首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer 针对Rowhammer的加密安全和完整性
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179390
Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, D. Gruss
In this paper, we present CSI:Rowhammer, a principled hardware-software co-design Rowhammer mitigation with cryptographic security and integrity guarantees, that does not focus on any specific properties of Rowhammer. We design a new memory error detection mechanism based on a low-latency cryptographic MAC and an exception mechanism initiating a software-level correction routine. The exception handler uses a novel instruction-set extension for the error correction and resumes execution afterward. In contrast to regular ECC-DRAM that remains exploitable if more than 2 bits are flipped, CSI:Rowhammer maintains the security level of the cryptographic MAC. We evaluate CSI:Rowhammer in a gem5 proof-of-concept implementation. Under normal conditions, we see latency overheads below 0.75% and no memory overhead compared to off-the-shelf ECC-DRAM. While the average latency to correct a single bitflip is below 20 ns (compared to a range from a few nanoseconds to several milliseconds for state-of-the-art ECC memory), CSI:Rowhammer can detect any number of bitflips with overwhelming probability and correct at least 8 bitflips in practical time constraints.
在本文中,我们提出了CSI:Rowhammer,这是一种原则性的软硬件协同设计的Rowhammer缓解方案,具有加密安全性和完整性保证,不关注Rowhammer的任何特定属性。我们设计了一种新的基于低延迟加密MAC的内存错误检测机制和一种启动软件级纠正程序的异常机制。异常处理程序使用新的指令集扩展进行错误纠正,然后恢复执行。与常规的ECC-DRAM相比,如果超过2位被翻转,CSI:Rowhammer仍可被利用,CSI:Rowhammer保持加密MAC的安全级别。我们在gem5概念验证实现中评估CSI:Rowhammer。在正常情况下,我们看到延迟开销低于0.75%,并且与现成的ECC-DRAM相比没有内存开销。虽然纠正单个位翻转的平均延迟低于20 ns(相比之下,最先进的ECC内存的范围从几纳秒到几毫秒),但CSI:Rowhammer可以以压倒性的概率检测任意数量的位翻转,并在实际时间限制内纠正至少8位翻转。
{"title":"CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer","authors":"Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, D. Gruss","doi":"10.1109/SP46215.2023.10179390","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179390","url":null,"abstract":"In this paper, we present CSI:Rowhammer, a principled hardware-software co-design Rowhammer mitigation with cryptographic security and integrity guarantees, that does not focus on any specific properties of Rowhammer. We design a new memory error detection mechanism based on a low-latency cryptographic MAC and an exception mechanism initiating a software-level correction routine. The exception handler uses a novel instruction-set extension for the error correction and resumes execution afterward. In contrast to regular ECC-DRAM that remains exploitable if more than 2 bits are flipped, CSI:Rowhammer maintains the security level of the cryptographic MAC. We evaluate CSI:Rowhammer in a gem5 proof-of-concept implementation. Under normal conditions, we see latency overheads below 0.75% and no memory overhead compared to off-the-shelf ECC-DRAM. While the average latency to correct a single bitflip is below 20 ns (compared to a range from a few nanoseconds to several milliseconds for state-of-the-art ECC memory), CSI:Rowhammer can detect any number of bitflips with overwhelming probability and correct at least 8 bitflips in practical time constraints.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SoK: Cryptographic Neural-Network Computation 加密神经网络计算
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179483
Lucien K. L. Ng, Sherman S. M. Chow
We studied 53 privacy-preserving neural-network papers in 2016-2022 based on cryptography (without trusted processors or differential privacy), 16 of which only use homomorphic encryption, 19 use secure computation for inference, and 18 use non-colluding servers (among which 12 support training), solving a wide variety of research problems. We dissect their cryptographic techniques and "love-hate relationships" with machine learning alongside a genealogy highlighting noteworthy developments. We also re-evaluate the state of the art under WAN. We hope this can serve as a go-to guide connecting different experts in related fields.
我们研究了2016-2022年基于密码学(无可信处理器或差分隐私)的53篇保护隐私的神经网络论文,其中16篇仅使用同态加密,19篇使用安全计算进行推理,18篇使用非串通服务器(其中12篇支持训练),解决了各种各样的研究问题。我们剖析了他们的加密技术和机器学习的“爱恨关系”,并列出了值得注意的发展。我们还重新评估了WAN下的技术状况。我们希望这能成为连接相关领域不同专家的首选指南。
{"title":"SoK: Cryptographic Neural-Network Computation","authors":"Lucien K. L. Ng, Sherman S. M. Chow","doi":"10.1109/SP46215.2023.10179483","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179483","url":null,"abstract":"We studied 53 privacy-preserving neural-network papers in 2016-2022 based on cryptography (without trusted processors or differential privacy), 16 of which only use homomorphic encryption, 19 use secure computation for inference, and 18 use non-colluding servers (among which 12 support training), solving a wide variety of research problems. We dissect their cryptographic techniques and \"love-hate relationships\" with machine learning alongside a genealogy highlighting noteworthy developments. We also re-evaluate the state of the art under WAN. We hope this can serve as a go-to guide connecting different experts in related fields.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation 基于原则性漏洞建模和漏洞生成的有效ReDoS检测
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179328
Xinyi Wang, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Y. Liu, Wei Huo
Regular expression Denial-of-Service (ReDoS) is one kind of algorithmic complexity attack. For a vulnerable regex, attackers can craft certain strings to trigger the super-linear worst-case matching time, which causes denial-of-service to regex engines. Various ReDoS detection approaches have been proposed recently. Among them, hybrid approaches which absorb the advantages of both static and dynamic approaches have shown their performance superiority. However, two key challenges still hinder the effectiveness of the detection: 1) Existing modelings summarize localized vulnerability patterns based on partial features of the vulnerable regex; 2) Existing attack string generation strategies are ineffective since they neglected the fact that non-vulnerable parts of the regex may unexpectedly invalidate the attack string (we name this kind of invalidation as disturbance.)Rengar is our hybrid ReDoS detector with new vulnerability modeling and disturbance free attack string generator. It has the following key features: 1) Benefited by summarizing patterns from full features of the vulnerable regex, its modeling is a more precise interpretation of the root cause of ReDoS vulnerability. The modeling is more descriptive and precise than the union of existing modelings while keeping conciseness; 2) For each vulnerable regex, its generator automatically checks all potential disturbances and composes generation constraints to avoid possible disturbances.Compared with nine state-of-the-art tools, Rengar detects not only all vulnerable regexes they found but also 3 – 197 times more vulnerable regexes. Besides, it saves 57.41% – 99.83% average detection time compared with tools containing a dynamic validation process. Using Rengar, we have identified 69 zero-day vulnerabilities (21 CVEs) affecting popular projects which have more than dozens of millions weekly download count.
正则表达式拒绝服务(ReDoS)是一种算法复杂度攻击。对于易受攻击的正则表达式,攻击者可以制作某些字符串来触发超线性最坏情况匹配时间,从而导致对正则表达式引擎的拒绝服务。最近提出了各种ReDoS检测方法。其中,混合方法吸收了静态方法和动态方法的优点,表现出了性能上的优越性。然而,两个关键的挑战仍然阻碍了检测的有效性:1)现有的建模基于脆弱正则表达式的部分特征总结了局部的漏洞模式;2)现有的攻击字符串生成策略是无效的,因为它们忽略了一个事实,即正则表达式的非脆弱部分可能会意外地使攻击字符串失效(我们将这种失效称为干扰)。Rengar是我们的混合ReDoS检测器,具有新的漏洞建模和无干扰攻击字符串生成器。它具有以下关键特性:1)得益于从易受攻击的正则表达式的完整特征中总结模式,它的建模更精确地解释了ReDoS漏洞的根本原因。该模型在保持简洁性的同时,比现有模型的合并更具描述性和精确性;2)对于每个脆弱的正则表达式,其生成器自动检查所有潜在的干扰,并组成生成约束以避免可能的干扰。与九种最先进的工具相比,Rengar不仅可以检测到他们发现的所有易受攻击的正则表达式,而且还可以检测到3 - 197倍的易受攻击的正则表达式。此外,与包含动态验证过程的工具相比,它可以节省57.41% - 99.83%的平均检测时间。使用Rengar,我们已经确定了69个零日漏洞(21个cve),这些漏洞影响了每周下载量超过数千万的热门项目。
{"title":"Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation","authors":"Xinyi Wang, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Y. Liu, Wei Huo","doi":"10.1109/SP46215.2023.10179328","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179328","url":null,"abstract":"Regular expression Denial-of-Service (ReDoS) is one kind of algorithmic complexity attack. For a vulnerable regex, attackers can craft certain strings to trigger the super-linear worst-case matching time, which causes denial-of-service to regex engines. Various ReDoS detection approaches have been proposed recently. Among them, hybrid approaches which absorb the advantages of both static and dynamic approaches have shown their performance superiority. However, two key challenges still hinder the effectiveness of the detection: 1) Existing modelings summarize localized vulnerability patterns based on partial features of the vulnerable regex; 2) Existing attack string generation strategies are ineffective since they neglected the fact that non-vulnerable parts of the regex may unexpectedly invalidate the attack string (we name this kind of invalidation as disturbance.)Rengar is our hybrid ReDoS detector with new vulnerability modeling and disturbance free attack string generator. It has the following key features: 1) Benefited by summarizing patterns from full features of the vulnerable regex, its modeling is a more precise interpretation of the root cause of ReDoS vulnerability. The modeling is more descriptive and precise than the union of existing modelings while keeping conciseness; 2) For each vulnerable regex, its generator automatically checks all potential disturbances and composes generation constraints to avoid possible disturbances.Compared with nine state-of-the-art tools, Rengar detects not only all vulnerable regexes they found but also 3 – 197 times more vulnerable regexes. Besides, it saves 57.41% – 99.83% average detection time compared with tools containing a dynamic validation process. Using Rengar, we have identified 69 zero-day vulnerabilities (21 CVEs) affecting popular projects which have more than dozens of millions weekly download count.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning 3DFed:联邦学习中隐蔽后门攻击的自适应可扩展框架
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179401
Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi
Federated Learning (FL), the de-facto distributed machine learning paradigm that locally trains datasets at individual devices, is vulnerable to backdoor model poisoning attacks. By compromising or impersonating those devices, an attacker can upload crafted malicious model updates to manipulate the global model with backdoor behavior upon attacker-specified triggers. However, existing backdoor attacks require more information on the victim FL system beyond a practical black-box setting. Furthermore, they are often specialized to optimize for a single objective, which becomes ineffective as modern FL systems tend to adopt in-depth defense that detects backdoor models from different perspectives. Motivated by these concerns, in this paper, we propose 3DFed, an adaptive, extensible, and multi-layered framework to launch covert FL backdoor attacks in a black-box setting. 3DFed sports three evasion modules that camouflage backdoor models: backdoor training with constrained loss, noise mask, and decoy model. By implanting indicators into a backdoor model, 3DFed can obtain the attack feedback in the previous epoch from the global model and dynamically adjust the hyper-parameters of these backdoor evasion modules. Through extensive experimental results, we show that when all its components work together, 3DFed can evade the detection of all state-of-the-art FL backdoor defenses, including Deepsight, Foolsgold, FLAME, FL-Detector, and RFLBAT. New evasion modules can also be incorporated in 3DFed in the future as it is an extensible framework.
联邦学习(FL)是一种事实上的分布式机器学习范式,它在单个设备上本地训练数据集,很容易受到后门模型中毒攻击。通过破坏或模拟这些设备,攻击者可以上传精心制作的恶意模型更新,以便在攻击者指定的触发器上使用后门行为操纵全局模型。然而,现有的后门攻击需要更多关于受害者FL系统的信息,而不仅仅是一个实际的黑盒设置。此外,它们通常专门针对单个目标进行优化,这变得无效,因为现代FL系统倾向于采用深度防御,从不同的角度检测后门模型。出于这些考虑,在本文中,我们提出了3DFed,这是一个自适应的,可扩展的多层框架,用于在黑盒设置中发起隐蔽的FL后门攻击。3DFed运动了三个伪装后门模型的逃避模块:带约束损失的后门训练、噪声掩模和诱饵模型。通过在后门模型中植入指标,3DFed可以从全局模型中获得前一时期的攻击反馈,并动态调整这些后门规避模块的超参数。通过广泛的实验结果,我们表明,当所有组件协同工作时,3DFed可以逃避所有最先进的FL后门防御的检测,包括Deepsight, Foolsgold, FLAME, FL- detector和RFLBAT。由于3DFed是一个可扩展的框架,未来还可以将新的规避模块纳入3DFed。
{"title":"3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning","authors":"Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi","doi":"10.1109/SP46215.2023.10179401","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179401","url":null,"abstract":"Federated Learning (FL), the de-facto distributed machine learning paradigm that locally trains datasets at individual devices, is vulnerable to backdoor model poisoning attacks. By compromising or impersonating those devices, an attacker can upload crafted malicious model updates to manipulate the global model with backdoor behavior upon attacker-specified triggers. However, existing backdoor attacks require more information on the victim FL system beyond a practical black-box setting. Furthermore, they are often specialized to optimize for a single objective, which becomes ineffective as modern FL systems tend to adopt in-depth defense that detects backdoor models from different perspectives. Motivated by these concerns, in this paper, we propose 3DFed, an adaptive, extensible, and multi-layered framework to launch covert FL backdoor attacks in a black-box setting. 3DFed sports three evasion modules that camouflage backdoor models: backdoor training with constrained loss, noise mask, and decoy model. By implanting indicators into a backdoor model, 3DFed can obtain the attack feedback in the previous epoch from the global model and dynamically adjust the hyper-parameters of these backdoor evasion modules. Through extensive experimental results, we show that when all its components work together, 3DFed can evade the detection of all state-of-the-art FL backdoor defenses, including Deepsight, Foolsgold, FLAME, FL-Detector, and RFLBAT. New evasion modules can also be incorporated in 3DFed in the future as it is an extensible framework.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale 超越网络钓鱼:大规模检测欺诈电子商务网站
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179461
Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuo Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé
Despite recent advancements in malicious website detection and phishing mitigation, the security ecosystem has paid little attention to Fraudulent e-Commerce Websites (FCWs), such as fraudulent shopping websites, fake charities, and cryptocurrency scam websites. Even worse, there are no active large-scale mitigation systems or publicly available datasets for FCWs.In this paper, we first propose an efficient and automated approach to gather FCWs through crowdsourcing. We identify eight different types of non-phishing FCWs and derive key defining characteristics. Then, we find that anti-phishing mitigation systems, such as Google Safe Browsing, have a detection rate of just 0.46% on our dataset. We create a classifier, BEYOND PHISH, to identify FCWs using manually defined features based on our analysis. Validating BEYOND PHISH on never-before-seen (untrained and untested data) through a user study indicates that our system has a high detection rate and a low false positive rate of 98.34% and 1.34%, respectively. Lastly, we collaborated with a major Internet security company, Palo Alto Networks, as well as a major financial services provider, to evaluate our classifier on manually labeled real-world data. The model achieves a false positive rate of 2.46% and a 94.88% detection rate, showing potential for real-world defense against FCWs.
尽管最近在恶意网站检测和网络钓鱼缓解方面取得了进展,但安全生态系统很少关注欺诈性电子商务网站(FCWs),例如欺诈性购物网站、虚假慈善机构和加密货币诈骗网站。更糟糕的是,没有有效的大规模缓解系统或可公开获取的FCWs数据集。在本文中,我们首先提出了一种高效、自动化的方法,通过众包来收集FCWs。我们确定了八种不同类型的非网络钓鱼fcw,并得出了关键的定义特征。然后,我们发现反网络钓鱼缓解系统,如谷歌安全浏览,在我们的数据集上的检测率仅为0.46%。我们创建了一个分类器BEYOND PHISH,根据我们的分析使用手动定义的特征来识别fcw。通过用户研究,在从未见过的(未经训练和测试的)数据上验证BEYOND PHISH,表明我们的系统具有高检测率和低假阳性率,分别为98.34%和1.34%。最后,我们与一家主要的互联网安全公司Palo Alto Networks以及一家主要的金融服务提供商合作,在人工标记的真实世界数据上评估我们的分类器。该模型的误报率为2.46%,检测率为94.88%,显示了在现实世界中防御FCWs的潜力。
{"title":"Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale","authors":"Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuo Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé","doi":"10.1109/SP46215.2023.10179461","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179461","url":null,"abstract":"Despite recent advancements in malicious website detection and phishing mitigation, the security ecosystem has paid little attention to Fraudulent e-Commerce Websites (FCWs), such as fraudulent shopping websites, fake charities, and cryptocurrency scam websites. Even worse, there are no active large-scale mitigation systems or publicly available datasets for FCWs.In this paper, we first propose an efficient and automated approach to gather FCWs through crowdsourcing. We identify eight different types of non-phishing FCWs and derive key defining characteristics. Then, we find that anti-phishing mitigation systems, such as Google Safe Browsing, have a detection rate of just 0.46% on our dataset. We create a classifier, BEYOND PHISH, to identify FCWs using manually defined features based on our analysis. Validating BEYOND PHISH on never-before-seen (untrained and untested data) through a user study indicates that our system has a high detection rate and a low false positive rate of 98.34% and 1.34%, respectively. Lastly, we collaborated with a major Internet security company, Palo Alto Networks, as well as a major financial services provider, to evaluate our classifier on manually labeled real-world data. The model achieves a false positive rate of 2.46% and a 94.88% detection rate, showing potential for real-world defense against FCWs.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Continuous Intrusion: Characterizing the Security of Continuous Integration Services 持续入侵:持续集成服务的安全性特征
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179471
Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao
Continuous Integration (CI) is a widely-adopted software development practice for automated code integration. A typical CI workflow involves multiple independent stakeholders, including code hosting platforms (CHPs), CI platforms (CPs), and third party services. While CI can significantly improve development efficiency, unfortunately, it also exposes new attack surfaces. As the code executed by a CI task may come from a less-trusted user, improperly configured CI with weak isolation mechanisms might enable attackers to inject malicious code into victim software by triggering a CI task. Also, one insecure stakeholder can potentially affect the whole process. In this paper, we systematically study potential security threats in CI workflows with multiple stakeholders and major CP components considered. We design and develop an analysis tool, CInspector, to investigate potential vulnerabilities in seven popular CPs, when integrated with three mainstream CHPs. We find that all CPs have the risk of token leakage caused by improper resource sharing and isolation, and many of them utilize over-privileged tokens with improper validity periods. We further reveal four novel attack vectors that allow attackers to escalate their privileges and stealthy inject malicious code by executing a piece of code in a CI task. To understand the potential impact, we conduct a large-scale measurement on the three mainstream CHPs, scrutinizing over 1.69 million repositories. Our quantitative analysis demonstrates that some very popular repositories and large organizations are affected by these attacks. We have duly reported the identified vulnerabilities to CPs and received positive responses.
持续集成(CI)是一种被广泛采用的用于自动代码集成的软件开发实践。典型的CI工作流涉及多个独立的涉众,包括代码托管平台(CHPs)、CI平台(CPs)和第三方服务。虽然CI可以显著提高开发效率,但不幸的是,它也暴露了新的攻击面。由于CI任务执行的代码可能来自不太受信任的用户,不正确配置的具有弱隔离机制的CI可能使攻击者能够通过触发CI任务将恶意代码注入受害软件。此外,一个不安全的涉众可能会影响整个过程。在本文中,我们系统地研究了CI工作流中潜在的安全威胁,并考虑了多个利益相关者和主要CP组件。我们设计并开发了一个分析工具,CInspector,当与三个主流CHPs集成时,可以调查七个流行CPs的潜在漏洞。我们发现,所有CPs都存在因资源共享和隔离不当而导致令牌泄漏的风险,其中许多CPs使用了有效期不当的过度特权令牌。我们进一步揭示了四种新的攻击向量,这些攻击向量允许攻击者通过在CI任务中执行一段代码来升级他们的权限并偷偷地注入恶意代码。为了了解潜在的影响,我们对三个主流卫生保健中心进行了大规模的测量,审查了超过169万个存储库。我们的定量分析表明,一些非常流行的存储库和大型组织受到这些攻击的影响。我们已及时向CPs报告已发现的漏洞,并得到积极回应。
{"title":"Continuous Intrusion: Characterizing the Security of Continuous Integration Services","authors":"Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao","doi":"10.1109/SP46215.2023.10179471","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179471","url":null,"abstract":"Continuous Integration (CI) is a widely-adopted software development practice for automated code integration. A typical CI workflow involves multiple independent stakeholders, including code hosting platforms (CHPs), CI platforms (CPs), and third party services. While CI can significantly improve development efficiency, unfortunately, it also exposes new attack surfaces. As the code executed by a CI task may come from a less-trusted user, improperly configured CI with weak isolation mechanisms might enable attackers to inject malicious code into victim software by triggering a CI task. Also, one insecure stakeholder can potentially affect the whole process. In this paper, we systematically study potential security threats in CI workflows with multiple stakeholders and major CP components considered. We design and develop an analysis tool, CInspector, to investigate potential vulnerabilities in seven popular CPs, when integrated with three mainstream CHPs. We find that all CPs have the risk of token leakage caused by improper resource sharing and isolation, and many of them utilize over-privileged tokens with improper validity periods. We further reveal four novel attack vectors that allow attackers to escalate their privileges and stealthy inject malicious code by executing a piece of code in a CI task. To understand the potential impact, we conduct a large-scale measurement on the three mainstream CHPs, scrutinizing over 1.69 million repositories. Our quantitative analysis demonstrates that some very popular repositories and large organizations are affected by these attacks. We have duly reported the identified vulnerabilities to CPs and received positive responses.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array mmSpoof:利用反射阵列的汽车毫米波雷达弹性欺骗
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179371
Rohith Reddy Vennam, I. Jain, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia
FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a "reflect array" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim’s radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim’s radar using a unique frequency shift at the mmSpoof’s reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim’s radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars.
FMCW雷达是汽车驾驶中不可或缺的一部分,用于对周围物体进行强大且耐天气的感知。然而,这些雷达容易受到欺骗攻击,可能导致传感器故障并可能导致事故。由于攻击者和受害者之间需要同步,以前使用攻击者设备欺骗FMCW雷达的尝试并不十分有效。我们提出了一种新的欺骗机制,称为mmSpoof,它不需要同步,并且对受害者雷达的各种安全特性和对策具有弹性。我们的欺骗机制使用基于“反射阵列”的攻击者设备,该设备通过适当的调制反射雷达信号来欺骗受害者的雷达。利用mmSpoof反射阵列的独特频移,我们提供了灵活欺骗受害者雷达上任何距离和速度的见解和机制。我们设计了一种新的算法来估计这种频移,而不需要假设受害者雷达的先验信息。我们在现实的汽车驾驶场景中使用商用雷达展示了我们欺骗的有效性,使用紧凑的移动设置和商用现成的组件。
{"title":"mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array","authors":"Rohith Reddy Vennam, I. Jain, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia","doi":"10.1109/SP46215.2023.10179371","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179371","url":null,"abstract":"FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures of the victim radar. Our spoofing mechanism uses a \"reflect array\" based attacker device that reflects the radar signal with appropriate modulation to spoof the victim’s radar. We provide insights and mechanisms to flexibly spoof any distance and velocity on the victim’s radar using a unique frequency shift at the mmSpoof’s reflect array. We design a novel algorithm to estimate this frequency shift without assuming prior information about the victim’s radar. We show the effectiveness of our spoofing using a compact and mobile setup with commercial-off-the-shelf components in realistic automotive driving scenarios with commercial radars.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs 安全RISC:硬件RISC- v cpu的微架构攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179399
Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz
Microarchitectural attacks threaten the security of computer systems even in the absence of software vulnerabilities. Such attacks are well explored on x86 and ARM CPUs, with a wide range of proposed but not-yet deployed hardware countermeasures. With the standardization of the RISC-V instruction set architecture and the announcement of support for the architecture by major processor vendors, RISC-V CPUs are on the verge of becoming ubiquitous. However, the microarchitectural attack surface of the first commercially-available RISC-V hardware CPUs still needs to be explored.This paper analyzes the two commercially-available off-the-shelf 64-bit RISC-V (hardware) CPUs used in most RISC-V systems running a full-fledged commodity Linux system. We evaluate the microarchitectural attack surface and introduce 3 new microarchitectural attack techniques: Cache+Time, a novel cache-line-granular cache attack without shared memory, Flush+Fault exploiting the Harvard cache architecture for Flush+Reload, and CycleDrift exploiting unprivileged access to instruction-retirement information. We also show that many known attacks apply to these RISC-V CPUs, mainly due to non-existing hardware countermeasures and instruction-set subtleties that do not consider the microarchitectural attack surface. We demonstrate our attacks in 6 case studies, including the first RISC-V-specific microarchitectural KASLR break and a CycleDrift-based method for detecting kernel activity. Based on our analysis, we stress the need to consider the microarchitectural attack surface during every step of a CPU design, including custom ISA extensions.
即使在没有软件漏洞的情况下,微体系结构攻击也会威胁计算机系统的安全。这种攻击在x86和ARM cpu上进行了很好的研究,并提出了各种各样的建议但尚未部署的硬件对策。随着RISC-V指令集体系结构的标准化和主要处理器厂商对该体系结构的支持,RISC-V cpu即将普及。然而,首个商用RISC-V硬件cpu的微架构攻击面仍有待探索。本文分析了在运行成熟的商用Linux系统的大多数RISC-V系统中使用的两种商用现成的64位RISC-V(硬件)cpu。我们评估了微架构攻击面,并介绍了3种新的微架构攻击技术:Cache+Time,一种新的没有共享内存的缓存线粒度缓存攻击,Flush+Fault利用哈佛缓存架构进行Flush+Reload,以及CycleDrift利用非特权访问指令退役信息。我们还展示了许多已知的攻击适用于这些RISC-V cpu,主要是由于不存在的硬件对策和指令集的微妙之处,不考虑微架构攻击面。我们在6个案例研究中展示了我们的攻击,包括第一个特定于risc - v的微架构KASLR中断和基于cycleldrift的检测内核活动的方法。根据我们的分析,我们强调需要在CPU设计的每个步骤中考虑微体系结构攻击面,包括自定义ISA扩展。
{"title":"A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs","authors":"Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz","doi":"10.1109/SP46215.2023.10179399","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179399","url":null,"abstract":"Microarchitectural attacks threaten the security of computer systems even in the absence of software vulnerabilities. Such attacks are well explored on x86 and ARM CPUs, with a wide range of proposed but not-yet deployed hardware countermeasures. With the standardization of the RISC-V instruction set architecture and the announcement of support for the architecture by major processor vendors, RISC-V CPUs are on the verge of becoming ubiquitous. However, the microarchitectural attack surface of the first commercially-available RISC-V hardware CPUs still needs to be explored.This paper analyzes the two commercially-available off-the-shelf 64-bit RISC-V (hardware) CPUs used in most RISC-V systems running a full-fledged commodity Linux system. We evaluate the microarchitectural attack surface and introduce 3 new microarchitectural attack techniques: Cache+Time, a novel cache-line-granular cache attack without shared memory, Flush+Fault exploiting the Harvard cache architecture for Flush+Reload, and CycleDrift exploiting unprivileged access to instruction-retirement information. We also show that many known attacks apply to these RISC-V CPUs, mainly due to non-existing hardware countermeasures and instruction-set subtleties that do not consider the microarchitectural attack surface. We demonstrate our attacks in 6 case studies, including the first RISC-V-specific microarchitectural KASLR break and a CycleDrift-based method for detecting kernel activity. Based on our analysis, we stress the need to consider the microarchitectural attack surface during every step of a CPU design, including custom ISA extensions.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DBREACH: Stealing from Databases Using Compression Side Channels DBREACH:使用压缩侧通道窃取数据库
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179359
Mathew Hogan, Yan Michalevsky, Saba Eskandarian
We introduce new compression side-channel attacks against database storage engines that simultaneously support compression of database pages and encryption at rest. Given only limited, indirect access to an encrypted and compressed database table, our attacks extract arbitrary plaintext with high accuracy. We demonstrate accurate and performant attacks on the InnoDB storage engine variants found in MariaDB and MySQL as well as the WiredTiger storage engine for MongoDB.Our attacks overcome obstacles unique to the database setting that render previous techniques developed to attack TLS ineffective. Unlike the web setting, where the exact length of a compressed and encrypted message can be observed, we make use of only approximate ciphertext size information gleaned from file sizes on disk. We amplify this noisy signal and combine it with new attack heuristics tailored to the database setting to extract secret plaintext. Our attacks can detect whether a random string appears in a table with > 90% accuracy and extract 10-character random strings from encrypted tables with > 95% success.
我们针对数据库存储引擎引入了新的压缩侧信道攻击,这些攻击同时支持数据库页面压缩和静态加密。只要对加密和压缩的数据库表进行有限的间接访问,我们的攻击就可以高精度地提取任意明文。我们演示了对MariaDB和MySQL中的InnoDB存储引擎变体以及MongoDB的WiredTiger存储引擎的准确和高性能攻击。我们的攻击克服了数据库设置的独特障碍,这些障碍使得以前开发的攻击TLS的技术无效。与web设置不同,可以观察到压缩和加密消息的确切长度,我们只使用从磁盘上的文件大小收集的近似密文大小信息。我们放大这种噪声信号,并将其与针对数据库设置量身定制的新攻击启发式相结合,以提取秘密明文。我们的攻击可以检测随机字符串是否出现在表中,准确率> 90%,并且可以从加密表中提取10个字符的随机字符串,成功率> 95%。
{"title":"DBREACH: Stealing from Databases Using Compression Side Channels","authors":"Mathew Hogan, Yan Michalevsky, Saba Eskandarian","doi":"10.1109/SP46215.2023.10179359","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179359","url":null,"abstract":"We introduce new compression side-channel attacks against database storage engines that simultaneously support compression of database pages and encryption at rest. Given only limited, indirect access to an encrypted and compressed database table, our attacks extract arbitrary plaintext with high accuracy. We demonstrate accurate and performant attacks on the InnoDB storage engine variants found in MariaDB and MySQL as well as the WiredTiger storage engine for MongoDB.Our attacks overcome obstacles unique to the database setting that render previous techniques developed to attack TLS ineffective. Unlike the web setting, where the exact length of a compressed and encrypted message can be observed, we make use of only approximate ciphertext size information gleaned from file sizes on disk. We amplify this noisy signal and combine it with new attack heuristics tailored to the database setting to extract secret plaintext. Our attacks can detect whether a random string appears in a table with > 90% accuracy and extract 10-character random strings from encrypted tables with > 95% success.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data DVFS频繁泄露机密:赫茨出血攻击超越了SIKE,密码学,和cpu数据
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179326
Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, H. Shacham
The recent Hertzbleed disclosure demonstrates how remote-timing analysis can reveal secret information previously only accessible to local-power analysis. At worst, this constitutes a fundamental break in the constant-time programming principles and the many deployed programs that rely on them. But all hope is not lost. Hertzbleed relies on a coarse-grained, noisy channel that is difficult to exploit. Indeed, the Hertzbleed paper required a bespoke cryptanalysis to attack a specific cryptosystem (SIKE). Thus, it remains unclear if Hertzbleed represents a threat to the broader security ecosystem.In this paper, we demonstrate that Hertzbleed’s effects are wide ranging, not only affecting cryptosystems beyond SIKE, but also programs beyond cryptography, and even computations occurring outside the CPU cores. First, we demonstrate how latent gadgets in other cryptosystem implementations— specifically "constant-time" ECDSA and Classic McEliece— can be combined with existing cryptanalysis to bootstrap Hertzbleed attacks on those cryptosystems. Second, we demonstrate how power consumption on the integrated GPU influences frequency on the CPU—and how this can be used to perform the first cross-origin pixel stealing attacks leveraging "constant-time" SVG filters on Google Chrome.
最近的Hertzbleed揭露了远程定时分析如何能够揭示以前只有本地功率分析才能获得的秘密信息。在最坏的情况下,这将从根本上破坏恒定时间编程原则以及依赖于这些原则的许多已部署程序。但并非所有希望都破灭了。赫茨布尔依赖于难以利用的粗粒度、有噪声的信道。事实上,赫茨布莱德的论文需要一个定制的密码分析来攻击一个特定的密码系统(SIKE)。因此,目前尚不清楚Hertzbleed是否对更广泛的安全生态系统构成威胁。在本文中,我们证明了Hertzbleed的影响是广泛的,不仅影响SIKE以外的密码系统,而且影响加密之外的程序,甚至发生在CPU内核之外的计算。首先,我们展示了其他密码系统实现中的潜在小工具(特别是“恒定时间”ECDSA和经典McEliece)如何与现有的密码分析相结合,以引导对这些密码系统的赫兹出血攻击。其次,我们演示了集成GPU上的功耗如何影响cpu上的频率,以及如何利用Google Chrome上的“恒定时间”SVG过滤器来执行第一次跨原点像素窃取攻击。
{"title":"DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data","authors":"Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, H. Shacham","doi":"10.1109/SP46215.2023.10179326","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179326","url":null,"abstract":"The recent Hertzbleed disclosure demonstrates how remote-timing analysis can reveal secret information previously only accessible to local-power analysis. At worst, this constitutes a fundamental break in the constant-time programming principles and the many deployed programs that rely on them. But all hope is not lost. Hertzbleed relies on a coarse-grained, noisy channel that is difficult to exploit. Indeed, the Hertzbleed paper required a bespoke cryptanalysis to attack a specific cryptosystem (SIKE). Thus, it remains unclear if Hertzbleed represents a threat to the broader security ecosystem.In this paper, we demonstrate that Hertzbleed’s effects are wide ranging, not only affecting cryptosystems beyond SIKE, but also programs beyond cryptography, and even computations occurring outside the CPU cores. First, we demonstrate how latent gadgets in other cryptosystem implementations— specifically \"constant-time\" ECDSA and Classic McEliece— can be combined with existing cryptanalysis to bootstrap Hertzbleed attacks on those cryptosystems. Second, we demonstrate how power consumption on the integrated GPU influences frequency on the CPU—and how this can be used to perform the first cross-origin pixel stealing attacks leveraging \"constant-time\" SVG filters on Google Chrome.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134509502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1