首页 > 最新文献

Cybersecurity最新文献

英文 中文
TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions TVRAVNF:基于 TEE 的高效低成本虚拟网络功能远程验证方案
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-04 DOI: 10.1186/s42400-024-00235-7
Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu

With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent. While the NFV architecture brings a lot of advantages, it also introduces security challenges, including the effective and efficient verification of the integrity of deployed Virtual Network Functions (VNFs) and ensuring the secure operation of VNFs. To address the challenge of efficiently conducting virtual remote attestation for VNFs and establishing trust in virtualized environments like NFV architecture, we propose TVRAVNF, which is a highly efficient and low-cost TEE-based virtual remote attestation scheme for VNFs. The scheme we proposed ensures the security and effectiveness of the virtual remote attestation process by leveraging TEE. Furthermore, we introduces a novel local attestation mechanism, which not only reduces the overall overhead of the virtual remote attestation process but also shortens the attestation interval to mitigate Time-Of-Check-Time-Of-Use attacks, thereby enhancing overall security. We conduct experiments to validate the overhead of the TVRAVNF scheme and compare its performance with that of a typical remote attestation process within a maximum unattested time interval. The experimental results demonstrate that, by employing the local attestation mechanism, our solution achieves nearly an 80% significant performance improvement with a relatively small time overhead for small to medium-sized files. This further substantiates the significant advantages of our approach in both security and efficiency.

随着虚拟化技术的不断进步和 5G 网络的广泛采用,网络功能虚拟化(NFV)架构的应用日益普及和流行。NFV 架构在带来诸多优势的同时,也带来了安全方面的挑战,包括如何切实有效地验证已部署的虚拟网络功能(VNF)的完整性并确保 VNF 的安全运行。为了解决在 NFV 架构等虚拟化环境中高效地对 VNF 进行虚拟远程验证并建立信任所面临的挑战,我们提出了 TVRAVNF,这是一种高效、低成本的基于 TEE 的 VNF 虚拟远程验证方案。我们提出的方案利用 TEE 确保了虚拟远程验证过程的安全性和有效性。此外,我们还引入了一种新颖的本地验证机制,它不仅降低了虚拟远程验证过程的总体开销,还缩短了验证间隔时间,以缓解 "检查时间-使用时间 "攻击,从而增强了总体安全性。我们通过实验验证了 TVRAVNF 方案的开销,并将其性能与典型远程验证流程在最大未验证时间间隔内的性能进行了比较。实验结果表明,通过采用本地验证机制,我们的解决方案在中小型文件中以相对较小的时间开销实现了近 80% 的显著性能提升。这进一步证实了我们的方法在安全性和效率方面的显著优势。
{"title":"TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions","authors":"Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu","doi":"10.1186/s42400-024-00235-7","DOIUrl":"https://doi.org/10.1186/s42400-024-00235-7","url":null,"abstract":"<p>With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent. While the NFV architecture brings a lot of advantages, it also introduces security challenges, including the effective and efficient verification of the integrity of deployed Virtual Network Functions (VNFs) and ensuring the secure operation of VNFs. To address the challenge of efficiently conducting virtual remote attestation for VNFs and establishing trust in virtualized environments like NFV architecture, we propose TVRAVNF, which is a highly efficient and low-cost TEE-based virtual remote attestation scheme for VNFs. The scheme we proposed ensures the security and effectiveness of the virtual remote attestation process by leveraging TEE. Furthermore, we introduces a novel local attestation mechanism, which not only reduces the overall overhead of the virtual remote attestation process but also shortens the attestation interval to mitigate Time-Of-Check-Time-Of-Use attacks, thereby enhancing overall security. We conduct experiments to validate the overhead of the TVRAVNF scheme and compare its performance with that of a typical remote attestation process within a maximum unattested time interval. The experimental results demonstrate that, by employing the local attestation mechanism, our solution achieves nearly an 80% significant performance improvement with a relatively small time overhead for small to medium-sized files. This further substantiates the significant advantages of our approach in both security and efficiency.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient post-quantum secure deterministic wallet scheme 高效的后量子安全确定性钱包方案
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1186/s42400-024-00216-w
Mingxing Hu, Zhen Liu, Yunhong Zhou

Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and crypto wallets have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrency funds. Deterministic wallets are proposed as an advanced wallet mechanism to provide benefits such as low-maintenance, easy backup and recovery, and support for functionalities required by cryptocurrencies. Alkeilani Alkadri et al. (ACM CCS’20) presented the first post-quantum secure deterministic wallet scheme, but it exhibits a gap to bridge before achieving practical applicability, as reflected in both their concrete parameters size and computational efficiency. In this paper, we propose an efficient post-quantum secure deterministic wallet scheme. In particular, we present a new construction method for deterministic wallets, prove the security in the quantum random oracle model, and provide an efficient instantiation. The comparison result, with the work of Alkeilani Alkadri et al. (ACM CCS’20), shows our work has a comprehensive improvement on efficiency, e.g., the pk size is (approx 40.7) times shorter, sk is (approx 9.2) times shorter, and the signing time is (approx 3.1) times faster.

自比特币问世以来,加密货币大受欢迎,加密钱包已发展成为保护和管理加密密钥以获取加密货币资金的主要工具。确定性钱包是一种先进的钱包机制,具有维护成本低、易于备份和恢复、支持加密货币所需的功能等优点。Alkeilani Alkadri 等人(ACM CCS'20)提出了首个后量子安全确定性钱包方案,但该方案在实现实际应用之前仍有差距,具体体现在其具体参数大小和计算效率上。本文提出了一种高效的后量子安全确定性钱包方案。其中,我们提出了一种新的确定性钱包构造方法,证明了量子随机甲骨文模型的安全性,并提供了一种高效的实例化方法。与 Alkeilani Alkadri 等人的工作(ACM CCS'20)的对比结果表明,我们的工作在效率上有了全面的提升,例如,pk 大小缩短了大约 40.7 倍,sk 缩短了大约 9.2 倍,签名时间快了大约 3.1 倍。
{"title":"Efficient post-quantum secure deterministic wallet scheme","authors":"Mingxing Hu, Zhen Liu, Yunhong Zhou","doi":"10.1186/s42400-024-00216-w","DOIUrl":"https://doi.org/10.1186/s42400-024-00216-w","url":null,"abstract":"<p>Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and <i>crypto wallets</i> have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrency funds. <i>Deterministic wallets</i> are proposed as an advanced wallet mechanism to provide benefits such as low-maintenance, easy backup and recovery, and support for functionalities required by cryptocurrencies. Alkeilani Alkadri et al. (ACM CCS’20) presented the first post-quantum secure deterministic wallet scheme, but it exhibits a gap to bridge before achieving practical applicability, as reflected in both their concrete parameters size and computational efficiency. In this paper, we propose an efficient post-quantum secure deterministic wallet scheme. In particular, we present a new construction method for deterministic wallets, prove the security in the quantum random oracle model, and provide an efficient instantiation. The comparison result, with the work of Alkeilani Alkadri et al. (ACM CCS’20), shows our work has a comprehensive improvement on efficiency, e.g., the <i>pk</i> size is <span>(approx 40.7)</span> times shorter, <i>sk</i> is <span>(approx 9.2)</span> times shorter, and the signing time is <span>(approx 3.1)</span> times faster.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of DDoS attack traffic on SDN network environment using deep learning 利用深度学习对 SDN 网络环境中的 DDoS 攻击流量进行分类
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-02 DOI: 10.1186/s42400-024-00219-7
Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh

Distributed Denial of Service (DDoS) attack is a major threat to the Internet of Things (IoT), Software Defined Networks (SDN), and Cloud Computing Networks. Due to the tremendous applications of IoT networks, the number of DDoS attacks is increasing significantly, and most sophisticated DDoS attacks are generated through IoT botnets. An IoT botnet-based DDoS attack can disrupt the network quickly with a surge of malicious traffic. Especially in an SDN network, it is important to detect the DDoS attack before it occurs to the SDN controller. DDoS attacks on the centralized controller of the SDN can disrupt the whole network. So, identifying DDoS attacks at the earliest is a critical security measure for network experts and practitioners. In this paper, we analyze the DDoS attack on an SDN environment and develop a method to identify the DDoS attack using Deep Learning (DL). The proposed method converts the captured raw network traffic to image data and classifies the malicious data from normal data. The method is evaluated on our test-bed simulated dataset and two other benchmark datasets. The experimental comparison shows that the proposed method performs better on all three datasets, giving more than 99% classification accuracy.

分布式拒绝服务(DDoS)攻击是物联网(IoT)、软件定义网络(SDN)和云计算网络面临的主要威胁。由于物联网网络的巨大应用,DDoS 攻击的数量正在显著增加,而大多数复杂的 DDoS 攻击都是通过物联网僵尸网络产生的。基于物联网僵尸网络的 DDoS 攻击可以通过激增的恶意流量迅速破坏网络。特别是在 SDN 网络中,在 SDN 控制器受到 DDoS 攻击之前检测到这种攻击非常重要。对 SDN 集中控制器的 DDoS 攻击会破坏整个网络。因此,对于网络专家和从业人员来说,尽早识别 DDoS 攻击是一项至关重要的安全措施。本文分析了 SDN 环境中的 DDoS 攻击,并开发了一种利用深度学习(DL)识别 DDoS 攻击的方法。所提出的方法将捕获的原始网络流量转换为图像数据,并从正常数据中对恶意数据进行分类。该方法在我们的测试平台模拟数据集和其他两个基准数据集上进行了评估。实验比较表明,所提出的方法在所有三个数据集上都表现较好,分类准确率超过 99%。
{"title":"Classification of DDoS attack traffic on SDN network environment using deep learning","authors":"Urikhimbam Boby Clinton, Nazrul Hoque, Khumukcham Robindro Singh","doi":"10.1186/s42400-024-00219-7","DOIUrl":"https://doi.org/10.1186/s42400-024-00219-7","url":null,"abstract":"<p>Distributed Denial of Service (DDoS) attack is a major threat to the Internet of Things (IoT), Software Defined Networks (SDN), and Cloud Computing Networks. Due to the tremendous applications of IoT networks, the number of DDoS attacks is increasing significantly, and most sophisticated DDoS attacks are generated through IoT botnets. An IoT botnet-based DDoS attack can disrupt the network quickly with a surge of malicious traffic. Especially in an SDN network, it is important to detect the DDoS attack before it occurs to the SDN controller. DDoS attacks on the centralized controller of the SDN can disrupt the whole network. So, identifying DDoS attacks at the earliest is a critical security measure for network experts and practitioners. In this paper, we analyze the DDoS attack on an SDN environment and develop a method to identify the DDoS attack using Deep Learning (DL). The proposed method converts the captured raw network traffic to image data and classifies the malicious data from normal data. The method is evaluated on our test-bed simulated dataset and two other benchmark datasets. The experimental comparison shows that the proposed method performs better on all three datasets, giving more than 99% classification accuracy.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141887008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting frequency-smoothing encryption: new security definitions and efficient construction 重温频率平滑加密:新的安全定义和高效构造
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1186/s42400-024-00208-w
Haobin Chen, Yue Yang, Siyi Lv

Deterministic encryption (DET) allows for fast retrieval of encrypted information, but it would cause significant leakage of frequency information of the underlying data, which results in an array of inference attacks. Simply replacing DET with fully randomized encryption is often undesirable in the scenario of an encrypted database since it incurs a large overhead in query and storage. Frequency Smoothing Encryption (FSE) is a practical encryption scheme to protect frequency information. Current FSE constructions still fall short of efficiency and a reasonable security definition. We revisit FSE and propose two security definitions from both theoretical and practical perspectives. Furthermore, we adopt a novel partitioning strategy to construct a new FSE scheme to improve performance. Experimental results show that compared with others, our scheme achieves excellent query performance while attaining security against inference attacks.

确定性加密(DET)可以快速检索加密信息,但会导致底层数据的频率信息严重泄漏,从而引发一系列推理攻击。在加密数据库中,简单地用完全随机加密取代 DET 通常是不可取的,因为这会在查询和存储方面产生很大的开销。频率平滑加密(FSE)是一种保护频率信息的实用加密方案。目前的 FSE 结构仍然缺乏效率和合理的安全定义。我们重新审视了 FSE,并从理论和实践两个角度提出了两个安全定义。此外,我们还采用了一种新颖的分区策略来构建新的 FSE 方案,以提高性能。实验结果表明,与其他方案相比,我们的方案在获得出色的查询性能的同时,还实现了抵御推理攻击的安全性。
{"title":"Revisiting frequency-smoothing encryption: new security definitions and efficient construction","authors":"Haobin Chen, Yue Yang, Siyi Lv","doi":"10.1186/s42400-024-00208-w","DOIUrl":"https://doi.org/10.1186/s42400-024-00208-w","url":null,"abstract":"<p>Deterministic encryption (DET) allows for fast retrieval of encrypted information, but it would cause significant leakage of frequency information of the underlying data, which results in an array of inference attacks. Simply replacing DET with fully randomized encryption is often undesirable in the scenario of an encrypted database since it incurs a large overhead in query and storage. Frequency Smoothing Encryption (FSE) is a practical encryption scheme to protect frequency information. Current FSE constructions still fall short of efficiency and a reasonable security definition. We revisit FSE and propose two security definitions from both theoretical and practical perspectives. Furthermore, we adopt a novel partitioning strategy to construct a new FSE scheme to improve performance. Experimental results show that compared with others, our scheme achieves excellent query performance while attaining security against inference attacks.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks GLDOC:利用图卷积网络检测隐含恶意的 MS-Office 文档
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1186/s42400-024-00243-7
Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang

Nowadays, the malicious MS-Office document has already become one of the most effective attacking vectors in APT attacks. Though many protection mechanisms are provided, they have been proved easy to bypass, and the existed detection methods show poor performance when facing malicious documents with unknown vulnerabilities or with few malicious behaviors. In this paper, we first introduce the definition of im-documents, to describe those vulnerable documents which show implicitly malicious behaviors and escape most of public antivirus engines. Then we present GLDOC—a GCN based framework that is aimed at effectively detecting im-documents with dynamic analysis, and improving the possible blind spots of past detection methods. Besides the system call which is the only focus in most researches, we capture all dynamic behaviors in sandbox, take the process tree into consideration and reconstruct both of them into graphs. Using each line to learn each graph, GLDOC trains a 2-channel network as well as a classifier to formulate the malicious document detection problem into a graph learning and classification problem. Experiments show that GLDOC has a comprehensive balance of accuracy rate and false alarm rate − 95.33% and 4.33% respectively, outperforming other detection methods. When further testing in a simulated 5-day attacking scenario, our proposed framework still maintains a stable and high detection accuracy on the unknown vulnerabilities.

如今,恶意 MS-Office 文档已成为 APT 攻击中最有效的攻击载体之一。尽管提供了许多保护机制,但事实证明这些机制很容易被绕过,而且现有的检测方法在面对漏洞未知或恶意行为较少的恶意文档时表现不佳。在本文中,我们首先介绍了 "im-documents "的定义,以描述那些隐含恶意行为并能躲过大多数公共杀毒引擎的易受攻击文档。然后,我们介绍了 GLDOC--一个基于 GCN 的框架,旨在通过动态分析有效检测 im-文档,并改善以往检测方法可能存在的盲点。除了大多数研究中唯一关注的系统调用外,我们还捕获了沙箱中的所有动态行为,并将进程树考虑在内,将二者重构为图。GLDOC 利用每一行来学习每一个图,训练双通道网络和分类器,从而将恶意文档检测问题表述为一个图学习和分类问题。实验表明,GLDOC 在准确率和误报率方面取得了全面的平衡--准确率和误报率分别为 95.33% 和 4.33%,优于其他检测方法。当进一步在模拟的 5 天攻击场景中进行测试时,我们提出的框架对未知漏洞仍能保持稳定和较高的检测准确率。
{"title":"GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks","authors":"Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang","doi":"10.1186/s42400-024-00243-7","DOIUrl":"https://doi.org/10.1186/s42400-024-00243-7","url":null,"abstract":"<p>Nowadays, the malicious MS-Office document has already become one of the most effective attacking vectors in APT attacks. Though many protection mechanisms are provided, they have been proved easy to bypass, and the existed detection methods show poor performance when facing malicious documents with unknown vulnerabilities or with few malicious behaviors. In this paper, we first introduce the definition of im-documents, to describe those vulnerable documents which show implicitly malicious behaviors and escape most of public antivirus engines. Then we present GLDOC—a GCN based framework that is aimed at effectively detecting im-documents with dynamic analysis, and improving the possible blind spots of past detection methods. Besides the system call which is the only focus in most researches, we capture all dynamic behaviors in sandbox, take the process tree into consideration and reconstruct both of them into graphs. Using each line to learn each graph, GLDOC trains a 2-channel network as well as a classifier to formulate the malicious document detection problem into a graph learning and classification problem. Experiments show that GLDOC has a comprehensive balance of accuracy rate and false alarm rate − 95.33% and 4.33% respectively, outperforming other detection methods. When further testing in a simulated 5-day attacking scenario, our proposed framework still maintains a stable and high detection accuracy on the unknown vulnerabilities.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141782356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revealing the exploitability of heap overflow through PoC analysis 通过 PoC 分析揭示堆溢出的可利用性
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1186/s42400-024-00244-6
Qintao Shen, Guozhu Meng, Kai Chen

The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications. Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts. However, the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability, as it is uncertain whether the attacker can control the data covered by the overflow. In this paper, we propose the Heap Overflow Exploitability Evaluator (Hoee), a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts (PoCs) generated by fuzzers. Hoee leverages several techniques to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner. The overflow context is carefully analyzed to determine whether the sensitive pointer is corrupted, tainted, or critically used. We evaluate Hoee on 34 real-world CVE vulnerabilities from 16 general-purpose programs. The results demonstrate that Hoee accurately identifies the key factors for developing exploits in vulnerable contexts and correctly recognizes the behavior of overflow.

可利用的堆布局用于确定通用应用程序中堆漏洞的可利用性。先前的研究侧重于使用基于模糊的方法生成更多可利用的堆布局。然而,可利用的堆布局并不能完全证明漏洞的可利用性,因为攻击者能否控制溢出所覆盖的数据并不确定。在本文中,我们提出了堆溢出可利用性评估器(Hoee),这是一种通过评估模糊器生成的概念验证(PoC)来自动揭示堆缓冲区溢出漏洞可利用性的新方法。Hoee 利用多种技术收集运行时的动态信息,并以细粒度方式恢复堆对象布局。我们仔细分析了溢出上下文,以确定敏感指针是否已损坏、被污染或被严重使用。我们利用 16 个通用程序中的 34 个真实 CVE 漏洞对 Hoee 进行了评估。结果表明,Hoee 能准确识别在漏洞上下文中开发漏洞的关键因素,并能正确识别溢出行为。
{"title":"Revealing the exploitability of heap overflow through PoC analysis","authors":"Qintao Shen, Guozhu Meng, Kai Chen","doi":"10.1186/s42400-024-00244-6","DOIUrl":"https://doi.org/10.1186/s42400-024-00244-6","url":null,"abstract":"<p>The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications. Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts. However, the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability, as it is uncertain whether the attacker can control the data covered by the overflow. In this paper, we propose the Heap Overflow Exploitability Evaluator (<span>Hoee</span>), a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts (PoCs) generated by fuzzers. <span>Hoee</span> leverages several techniques to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner. The overflow context is carefully analyzed to determine whether the sensitive pointer is corrupted, tainted, or critically used. We evaluate <span>Hoee</span> on 34 real-world CVE vulnerabilities from 16 general-purpose programs. The results demonstrate that <span>Hoee</span> accurately identifies the key factors for developing exploits in vulnerable contexts and correctly recognizes the behavior of overflow.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold ring signature: generic construction and logarithmic size instantiation 阈值环签名:通用构造和对数大小实例化
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-11 DOI: 10.1186/s42400-024-00233-9
Huizhuo Wang, Yang Tao, Rui Zhang

A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a limited set. The concept was further enhanced to threshold setting to distribute signing ability among several signers. Since threshold ring signature was introduced, it was a hard problem whether one can have efficient constructions for it. In this paper, we introduce a new generic construction of threshold ring signature, named GTRS, based on canonical identification of a specific form. Our signature consists of a polynomial (represented by (n - t + 1) coefficients) and a single response, resulting in significantly shorter threshold ring signatures. Instantiating the generic construction with specific DL-based components, e.g. Schnorr identification and a novel vector argument of knowledge developed in this paper, we obtain GTRS-EC, which is shorter than all existing threshold ring signatures without any trusted setup.

环形签名是普通数字签名的一种变体,它保护特定签名者的隐私,因为环形签名可以被验证,但签名者的身份只能被追踪到有限的一组。这一概念进一步增强了阈值设置,以便在多个签名者之间分配签名能力。自阈值环签名问世以来,能否对其进行有效构造一直是个难题。在本文中,我们基于特定形式的规范识别,引入了一种新的阈值环签名通用结构,命名为 GTRS。我们的签名由一个多项式(用 (n - t + 1) 系数表示)和一个响应组成,从而大大缩短了阈值环签名。将通用结构与特定的基于 DL 的组件(如本文中开发的施诺识别和知识的新颖向量论证)进行实例化,我们就得到了 GTRS-EC,它比所有现有的阈值环签名都短,而且不需要任何可信设置。
{"title":"Threshold ring signature: generic construction and logarithmic size instantiation","authors":"Huizhuo Wang, Yang Tao, Rui Zhang","doi":"10.1186/s42400-024-00233-9","DOIUrl":"https://doi.org/10.1186/s42400-024-00233-9","url":null,"abstract":"<p>A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a limited set. The concept was further enhanced to threshold setting to distribute signing ability among several signers. Since threshold ring signature was introduced, it was a hard problem whether one can have efficient constructions for it. In this paper, we introduce a new generic construction of threshold ring signature, named GTRS, based on canonical identification of a specific form. Our signature consists of a polynomial (represented by <span>(n - t + 1)</span> coefficients) and a single response, resulting in significantly shorter threshold ring signatures. Instantiating the generic construction with specific DL-based components, e.g. Schnorr identification and a novel vector argument of knowledge developed in this paper, we obtain GTRS-EC, which is shorter than all existing threshold ring signatures without any trusted setup.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141584944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption FedSHE:利用自适应分段 CKKS 同态加密技术保护隐私并提高联合学习效率
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1186/s42400-024-00232-w
Yao Pan, Zheng Chao, Wang He, Yang Jing, Li Hongjia, Wang Liming

Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its unique capability of performing operations directly on ciphertexts. However, configuring CKKS security parameters involves a trade-off between correctness, efficiency, and security. An evaluation gap exists regarding how these parameters impact computational performance. Additionally, the maximum vector length that CKKS can once encrypt, recommended by Homomorphic Encryption Standardization, is 16384, hampers its widespread adoption in FL when encrypting layers with numerous neurons. To protect gradients’ privacy in FL systems while maintaining practical performance, we comprehensively analyze the influence of security parameters such as polynomial modulus degree and coefficient modulus on homomorphic operations. Derived from our evaluation findings, we provide a method for selecting the optimal multiplication depth while meeting operational requirements. Then, we introduce an adaptive segmented encryption method tailored for CKKS, circumventing its encryption length constraint and enhancing its processing ability to encrypt neural network models. Finally, we present FedSHE, a privacy-preserving and efficient Federated learning scheme with adaptive Segmented CKKS Homomorphic Encryption. FedSHE is implemented on top of the federated averaging (FedAvg) algorithm and is available at https://github.com/yooopan/FedSHE. Our evaluation results affirm the correctness and effectiveness of our proposed method, demonstrating that FedSHE outperforms existing homomorphic encryption-based federated learning research efforts in terms of model accuracy, computational efficiency, communication cost, and security level.

在联合学习(FL)系统中,不受保护的梯度交换可能会导致与梯度泄漏相关的攻击。CKKS 是一种保护梯度的近似同态加密方案,因为它具有直接对密码文本执行操作的独特能力。然而,配置 CKKS 安全参数涉及正确性、效率和安全性之间的权衡。关于这些参数如何影响计算性能,目前还存在评估空白。此外,根据同态加密标准化的建议,CKKS 一次加密的最大向量长度为 16384,这阻碍了它在 FL 中对具有大量神经元的层进行加密时的广泛应用。为了在 FL 系统中保护梯度隐私,同时保持实用性能,我们全面分析了多项式模度和系数模等安全参数对同态运算的影响。根据评估结果,我们提供了一种在满足操作要求的同时选择最佳乘法深度的方法。然后,我们介绍了一种为 CKKS 量身定制的自适应分段加密方法,该方法规避了 CKKS 的加密长度限制,并增强了其对神经网络模型进行加密的处理能力。最后,我们介绍了 FedSHE,一种具有自适应分段 CKKS 同态加密功能的隐私保护型高效联邦学习方案。FedSHE 是在联合平均(FedAvg)算法的基础上实现的,可在 https://github.com/yooopan/FedSHE 上获取。我们的评估结果证实了我们提出的方法的正确性和有效性,表明 FedSHE 在模型准确性、计算效率、通信成本和安全等级方面都优于现有的基于同态加密的联合学习研究工作。
{"title":"FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption","authors":"Yao Pan, Zheng Chao, Wang He, Yang Jing, Li Hongjia, Wang Liming","doi":"10.1186/s42400-024-00232-w","DOIUrl":"https://doi.org/10.1186/s42400-024-00232-w","url":null,"abstract":"<p>Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its unique capability of performing operations directly on ciphertexts. However, configuring CKKS security parameters involves a trade-off between correctness, efficiency, and security. An evaluation gap exists regarding how these parameters impact computational performance. Additionally, the maximum vector length that CKKS can once encrypt, recommended by Homomorphic Encryption Standardization, is 16384, hampers its widespread adoption in FL when encrypting layers with numerous neurons. To protect gradients’ privacy in FL systems while maintaining practical performance, we comprehensively analyze the influence of security parameters such as polynomial modulus degree and coefficient modulus on homomorphic operations. Derived from our evaluation findings, we provide a method for selecting the optimal multiplication depth while meeting operational requirements. Then, we introduce an adaptive segmented encryption method tailored for CKKS, circumventing its encryption length constraint and enhancing its processing ability to encrypt neural network models. Finally, we present <i>FedSHE</i>, a privacy-preserving and efficient <i>Fed</i>erated learning scheme with adaptive <i>S</i>egmented CKKS <i>H</i>omomorphic <i>E</i>ncryption. <i>FedSHE</i> is implemented on top of the federated averaging (FedAvg) algorithm and is available at https://github.com/yooopan/FedSHE. Our evaluation results affirm the correctness and effectiveness of our proposed method, demonstrating that FedSHE outperforms existing homomorphic encryption-based federated learning research efforts in terms of model accuracy, computational efficiency, communication cost, and security level.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141552326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud 基于媒体云中可搜索加密的带访问控制的隐私保护图像检索方案
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1186/s42400-024-00213-z
Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen

With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud server to reduce the storage burden. Media images usually contain a large amount of private information. To prevent disclosure of privacy of the image owners, media images are encrypted before uploading to the server. However, this operation will greatly limit the utilization of the image for the user, such as content-based image retrieval. We propose an efficient similarity query algorithm with access control based on Bkd-tree in this paper, in which a searchable encryption scheme is designed for similarity image retrieval, and the encrypted image is used to extract image features by a pre-trained CNN model. The Bkd-tree is utilized to generate an index tree for the image features to speed up retrieval and make it faster than linear indexing. Finally, the security performances of the proposed scheme is analyzed and the performance of this scheme is evaluated by experiments. The results show that the security of the image content and image features can be ensured, and it has a shorter retrieval time and higher retrieval efficiency.

随着媒体云计算产业的普及,个人和组织将图像计算和存储外包给媒体云服务器,以减轻存储负担。媒体图像通常包含大量隐私信息。为防止泄露图像所有者的隐私,媒体图像在上传到服务器之前会进行加密。然而,这种操作会大大限制用户对图像的利用,例如基于内容的图像检索。我们在本文中提出了一种基于 Bkd-tree 的带有访问控制的高效相似性查询算法,其中为相似性图像检索设计了一种可搜索的加密方案,并利用预先训练好的 CNN 模型提取加密图像的图像特征。利用 Bkd 树为图像特征生成索引树,以加快检索速度,使其比线性索引更快。最后,分析了所提方案的安全性能,并通过实验对该方案的性能进行了评估。结果表明,该方案可以确保图像内容和图像特征的安全性,并且检索时间更短,检索效率更高。
{"title":"A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud","authors":"Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen","doi":"10.1186/s42400-024-00213-z","DOIUrl":"https://doi.org/10.1186/s42400-024-00213-z","url":null,"abstract":"<p>With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud server to reduce the storage burden. Media images usually contain a large amount of private information. To prevent disclosure of privacy of the image owners, media images are encrypted before uploading to the server. However, this operation will greatly limit the utilization of the image for the user, such as content-based image retrieval. We propose an efficient similarity query algorithm with access control based on Bkd-tree in this paper, in which a searchable encryption scheme is designed for similarity image retrieval, and the encrypted image is used to extract image features by a pre-trained CNN model. The Bkd-tree is utilized to generate an index tree for the image features to speed up retrieval and make it faster than linear indexing. Finally, the security performances of the proposed scheme is analyzed and the performance of this scheme is evaluated by experiments. The results show that the security of the image content and image features can be ensured, and it has a shorter retrieval time and higher retrieval efficiency.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141513493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved homomorphic evaluation for hash function based on TFHE 基于 TFHE 的哈希函数改进型同态评估
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1186/s42400-024-00204-0
Benqiang Wei, Xianhui Lu

Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella and Susella (in: Cryptography and coding—14th IMA international conference, IMACC 2013. Lecture notes in computer science, vol 8308. Springer, Heidelberg, pp 28–44, 2013. https://doi.org/10.1007/978-3-642-45239-0_3.) based on the BGV scheme. Unfortunately, their implementation faced significant limitations due to the exceedingly high multiplicative depth, rendering it impractical. Recently, a homomorphic implementation of SHA-256 based on the TFHE scheme (Homomorphic evaluation of SHA-256. https://github.com/zama-ai/tfhe-rs/tree/main/tfhe/examples/sha256_bool) brings it from theory to reality, however, its current efficiency remains insufficient. In this paper, we revisit the homomorphic evaluation of the SHA-256 hash function in the context of TFHE, further reducing the reliance on gate bootstrapping and enhancing evaluation latency. Specifically, we primarily utilize ternary gates to reduce the number of gate bootstrappings required for logic functions in message expansion and addition of modulo (2^{32}) in iterative compression. Furthermore, we demonstrate that our optimization techniques are applicable to the Chinese commercial cryptographic hash SM3. Finally, we give specific comparative implementations based on the TFHE-rs library. Experiments demonstrate that our optimization techniques lead to an improvement of approximately 35–50% compared with the state-of-the-art result under different cores.

哈希函数的同态评估为同态加密背景下的数据完整性验证难题提供了解决方案。最早尝试对 SHA-256 哈希函数进行同态评估的是梅拉和苏塞拉(in:密码学与编码-第 14 届 IMA 国际会议,IMACC 2013。计算机科学讲义,第 8308 卷。Springer, Heidelberg, pp 28-44, 2013. https://doi.org/10.1007/978-3-642-45239-0_3.) 基于 BGV 方案。遗憾的是,由于乘法深度过高,他们的实现面临很大的局限性,使其变得不切实际。最近,基于 TFHE 方案的 SHA-256 同态实现(Homomorphic evaluation of SHA-256. https://github.com/zama-ai/tfhe-rs/tree/main/tfhe/examples/sha256_bool)将其从理论变为现实,但其目前的效率仍然不足。在本文中,我们在 TFHE 的背景下重新审视了 SHA-256 哈希函数的同态评估,进一步减少了对门引导的依赖,并提高了评估延迟。具体来说,我们主要利用三元门来减少信息扩展中逻辑函数和迭代压缩中模数(2^{32})加法所需的门引导次数。此外,我们还证明了我们的优化技术适用于中文商业加密哈希算法 SM3。最后,我们给出了基于 TFHE-rs 库的具体比较实现。实验证明,在不同内核下,我们的优化技术比最先进的结果提高了约 35-50%。
{"title":"Improved homomorphic evaluation for hash function based on TFHE","authors":"Benqiang Wei, Xianhui Lu","doi":"10.1186/s42400-024-00204-0","DOIUrl":"https://doi.org/10.1186/s42400-024-00204-0","url":null,"abstract":"<p>Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella and Susella (in: Cryptography and coding—14th IMA international conference, IMACC 2013. Lecture notes in computer science, vol 8308. Springer, Heidelberg, pp 28–44, 2013. https://doi.org/10.1007/978-3-642-45239-0_3.) based on the BGV scheme. Unfortunately, their implementation faced significant limitations due to the exceedingly high multiplicative depth, rendering it impractical. Recently, a homomorphic implementation of SHA-256 based on the TFHE scheme (Homomorphic evaluation of SHA-256. https://github.com/zama-ai/tfhe-rs/tree/main/tfhe/examples/sha256_bool) brings it from theory to reality, however, its current efficiency remains insufficient. In this paper, we revisit the homomorphic evaluation of the SHA-256 hash function in the context of TFHE, further reducing the reliance on gate bootstrapping and enhancing evaluation latency. Specifically, we primarily utilize ternary gates to reduce the number of gate bootstrappings required for logic functions in message expansion and addition of modulo <span>(2^{32})</span> in iterative compression. Furthermore, we demonstrate that our optimization techniques are applicable to the Chinese commercial cryptographic hash SM3. Finally, we give specific comparative implementations based on the TFHE-rs library. Experiments demonstrate that our optimization techniques lead to an improvement of approximately 35–50% compared with the state-of-the-art result under different cores.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141513494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1