的标识符。我们既考虑无序响应,其中泄漏是一个集合,也考虑有序响应,其中泄漏是一个k元组,按与查询点的距离排序。作为第一步,我们对精确重建进行了理论可行性研究,即恢复加密数据库的精确明文值。对于有序响应,我们表明,如果攻击者有额外的访问一些通常在实践中不可用的辅助信息,精确重构是可行的。对于无序响应,由于有效重构的数量是无限的,我们证明了精确重构是不可能的。下一步,我们提出了更实用、更真实的近似重建攻击,以恢复近似的明文值。对于有序响应,我们表明,在观察到足够的查询响应后,攻击者可以相当准确地近似客户端的加密数据库。对于无序响应,我们将有效重构集表征为k维空间中的凸多面体,并提出了一种具有有界近似误差的重构明文数据库的严格攻击。由于多维空间数据可以通过希尔伯特曲线映射到一维来有效地处理,我们展示了对隐私敏感的地理位置数据的近似重建攻击。我们在真实数据集上的实验表明,我们的攻击重建的明文值的相对误差在2.9%到0.003%之间。
{"title":"Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage","authors":"Evgenios M. Kornaropoulos, Charalampos Papamanthou, R. Tamassia","doi":"10.1109/SP.2019.00015","DOIUrl":"https://doi.org/10.1109/SP.2019.00015","url":null,"abstract":"Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we develop the first data recovery attacks on encrypted databases supporting one-dimensional k-nearest neighbor (k-NN) queries, which are widely used in spatial data management. Our attacks exploit a generic k-NN query leakage profile: the attacker observes the identifiers of matched records. We consider both unordered responses, where the leakage is a set, and ordered responses, where the leakage is a k-tuple ordered by distance from the query point. As a first step, we perform a theoretical feasibility study on exact reconstruction, i.e., recovery of the exact plaintext values of the encrypted database. For ordered responses, we show that exact reconstruction is feasible if the attacker has additional access to some auxiliary information that is normally not available in practice. For unordered responses, we prove that exact reconstruction is impossible due to the infinite number of valid reconstructions. As a next step, we propose practical and more realistic approximate reconstruction attacks so as to recover an approximation of the plaintext values. For ordered responses, we show that after observing enough query responses, the attacker can approximate the client’s encrypted database with considerable accuracy. For unordered responses we characterize the set of valid reconstructions as a convex polytope in a k-dimensional space and present a rigorous attack that reconstructs the plaintext database with bounded approximation error. As multidimensional spatial data can be efficiently processed by mapping it to one dimension via Hilbert curves, we demonstrate our approximate reconstruction attacks on privacy-sensitive geolocation data. Our experiments on real-world datasets show that our attacks reconstruct the plaintext values with relative error ranging from 2.9% to 0.003%.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Resident Evil: Understanding Residential IP Proxy as a Dark Service 《生化危机:将住宅IP代理理解为黑暗服务
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00011
Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, Xiaofeng Wang, Feng Qian, Zhou Li, Sumayah A. Alrwais, Limin Sun, Y. Liu
An emerging Internet business is residential proxy (RESIP) as a service, in which a provider utilizes the hosts within residential networks (in contrast to those running in a datacenter) to relay their customers’ traffic, in an attempt to avoid server- side blocking and detection. With the prominent roles the services could play in the underground business world, little has been done to understand whether they are indeed involved in Cybercrimes and how they operate, due to the challenges in identifying their RESIPs, not to mention any in-depth analysis on them. In this paper, we report the first study on RESIPs, which sheds light on the behaviors and the ecosystem of these elusive gray services. Our research employed an infiltration framework, including our clients for RESIP services and the servers they visited, to detect 6 million RESIP IPs across 230+ countries and 52K+ ISPs. The observed addresses were analyzed and the hosts behind them were further fingerprinted using a new profiling system. Our effort led to several surprising findings about the RESIP services unknown before. Surprisingly, despite the providers’ claim that the proxy hosts are willingly joined, many proxies run on likely compromised hosts including IoT devices. Through cross-matching the hosts we discovered and labeled PUP (potentially unwanted programs) logs provided by a leading IT company, we uncovered various illicit operations RESIP hosts performed, including illegal promotion, Fast fluxing, phishing, malware hosting, and others. We also reverse engi- neered RESIP services’ internal infrastructures, uncovered their potential rebranding and reselling behaviors. Our research takes the first step toward understanding this new Internet service, contributing to the effective control of their security risks.
一个新兴的互联网业务是住宅代理(RESIP)作为一种服务,在这种服务中,提供商利用住宅网络中的主机(与运行在数据中心中的主机相反)来中继其客户的流量,试图避免服务器端阻塞和检测。由于这些服务在地下商业世界中扮演着重要的角色,人们几乎没有做过什么来了解它们是否确实参与了网络犯罪,以及它们是如何运作的,因为识别它们的resip存在挑战,更不用说对它们进行深入分析了。在本文中,我们报告了第一项关于resip的研究,该研究揭示了这些难以捉摸的灰色服务的行为和生态系统。我们的研究采用了一个渗透框架,包括我们的RESIP服务客户和他们访问的服务器,在230多个国家和52K多个isp中检测了600万个RESIP ip。对观察到的地址进行分析,并使用新的分析系统进一步对其背后的主机进行指纹识别。我们的努力导致了关于RESIP服务的几个令人惊讶的发现,这些发现以前是未知的。令人惊讶的是,尽管提供商声称代理主机是自愿加入的,但许多代理运行在可能受到威胁的主机上,包括物联网设备。通过交叉匹配主机,我们发现并标记了由一家领先的IT公司提供的PUP(潜在有害程序)日志,我们发现了RESIP主机执行的各种非法操作,包括非法促销、快速流量、网络钓鱼、恶意软件托管等。我们还对RESIP服务的内部基础设施进行了逆向工程,发现了它们潜在的品牌重塑和转售行为。我们的研究为理解这种新的互联网服务迈出了第一步,有助于有效控制其安全风险。
{"title":"Resident Evil: Understanding Residential IP Proxy as a Dark Service","authors":"Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, Xiaofeng Wang, Feng Qian, Zhou Li, Sumayah A. Alrwais, Limin Sun, Y. Liu","doi":"10.1109/SP.2019.00011","DOIUrl":"https://doi.org/10.1109/SP.2019.00011","url":null,"abstract":"An emerging Internet business is residential proxy (RESIP) as a service, in which a provider utilizes the hosts within residential networks (in contrast to those running in a datacenter) to relay their customers’ traffic, in an attempt to avoid server- side blocking and detection. With the prominent roles the services could play in the underground business world, little has been done to understand whether they are indeed involved in Cybercrimes and how they operate, due to the challenges in identifying their RESIPs, not to mention any in-depth analysis on them. In this paper, we report the first study on RESIPs, which sheds light on the behaviors and the ecosystem of these elusive gray services. Our research employed an infiltration framework, including our clients for RESIP services and the servers they visited, to detect 6 million RESIP IPs across 230+ countries and 52K+ ISPs. The observed addresses were analyzed and the hosts behind them were further fingerprinted using a new profiling system. Our effort led to several surprising findings about the RESIP services unknown before. Surprisingly, despite the providers’ claim that the proxy hosts are willingly joined, many proxies run on likely compromised hosts including IoT devices. Through cross-matching the hosts we discovered and labeled PUP (potentially unwanted programs) logs provided by a leading IT company, we uncovered various illicit operations RESIP hosts performed, including illegal promotion, Fast fluxing, phishing, malware hosting, and others. We also reverse engi- neered RESIP services’ internal infrastructures, uncovered their potential rebranding and reselling behaviors. Our research takes the first step toward understanding this new Internet service, contributing to the effective control of their security risks.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises 简单的高级密码算术代码-有证明,没有妥协
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00005
Andres Erbsen, Jade Philipoom, Jason Gross, R. Sloan, A. Chlipala
We introduce a new approach for implementing cryptographic arithmetic in short high-level code with machine-checked proofs of functional correctness. We further demonstrate that simple partial evaluation is sufficient to transform into the fastest-known C code, breaking the decades-old pattern that the only fast implementations are those whose instruction-level steps were written out by hand. These techniques were used to build an elliptic-curve library that achieves competitive performance for 80 prime fields and multiple CPU architectures, showing that implementation and proof effort scales with the number and complexity of conceptually different algorithms, not their use cases. As one outcome, we present the first verified high-performance implementation of P-256, the most widely used elliptic curve. implementations from our library were included in BoringSSL to replace existing specialized code, for inclusion in several large deployments for Chrome, Android, and CloudFlare.
我们介绍了一种用机器检查功能正确性证明的简短高级代码实现加密算法的新方法。我们进一步证明,简单的部分求值足以转换为已知最快的C代码,从而打破了几十年来唯一快速实现的模式,即那些指令级步骤是手工编写的。这些技术被用来构建一个椭圆曲线库,该库在80个素数字段和多个CPU架构下实现了具有竞争力的性能,表明实现和证明工作与概念上不同算法的数量和复杂性有关,而不是与它们的用例有关。作为一项成果,我们提出了P-256的第一个经过验证的高性能实现,这是最广泛使用的椭圆曲线。我们库中的实现包含在BoringSSL中,以取代现有的专门代码,以便在Chrome、Android和CloudFlare的几个大型部署中包含。
{"title":"Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises","authors":"Andres Erbsen, Jade Philipoom, Jason Gross, R. Sloan, A. Chlipala","doi":"10.1109/SP.2019.00005","DOIUrl":"https://doi.org/10.1109/SP.2019.00005","url":null,"abstract":"We introduce a new approach for implementing cryptographic arithmetic in short high-level code with machine-checked proofs of functional correctness. We further demonstrate that simple partial evaluation is sufficient to transform into the fastest-known C code, breaking the decades-old pattern that the only fast implementations are those whose instruction-level steps were written out by hand. These techniques were used to build an elliptic-curve library that achieves competitive performance for 80 prime fields and multiple CPU architectures, showing that implementation and proof effort scales with the number and complexity of conceptually different algorithms, not their use cases. As one outcome, we present the first verified high-performance implementation of P-256, the most widely used elliptic curve. implementations from our library were included in BoringSSL to replace existing specialized code, for inclusion in several large deployments for Chrome, Android, and CloudFlare.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Beyond Credential Stuffing: Password Similarity Models Using Neural Networks 超越凭证填充:使用神经网络的密码相似度模型
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00056
Bijeeta Pal, Tal Daniel, Rahul Chatterjee, T. Ristenpart
Attackers increasingly use passwords leaked from one website to compromise associated accounts on other websites. Such targeted attacks work because users reuse, or pick similar, passwords for different websites. We recast one of the core technical challenges underlying targeted attacks as the task of modeling similarity of human-chosen passwords. We show how to learn good password similarity models using a compilation of 1.4 billion leaked email, password pairs. Using our trained models of password similarity, we exhibit the most damaging targeted attack to date. Simulations indicate that our attack compromises more than 16% of user accounts in less than a thousand guesses, should one of their other passwords be known to the attacker and despite the use of state-of-the art countermeasures. We show via a case study involving a large university authentication service that the attacks are also effective in practice. We go on to propose the first-ever defense against such targeted attacks, by way of personalized password strength meters (PPSMs). These are password strength meters that can warn users when they are picking passwords that are vulnerable to attacks, including targeted ones that take advantage of the user’s previously compromised passwords. We design and build a PPSM that can be compressed to less than 3 MB, making it easy to deploy in order to accurately estimate the strength of a password against all known guessing attacks.
攻击者越来越多地使用从一个网站泄露的密码来破坏其他网站的相关帐户。这种有针对性的攻击之所以有效,是因为用户在不同的网站上重复使用或选择相似的密码。我们将目标攻击的核心技术挑战之一重新定义为人为选择密码的相似性建模任务。我们展示了如何使用14亿个泄露的电子邮件、密码对的汇编来学习良好的密码相似度模型。使用我们训练有素的密码相似度模型,我们展示了迄今为止最具破坏性的目标攻击。模拟表明,我们的攻击在不到一千次的猜测中泄露了超过16%的用户帐户,如果攻击者知道他们的其他密码之一,尽管使用了最先进的对策。我们通过一个涉及大型大学身份验证服务的案例研究表明,这种攻击在实践中也是有效的。我们继续提出有史以来第一次通过个性化密码强度计(PPSMs)来防御此类针对性攻击。这些是密码强度计,可以在用户选择易受攻击的密码时发出警告,包括利用用户先前泄露的密码的目标密码。我们设计并构建了一个可以压缩到小于3 MB的PPSM,使其易于部署,以便准确估计密码对抗所有已知猜测攻击的强度。
{"title":"Beyond Credential Stuffing: Password Similarity Models Using Neural Networks","authors":"Bijeeta Pal, Tal Daniel, Rahul Chatterjee, T. Ristenpart","doi":"10.1109/SP.2019.00056","DOIUrl":"https://doi.org/10.1109/SP.2019.00056","url":null,"abstract":"Attackers increasingly use passwords leaked from one website to compromise associated accounts on other websites. Such targeted attacks work because users reuse, or pick similar, passwords for different websites. We recast one of the core technical challenges underlying targeted attacks as the task of modeling similarity of human-chosen passwords. We show how to learn good password similarity models using a compilation of 1.4 billion leaked email, password pairs. Using our trained models of password similarity, we exhibit the most damaging targeted attack to date. Simulations indicate that our attack compromises more than 16% of user accounts in less than a thousand guesses, should one of their other passwords be known to the attacker and despite the use of state-of-the art countermeasures. We show via a case study involving a large university authentication service that the attacks are also effective in practice. We go on to propose the first-ever defense against such targeted attacks, by way of personalized password strength meters (PPSMs). These are password strength meters that can warn users when they are picking passwords that are vulnerable to attacks, including targeted ones that take advantage of the user’s previously compromised passwords. We design and build a PPSM that can be compressed to less than 3 MB, making it easy to deploy in order to accurately estimate the strength of a password against all known guessing attacks.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"22 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Dominance as a New Trusted Computing Primitive for the Internet of Things 优势作为一种新的物联网可信计算原语
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00084
Meng Xu, Manuel Huber, Zhichuang Sun, P. England, Marcus Peinado, Sang-Ho Lee, A. Marochko, D. Mattoon, Rob Spiger, S. Thom
The Internet of Things (IoT) is rapidly emerging as one of the dominant computing paradigms of this decade. Applications range from in-home entertainment to large-scale industrial deployments such as controlling assembly lines and monitoring traffic. While IoT devices are in many respects similar to traditional computers, user expectations and deployment scenarios as well as cost and hardware constraints are sufficiently different to create new security challenges as well as new opportunities. This is especially true for large-scale IoT deployments in which a central entity deploys and controls a large number of IoT devices with minimal human interaction. Like traditional computers, IoT devices are subject to attack and compromise. Large IoT deployments consisting of many nearly identical devices are especially attractive targets. At the same time, recovery from root compromise by conventional means becomes costly and slow, even more so if the devices are dispersed over a large geographical area. In the worst case, technicians have to travel to all devices and manually recover them. Data center solutions such as the Intelligent Platform Management Interface (IPMI) which rely on separate service processors and network connections are not only not supported by existing IoT hardware, but are unlikely to be in the foreseeable future due to the cost constraints of mainstream IoT devices. This paper presents Cider, a system that can recover IoT devices within a short amount of time, even if attackers have taken root control of every device in a large deployment. The recovery requires minimal manual intervention. After the administrator has identified the compromise and produced an updated firmware image, he/she can instruct Cider to force the devices to reset and to install the patched firmware on the devices. We demonstrate the universality and practicality of Cider by implementing it on three popular IoT platforms (HummingBoard Edge, Raspberry Pi Compute Module 3 and Nucleo-L476RG) spanning the range from high to low end. Our evaluation shows that the performance overhead of Cider is generally negligible.
物联网(IoT)正迅速成为这十年中占主导地位的计算范式之一。应用范围从家庭娱乐到大规模工业部署,如控制装配线和监控交通。虽然物联网设备在许多方面与传统计算机相似,但用户期望和部署场景以及成本和硬件限制的差异足以产生新的安全挑战和新的机遇。这对于大规模物联网部署尤其如此,在大规模物联网部署中,中央实体以最少的人工交互部署和控制大量物联网设备。与传统计算机一样,物联网设备也容易受到攻击和危害。由许多几乎相同的设备组成的大型物联网部署是特别有吸引力的目标。与此同时,通过传统手段从根损害中恢复变得既昂贵又缓慢,如果设备分散在一个大的地理区域,则更是如此。在最坏的情况下,技术人员必须前往所有设备并手动恢复它们。数据中心解决方案,如IPMI (Intelligent Platform Management Interface),依赖于独立的业务处理器和网络连接,不仅现有的物联网硬件不支持,而且由于主流物联网设备的成本限制,在可预见的未来也不太可能支持。本文介绍了Cider,一个可以在短时间内恢复物联网设备的系统,即使攻击者已经控制了大型部署中的每个设备。恢复需要最少的人工干预。在管理员识别出漏洞并生成更新的固件映像后,他/她可以指示Cider强制设备重置并在设备上安装补丁固件。我们通过在三个流行的物联网平台(HummingBoard Edge, Raspberry Pi Compute Module 3和Nucleo-L476RG)上实现它来展示Cider的通用性和实用性,涵盖从高端到低端的范围。我们的评估表明,Cider的性能开销通常可以忽略不计。
{"title":"Dominance as a New Trusted Computing Primitive for the Internet of Things","authors":"Meng Xu, Manuel Huber, Zhichuang Sun, P. England, Marcus Peinado, Sang-Ho Lee, A. Marochko, D. Mattoon, Rob Spiger, S. Thom","doi":"10.1109/SP.2019.00084","DOIUrl":"https://doi.org/10.1109/SP.2019.00084","url":null,"abstract":"The Internet of Things (IoT) is rapidly emerging as one of the dominant computing paradigms of this decade. Applications range from in-home entertainment to large-scale industrial deployments such as controlling assembly lines and monitoring traffic. While IoT devices are in many respects similar to traditional computers, user expectations and deployment scenarios as well as cost and hardware constraints are sufficiently different to create new security challenges as well as new opportunities. This is especially true for large-scale IoT deployments in which a central entity deploys and controls a large number of IoT devices with minimal human interaction. Like traditional computers, IoT devices are subject to attack and compromise. Large IoT deployments consisting of many nearly identical devices are especially attractive targets. At the same time, recovery from root compromise by conventional means becomes costly and slow, even more so if the devices are dispersed over a large geographical area. In the worst case, technicians have to travel to all devices and manually recover them. Data center solutions such as the Intelligent Platform Management Interface (IPMI) which rely on separate service processors and network connections are not only not supported by existing IoT hardware, but are unlikely to be in the foreseeable future due to the cost constraints of mainstream IoT devices. This paper presents Cider, a system that can recover IoT devices within a short amount of time, even if attackers have taken root control of every device in a large deployment. The recovery requires minimal manual intervention. After the administrator has identified the compromise and produced an updated firmware image, he/she can instruct Cider to force the devices to reset and to install the patched firmware on the devices. We demonstrate the universality and practicality of Cider by implementing it on three popular IoT platforms (HummingBoard Edge, Raspberry Pi Compute Module 3 and Nucleo-L476RG) spanning the range from high to low end. Our evaluation shows that the performance overhead of Cider is generally negligible.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps 为什么你的数据会泄露?从移动应用揭秘云数据泄露
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00009
Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang
Increasingly, more and more mobile applications (apps for short) are using the cloud as the back-end, in particular the cloud APIs, for data storage, data analytics, message notification, and monitoring. Unfortunately, we have recently witnessed massive data leaks from the cloud, ranging from personally identifiable information to corporate secrets. In this paper, we seek to understand why such significant leaks occur and design tools to automatically identify them. To our surprise, our study reveals that lack of authentication, misuse of various keys (e.g., normal user keys and superuser keys) in authentication, or misconfiguration of user permissions in authorization are the root causes. Then, we design a set of automated program analysis techniques including obfuscation-resilient cloud API identification and string value analysis, and implement them in a tool called LeakScope to identify the potential data leakage vulnerabilities from mobile apps based on how the cloud APIs are used. Our evaluation with over 1.6 million mobile apps from the Google Play Store has uncovered 15, 098 app servers managed by mainstream cloud providers such as Amazon, Google, and Microsoft that are subject to data leakage attacks. We have made responsible disclosure to each of the cloud service providers, and they have all confirmed the vulnerabilities we have identified and are actively working with the mobile app developers to patch their vulnerable services.
越来越多的移动应用程序(简称应用程序)使用云作为后端,特别是云api,用于数据存储、数据分析、消息通知和监控。不幸的是,我们最近目睹了大量数据从云端泄露,从个人身份信息到公司机密。在本文中,我们试图理解为什么会发生如此重大的泄漏,并设计工具来自动识别它们。令我们惊讶的是,我们的研究表明,缺乏身份验证,在身份验证中滥用各种密钥(例如,普通用户密钥和超级用户密钥),或者在授权中错误配置用户权限是根本原因。然后,我们设计了一套自动程序分析技术,包括抗混淆云API识别和字符串值分析,并在一个名为LeakScope的工具中实现,根据云API的使用方式识别移动应用程序中潜在的数据泄露漏洞。我们对b谷歌Play Store中超过160万个移动应用进行了评估,发现有15098个由亚马逊、谷歌、微软等主流云提供商管理的应用服务器存在数据泄露攻击。我们已经向每个云服务提供商进行了负责任的披露,他们都确认了我们发现的漏洞,并正在积极与移动应用程序开发人员合作,修补他们的漏洞服务。
{"title":"Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps","authors":"Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang","doi":"10.1109/SP.2019.00009","DOIUrl":"https://doi.org/10.1109/SP.2019.00009","url":null,"abstract":"Increasingly, more and more mobile applications (apps for short) are using the cloud as the back-end, in particular the cloud APIs, for data storage, data analytics, message notification, and monitoring. Unfortunately, we have recently witnessed massive data leaks from the cloud, ranging from personally identifiable information to corporate secrets. In this paper, we seek to understand why such significant leaks occur and design tools to automatically identify them. To our surprise, our study reveals that lack of authentication, misuse of various keys (e.g., normal user keys and superuser keys) in authentication, or misconfiguration of user permissions in authorization are the root causes. Then, we design a set of automated program analysis techniques including obfuscation-resilient cloud API identification and string value analysis, and implement them in a tool called LeakScope to identify the potential data leakage vulnerabilities from mobile apps based on how the cloud APIs are used. Our evaluation with over 1.6 million mobile apps from the Google Play Store has uncovered 15, 098 app servers managed by mainstream cloud providers such as Amazon, Google, and Microsoft that are subject to data leakage attacks. We have made responsible disclosure to each of the cloud service providers, and they have all confirmed the vulnerabilities we have identified and are actively working with the mobile app developers to patch their vulnerable services.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Differentially Private Model Publishing for Deep Learning 面向深度学习的差异化私有模型发布
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00019
Lei Yu, Ling Liu, C. Pu, M. E. Gursoy, Stacey Truex
Deep learning techniques based on neural networks have shown significant success in a wide range of AI tasks. Large-scale training datasets are one of the critical factors for their success. However, when the training datasets are crowdsourced from individuals and contain sensitive information, the model parameters may encode private information and bear the risks of privacy leakage. The recent growing trend of the sharing and publishing of pre-trained models further aggravates such privacy risks. To tackle this problem, we propose a differentially private approach for training neural networks. Our approach includes several new techniques for optimizing both privacy loss and model accuracy. We employ a generalization of differential privacy called concentrated differential privacy(CDP), with both a formal and refined privacy loss analysis on two different data batching methods. We implement a dynamic privacy budget allocator over the course of training to improve model accuracy. Extensive experiments demonstrate that our approach effectively improves privacy loss accounting, training efficiency and model quality under a given privacy budget.
基于神经网络的深度学习技术在广泛的人工智能任务中取得了显著的成功。大规模的训练数据集是其成功的关键因素之一。然而,当训练数据集是来自个人的众包数据,并且包含敏感信息时,模型参数可能会编码隐私信息,承担隐私泄露的风险。最近,共享和发布预训练模型的趋势日益增长,这进一步加剧了这种隐私风险。为了解决这个问题,我们提出了一种训练神经网络的差分私有方法。我们的方法包括一些优化隐私丢失和模型准确性的新技术。我们采用了一种称为集中差分隐私(CDP)的差分隐私的概括,对两种不同的数据批处理方法进行了形式化和精细化的隐私损失分析。我们在训练过程中实现了一个动态隐私预算分配器,以提高模型的准确性。大量的实验表明,在给定的隐私预算下,我们的方法有效地提高了隐私损失核算、训练效率和模型质量。
{"title":"Differentially Private Model Publishing for Deep Learning","authors":"Lei Yu, Ling Liu, C. Pu, M. E. Gursoy, Stacey Truex","doi":"10.1109/SP.2019.00019","DOIUrl":"https://doi.org/10.1109/SP.2019.00019","url":null,"abstract":"Deep learning techniques based on neural networks have shown significant success in a wide range of AI tasks. Large-scale training datasets are one of the critical factors for their success. However, when the training datasets are crowdsourced from individuals and contain sensitive information, the model parameters may encode private information and bear the risks of privacy leakage. The recent growing trend of the sharing and publishing of pre-trained models further aggravates such privacy risks. To tackle this problem, we propose a differentially private approach for training neural networks. Our approach includes several new techniques for optimizing both privacy loss and model accuracy. We employ a generalization of differential privacy called concentrated differential privacy(CDP), with both a formal and refined privacy loss analysis on two different data batching methods. We implement a dynamic privacy budget allocator over the course of training to improve model accuracy. Extensive experiments demonstrate that our approach effectively improves privacy loss accounting, training efficiency and model quality under a given privacy budget.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 201
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security 制定通用指标:评估工作量证明共识协议的安全性
Pub Date : 2019-04-01 DOI: 10.1109/SP.2019.00086
Ren Zhang, B. Preneel
Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to maintain their ledgers. However, research shows that NC fails to achieve perfect chain quality, allowing malicious miners to alter the public ledger in order to launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin and Publish or Perish, aim to solve the problem by raising the chain quality; other designs, represented by Fruitchains, DECOR+ and Subchains, claim to successfully defend against the attacks in the absence of perfect chain quality. As their effectiveness remains self-claimed, the community is divided on whether a secure PoW protocol is possible. In order to resolve this ambiguity and to lay down the foundation of a common body of knowledge, this paper introduces a multi-metric evaluation framework to quantitatively analyze PoW protocols' chain quality and attack resistance. Subsequently we use this framework to evaluate the security of these improved designs through Markov decision processes. We conclude that to date, no PoW protocol achieves ideal chain quality or is resistant against all three attacks. We attribute existing PoW protocols' imperfect chain quality to their unrealistic security assumptions, and their unsatisfactory attack resistance to a dilemma between "rewarding the bad" and "punishing the good". Moreover, our analysis reveals various new protocol-specific attack strategies. Based on our analysis, we propose future directions toward more secure PoW protocols and indicate several common pitfalls in PoW security analyses.
在比特币的中本共识协议(NC)之后,数百种加密货币使用工作量证明(PoW)来维护其分类账。然而,研究表明,NC无法实现完美的链质量,允许恶意矿工更改公共分类账,以发动多种攻击,即自私采矿,双重支出和羽毛分叉。后来的一些设计,以以太坊、比特币- ng、DECOR+、拜占庭币和发布或灭亡为代表,旨在通过提高链的质量来解决问题;以Fruitchains、DECOR+和Subchains为代表的其他设计则声称,在缺乏完美连锁质量的情况下,它们能成功抵御攻击。由于它们的有效性仍然是自我宣称的,因此社区对安全的PoW协议是否可能存在分歧。为了解决这一歧义,并奠定共同知识体系的基础,本文引入了一个多度量评估框架来定量分析PoW协议的链质量和抗攻击能力。随后,我们使用该框架通过马尔可夫决策过程来评估这些改进设计的安全性。我们得出的结论是,迄今为止,没有任何PoW协议能够达到理想的链质量,或者能够抵抗所有三种攻击。我们将现有PoW协议不完善的链质量归因于其不切实际的安全假设,将其不理想的抗攻击能力归因于“奖励坏人”和“惩罚好人”之间的两难境地。此外,我们的分析揭示了各种新的特定于协议的攻击策略。根据我们的分析,我们提出了更安全的PoW协议的未来方向,并指出了PoW安全性分析中的几个常见缺陷。
{"title":"Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security","authors":"Ren Zhang, B. Preneel","doi":"10.1109/SP.2019.00086","DOIUrl":"https://doi.org/10.1109/SP.2019.00086","url":null,"abstract":"Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to maintain their ledgers. However, research shows that NC fails to achieve perfect chain quality, allowing malicious miners to alter the public ledger in order to launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin and Publish or Perish, aim to solve the problem by raising the chain quality; other designs, represented by Fruitchains, DECOR+ and Subchains, claim to successfully defend against the attacks in the absence of perfect chain quality. As their effectiveness remains self-claimed, the community is divided on whether a secure PoW protocol is possible. In order to resolve this ambiguity and to lay down the foundation of a common body of knowledge, this paper introduces a multi-metric evaluation framework to quantitatively analyze PoW protocols' chain quality and attack resistance. Subsequently we use this framework to evaluate the security of these improved designs through Markov decision processes. We conclude that to date, no PoW protocol achieves ideal chain quality or is resistant against all three attacks. We attribute existing PoW protocols' imperfect chain quality to their unrealistic security assumptions, and their unsatisfactory attack resistance to a dilemma between \"rewarding the bad\" and \"punishing the good\". Moreover, our analysis reveals various new protocol-specific attack strategies. Based on our analysis, we propose future directions toward more secure PoW protocols and indicate several common pitfalls in PoW security analyses.","PeriodicalId":272713,"journal":{"name":"2019 IEEE Symposium on Security and Privacy (SP)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
期刊
2019 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1