首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering spectrum - dp:基于谱摄动和滤波的差分私有深度学习
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.00171
Ce Feng, Nuo Xu, Wujie Wen, P. Venkitasubramaniam, Caiwen Ding
Differential privacy is a widely accepted measure of privacy in the context of deep learning algorithms, and achieving it relies on a noisy training approach known as differentially private stochastic gradient descent (DP-SGD). DP-SGD requires direct noise addition to every gradient in a dense neural network, the privacy is achieved at a significant utility cost. In this work, we present Spectral-DP, a new differentially private learning approach which combines gradient perturbation in the spectral domain with spectral filtering to achieve a desired privacy guarantee with a lower noise scale and thus better utility. We develop differentially private deep learning methods based on Spectral-DP for architectures that contain both convolution and fully connected layers. In particular, for fully connected layers, we combine a block-circulant based spatial restructuring with Spectral-DP to achieve better utility. Through comprehensive experiments, we study and provide guidelines to implement Spectral-DP deep learning on benchmark datasets. In comparison with state-of-the-art DP-SGD based approaches, Spectral-DP is shown to have uniformly better utility performance in both training from scratch and transfer learning settings.
在深度学习算法中,差分隐私是一种被广泛接受的隐私度量,实现它依赖于一种称为差分私有随机梯度下降(DP-SGD)的噪声训练方法。DP-SGD需要在密集神经网络的每个梯度中直接添加噪声,以显着的效用成本实现隐私。在这项工作中,我们提出了一种新的差分私有学习方法spectrum - dp,它将谱域的梯度扰动与谱滤波相结合,以更低的噪声尺度实现所需的隐私保证,从而获得更好的效用。针对包含卷积层和全连接层的架构,我们开发了基于Spectral-DP的差分私有深度学习方法。特别是,对于完全连接的层,我们将基于块循环的空间重构与光谱- dp相结合,以获得更好的效用。通过全面的实验,我们研究并提供了在基准数据集上实现光谱- dp深度学习的指导方针。与最先进的基于DP-SGD的方法相比,spectrum - dp在从头开始训练和迁移学习设置中都具有更好的实用性能。
{"title":"Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering","authors":"Ce Feng, Nuo Xu, Wujie Wen, P. Venkitasubramaniam, Caiwen Ding","doi":"10.1109/SP46215.2023.00171","DOIUrl":"https://doi.org/10.1109/SP46215.2023.00171","url":null,"abstract":"Differential privacy is a widely accepted measure of privacy in the context of deep learning algorithms, and achieving it relies on a noisy training approach known as differentially private stochastic gradient descent (DP-SGD). DP-SGD requires direct noise addition to every gradient in a dense neural network, the privacy is achieved at a significant utility cost. In this work, we present Spectral-DP, a new differentially private learning approach which combines gradient perturbation in the spectral domain with spectral filtering to achieve a desired privacy guarantee with a lower noise scale and thus better utility. We develop differentially private deep learning methods based on Spectral-DP for architectures that contain both convolution and fully connected layers. In particular, for fully connected layers, we combine a block-circulant based spatial restructuring with Spectral-DP to achieve better utility. Through comprehensive experiments, we study and provide guidelines to implement Spectral-DP deep learning on benchmark datasets. In comparison with state-of-the-art DP-SGD based approaches, Spectral-DP is shown to have uniformly better utility performance in both training from scratch and transfer learning settings.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies" 基于“分发副本”的可证明安全隐写术
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179287
Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Neng H. Yu
Steganography is the act of disguising the transmission of secret information as seemingly innocent. Although provably secure steganography has been proposed for decades, it has not been mainstream in this field because its strict requirements (such as a perfect sampler and an explicit data distribution) are challenging to satisfy in traditional data environments. The popularity of deep generative models is gradually increasing and can provide an excellent opportunity to solve this problem. Several methods attempting to achieve provably secure steganography based on deep generative models have been proposed in recent years. However, they cannot achieve the expected security in practice due to unrealistic conditions, such as the balanced grouping of discrete elements and a perfect match between the message and channel distributions. In this paper, we propose a new provably secure steganography method in practice named Discop, which constructs several "distribution copies" during the generation process. At each time step of generation, the message determines from which "distribution copy" to sample. As long as the receiver agrees on some shared information with the sender, he can extract the message without error. To further improve the embedding rate, we recursively construct more "distribution copies" by creating Huffman trees. We prove that Discop can strictly maintain the original distribution so that the adversary cannot perform better than random guessing. Moreover, we conduct experiments on multiple generation tasks for diverse digital media, and the results show that Discop’s security and efficiency outperform those of previous methods.
隐写术是一种将秘密信息的传输伪装成看似无辜的行为。虽然安全隐写术已经提出了几十年,但由于其严格的要求(如完美的采样器和明确的数据分布)在传统数据环境中难以满足,因此在该领域尚未成为主流。深度生成模型的普及程度正在逐渐提高,它可以为解决这一问题提供一个极好的机会。近年来,人们提出了几种基于深度生成模型的可证明安全的隐写方法。然而,在实践中,由于不现实的条件,例如离散元素的均衡分组以及消息和信道分布之间的完美匹配,它们无法达到预期的安全性。本文提出了一种新的可证明安全的隐写方法——Discop,该方法在生成过程中构造多个“分发副本”。在生成的每个时间步骤中,消息决定从哪个“分发副本”进行采样。只要接收者同意与发送者共享一些信息,他就可以毫无差错地提取信息。为了进一步提高嵌入率,我们通过创建Huffman树递归地构造更多的“分布副本”。我们证明了Discop可以严格保持原始分布,使得对手不能比随机猜测表现得更好。此外,我们对不同数字媒体的多个生成任务进行了实验,结果表明,Discop的安全性和效率优于先前的方法。
{"title":"Discop: Provably Secure Steganography in Practice Based on \"Distribution Copies\"","authors":"Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Neng H. Yu","doi":"10.1109/SP46215.2023.10179287","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179287","url":null,"abstract":"Steganography is the act of disguising the transmission of secret information as seemingly innocent. Although provably secure steganography has been proposed for decades, it has not been mainstream in this field because its strict requirements (such as a perfect sampler and an explicit data distribution) are challenging to satisfy in traditional data environments. The popularity of deep generative models is gradually increasing and can provide an excellent opportunity to solve this problem. Several methods attempting to achieve provably secure steganography based on deep generative models have been proposed in recent years. However, they cannot achieve the expected security in practice due to unrealistic conditions, such as the balanced grouping of discrete elements and a perfect match between the message and channel distributions. In this paper, we propose a new provably secure steganography method in practice named Discop, which constructs several \"distribution copies\" during the generation process. At each time step of generation, the message determines from which \"distribution copy\" to sample. As long as the receiver agrees on some shared information with the sender, he can extract the message without error. To further improve the embedding rate, we recursively construct more \"distribution copies\" by creating Huffman trees. We prove that Discop can strictly maintain the original distribution so that the adversary cannot perform better than random guessing. Moreover, we conduct experiments on multiple generation tasks for diverse digital media, and the results show that Discop’s security and efficiency outperform those of previous methods.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DepthFake: Spoofing 3D Face Authentication with a 2D Photo DepthFake:用2D照片欺骗3D人脸认证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179429
Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu
Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim’s face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79.4% and RGB-D attack success rate of 59.4% in the real world.
人脸认证已广泛应用于访问控制中,最新的3D人脸认证系统采用3D活体检测技术来应对照片重放攻击,即攻击者使用2D照片绕过认证。在本文中,我们分析了利用结构光深度相机的三维活体检测系统的安全性,并发现了一个针对三维人脸认证系统的新的攻击面。我们提出DepthFake攻击,可以欺骗3D面部认证仅使用一张2D照片。为了实现这一目标,DepthFake首先从目标受害者的2D照片中估计其面部的3D深度信息。然后,DepthFake将嵌入人脸深度信息的精心制作的散射模式投影出来,以使2D照片具有3D身份验证属性。我们克服了一系列实际挑战,例如,2D照片的深度估计误差,基于结构光的深度图像伪造,人脸的RGB图像和深度图像的对齐,并在实验室设置中实现了DepthFake。我们在3个商用人脸认证系统(腾讯云、百度云、3DiVi)和一个商用门禁设备上验证了DepthFake。超过50个用户的结果表明,在真实世界中,DepthFake的整体深度攻击成功率为79.4%,RGB-D攻击成功率为59.4%。
{"title":"DepthFake: Spoofing 3D Face Authentication with a 2D Photo","authors":"Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu","doi":"10.1109/SP46215.2023.10179429","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179429","url":null,"abstract":"Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim’s face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79.4% and RGB-D attack success rate of 59.4% in the real world.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120807902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterizing Everyday Misuse of Smart Home Devices 智能家居设备的日常滥用特征
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179476
Phoebe Moh, P. Datta, N. Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek
Exploration of Internet of Things (IoT) security often focuses on threats posed by external and technically-skilled attackers. While it is important to understand these most extreme cases, it is equally important to understand the most likely risks of harm posed by smart device ownership. In this paper, we explore how smart devices are misused — used without permission in a manner that causes harm — by device owners’ everyday associates such as friends, family, and romantic partners. In a preliminary characterization survey (n = 100), we broadly capture the kinds of unauthorized use and misuse incidents participants have experienced or engaged in. Then, in a prevalence survey (n = 483), we assess the prevalence of these incidents in a demographically-representative population. Our findings show that unauthorized use of smart devices is widespread (experienced by 43% of participants), and that misuse is also common (experienced by at least 19% of participants). However, highly individual factors determine whether these unauthorized use events constitute misuse. Through a focus on everyday abuses, this work sheds light on the most prevalent security and privacy threats faced by smart-home owners today.
对物联网(IoT)安全的探索通常集中在外部和技术熟练的攻击者所构成的威胁上。虽然了解这些最极端的情况很重要,但了解智能设备所有权最可能造成的危害风险同样重要。在本文中,我们探讨了智能设备是如何被滥用的——未经允许以一种造成伤害的方式使用——设备所有者的日常伙伴,如朋友、家人和恋人。在初步的特征调查(n = 100)中,我们大致捕获了参与者经历或参与的未经授权使用和滥用事件的类型。然后,在患病率调查(n = 483)中,我们评估了这些事件在人口统计学上具有代表性的人群中的患病率。我们的研究结果表明,未经授权使用智能设备的情况很普遍(43%的参与者经历过),滥用智能设备的情况也很常见(至少19%的参与者经历过)。然而,高度个性化的因素决定了这些未经授权的使用事件是否构成滥用。通过关注日常滥用,这项工作揭示了当今智能家居所有者面临的最普遍的安全和隐私威胁。
{"title":"Characterizing Everyday Misuse of Smart Home Devices","authors":"Phoebe Moh, P. Datta, N. Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek","doi":"10.1109/SP46215.2023.10179476","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179476","url":null,"abstract":"Exploration of Internet of Things (IoT) security often focuses on threats posed by external and technically-skilled attackers. While it is important to understand these most extreme cases, it is equally important to understand the most likely risks of harm posed by smart device ownership. In this paper, we explore how smart devices are misused — used without permission in a manner that causes harm — by device owners’ everyday associates such as friends, family, and romantic partners. In a preliminary characterization survey (n = 100), we broadly capture the kinds of unauthorized use and misuse incidents participants have experienced or engaged in. Then, in a prevalence survey (n = 483), we assess the prevalence of these incidents in a demographically-representative population. Our findings show that unauthorized use of smart devices is widespread (experienced by 43% of participants), and that misuse is also common (experienced by at least 19% of participants). However, highly individual factors determine whether these unauthorized use events constitute misuse. Through a focus on everyday abuses, this work sheds light on the most prevalent security and privacy threats faced by smart-home owners today.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SoK: Distributed Randomness Beacons SoK:分布式随机信标
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179419
Kevin Choi, A. Manoj, Joseph Bonneau
Motivated and inspired by the emergence of blockchains, many new protocols have recently been proposed for generating publicly verifiable randomness in a distributed yet secure fashion. These protocols work under different setups and assumptions, use various cryptographic tools, and entail unique trade-offs and characteristics. In this paper, we systematize the design of distributed randomness beacons (DRBs) as well as the cryptographic building blocks they rely on. We evaluate protocols on two key security properties, unbiasability and unpredictability, and discuss common attack vectors for predicting or biasing the beacon output and the countermeasures employed by protocols. We also compare protocols by communication and computational efficiency. Finally, we provide insights on the applicability of different protocols in various deployment scenarios and highlight possible directions for further research.
受到区块链出现的激励和启发,最近提出了许多新的协议,以分布式但安全的方式生成可公开验证的随机性。这些协议在不同的设置和假设下工作,使用各种加密工具,并需要独特的权衡和特征。在本文中,我们系统地设计了分布式随机信标(drb)及其所依赖的加密构建块。我们评估了协议的两个关键安全属性,即不偏性和不可预测性,并讨论了用于预测或偏置信标输出的常见攻击向量以及协议采用的对策。我们还比较了协议的通信和计算效率。最后,我们提供了不同协议在各种部署场景中的适用性的见解,并强调了进一步研究的可能方向。
{"title":"SoK: Distributed Randomness Beacons","authors":"Kevin Choi, A. Manoj, Joseph Bonneau","doi":"10.1109/SP46215.2023.10179419","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179419","url":null,"abstract":"Motivated and inspired by the emergence of blockchains, many new protocols have recently been proposed for generating publicly verifiable randomness in a distributed yet secure fashion. These protocols work under different setups and assumptions, use various cryptographic tools, and entail unique trade-offs and characteristics. In this paper, we systematize the design of distributed randomness beacons (DRBs) as well as the cryptographic building blocks they rely on. We evaluate protocols on two key security properties, unbiasability and unpredictability, and discuss common attack vectors for predicting or biasing the beacon output and the countermeasures employed by protocols. We also compare protocols by communication and computational efficiency. Finally, we provide insights on the applicability of different protocols in various deployment scenarios and highlight possible directions for further research.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133792929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations REGA:具有刷新激活的可伸缩的Rowhammer缓解
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179327
Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi
Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM rows before bits start to flip. These refreshes are scarce and can only happen periodically, impeding the design of effective mitigations as newer DRAM substrates become more vulnerable to Rowhammer, and more "victim" rows are affected by a single "aggressor" row.We introduce REGA, the first in-DRAM mechanism that can generate extra refresh operations each time a row is activated. Since row activations are the sole cause of Rowhammer, these extra refreshes become available as soon as the DRAM device faces Rowhammer-inducing activations. Refresh operations are traditionally performed using sense amplifiers. Sense amplifiers, however, are also in charge of handling the read and write operations. Consequently, the sense amplifiers cannot be used for refreshing rows during data transfers. To enable refresh operations in parallel to data transfers, REGA uses additional low-overhead buffering sense amplifiers for the sole purpose of data transfers. REGA can then use the original sense amplifiers for parallel refresh operations of other rows during row activations.The refreshes generated by REGA enable the design of simple and scalable in-DRAM mitigations with strong security guarantees. As an example, we build REGAM, the first deterministic in-DRAM mitigation that scales to small Rowhammer thresholds while remaining agnostic to the number of victims per aggressor. REGAM has a constant 2.1% area overhead, and can protect DDR5 devices with Rowhammer thresholds as small as 261, 517, and 1029 with 23.9%, 11.5%, and 4.7% more power, and 3.7%, 0.8% and 0% performance overhead.
缓解Rowhammer需要执行额外的刷新操作,以便在位开始翻转之前为DRAM行充电。这些刷新是稀缺的,只能周期性地发生,阻碍了有效缓解的设计,因为较新的DRAM基板更容易受到Rowhammer的攻击,并且更多的“受害者”行受到单个“侵略者”行的影响。我们介绍REGA,这是第一个可以在每次激活一行时生成额外刷新操作的dram机制。由于行激活是引起Rowhammer的唯一原因,因此只要DRAM设备面临由Rowhammer引起的激活,这些额外的刷新就可用。刷新操作传统上是使用感测放大器执行的。然而,感测放大器也负责处理读和写操作。因此,感测放大器不能用于在数据传输期间刷新行。为了使刷新操作与数据传输并行,REGA使用额外的低开销缓冲感测放大器来进行数据传输。然后,REGA可以在行激活期间使用原始感测放大器对其他行进行并行刷新操作。REGA生成的刷新支持简单且可扩展的dram内缓解设计,并具有强大的安全保证。作为一个例子,我们构建了REGAM,这是第一个确定性的dram缓解,可以扩展到较小的Rowhammer阈值,同时对每个攻击者的受害者数量保持不可知。REGAM具有恒定的2.1%的面积开销,并且可以保护Rowhammer阈值小至261、517和1029的DDR5设备,功率增加23.9%、11.5%和4.7%,性能开销增加3.7%、0.8%和0%。
{"title":"REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations","authors":"Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi","doi":"10.1109/SP46215.2023.10179327","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179327","url":null,"abstract":"Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM rows before bits start to flip. These refreshes are scarce and can only happen periodically, impeding the design of effective mitigations as newer DRAM substrates become more vulnerable to Rowhammer, and more \"victim\" rows are affected by a single \"aggressor\" row.We introduce REGA, the first in-DRAM mechanism that can generate extra refresh operations each time a row is activated. Since row activations are the sole cause of Rowhammer, these extra refreshes become available as soon as the DRAM device faces Rowhammer-inducing activations. Refresh operations are traditionally performed using sense amplifiers. Sense amplifiers, however, are also in charge of handling the read and write operations. Consequently, the sense amplifiers cannot be used for refreshing rows during data transfers. To enable refresh operations in parallel to data transfers, REGA uses additional low-overhead buffering sense amplifiers for the sole purpose of data transfers. REGA can then use the original sense amplifiers for parallel refresh operations of other rows during row activations.The refreshes generated by REGA enable the design of simple and scalable in-DRAM mitigations with strong security guarantees. As an example, we build REGAM, the first deterministic in-DRAM mitigation that scales to small Rowhammer thresholds while remaining agnostic to the number of victims per aggressor. REGAM has a constant 2.1% area overhead, and can protect DDR5 devices with Rowhammer thresholds as small as 261, 517, and 1029 with 23.9%, 11.5%, and 4.7% more power, and 3.7%, 0.8% and 0% performance overhead.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Practical Program Modularization with Type-Based Dependence Analysis 基于类型依赖分析的实用程序模块化
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179412
Kangjie Lu
Today's software programs are bloating and have become extremely complex. As there is typically no internal isolation among modules in a program, a vulnerability can be exploited to corrupt the memory and take control of the whole program. Program modularization is thus a promising security mechanism that splits a complex program into smaller modules, so that memory-access instructions can be constrained from corrupting irrelevant modules. A general approach to realizing program modularization is dependence analysis which determines if an instruction is independent of specific code or data; and if so, it can be modularized. Unfortunately, dependence analysis in complex programs is generally considered infeasible, due to problems in data-flow analysis, such as unknown indirect-call targets, pointer aliasing, and path explosion. As a result, we have not seen practical automated program modularization built on dependence analysis.This paper presents a breakthrough—Type-based dependence analysis for Program Modularization (TyPM). Its goal is to determine which modules in a program can never pass a type of object (including references) to a memory-access instruction; therefore, objects of this type that are created by these modules can never be valid targets of the instruction. The idea is to employ a type-based analysis to first determine which types of data flows can take place between two modules, and then transitively resolve all dependent modules of a memory-access instruction, with respect to the specific type. Such an approach avoids the data-flow analysis and can be practical. We develop two important security applications based on TyPM: refining indirect-call targets and protecting critical data structures. We extensively evaluate TyPM with various system software, including an OS kernel, a hypervisor, UEFI firmware, and a browser. Results show that on average TyPM additionally refines indirect-call targets produced by the state of the art by 31%-91%. TyPM can also remove 99.9% of modules for memory-write instructions to prevent them from corrupting critical data structures in the Linux kernel.
今天的软件程序正在膨胀,并且已经变得极其复杂。由于程序中的模块之间通常没有内部隔离,因此可以利用漏洞破坏内存并控制整个程序。因此,程序模块化是一种很有前途的安全机制,它将一个复杂的程序分割成更小的模块,这样内存访问指令就可以受到约束,不会破坏不相关的模块。实现程序模块化的一般方法是依赖性分析,它确定指令是否独立于特定的代码或数据;如果是这样,它可以被模块化。不幸的是,由于数据流分析中存在未知的间接调用目标、指针混叠和路径爆炸等问题,复杂程序中的依赖分析通常被认为是不可行的。因此,我们还没有看到建立在依赖性分析基础上的实用的自动化程序模块化。提出了一种突破性的基于类型的程序模块化(TyPM)依赖分析方法。它的目标是确定程序中的哪些模块永远不能将对象类型(包括引用)传递给内存访问指令;因此,由这些模块创建的这种类型的对象永远不可能是指令的有效目标。其思想是采用基于类型的分析,首先确定两个模块之间可以发生哪种类型的数据流,然后根据特定类型传递地解析内存访问指令的所有依赖模块。这种方法避免了数据流分析,具有实用性。我们基于TyPM开发了两个重要的安全应用程序:精炼间接调用目标和保护关键数据结构。我们使用各种系统软件对TyPM进行了广泛的评估,包括操作系统内核、管理程序、UEFI固件和浏览器。结果表明,平均而言,TyPM对现有技术产生的间接调用目标进行了31%-91%的额外改进。TyPM还可以删除99.9%的内存写指令模块,以防止它们破坏Linux内核中的关键数据结构。
{"title":"Practical Program Modularization with Type-Based Dependence Analysis","authors":"Kangjie Lu","doi":"10.1109/SP46215.2023.10179412","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179412","url":null,"abstract":"Today's software programs are bloating and have become extremely complex. As there is typically no internal isolation among modules in a program, a vulnerability can be exploited to corrupt the memory and take control of the whole program. Program modularization is thus a promising security mechanism that splits a complex program into smaller modules, so that memory-access instructions can be constrained from corrupting irrelevant modules. A general approach to realizing program modularization is dependence analysis which determines if an instruction is independent of specific code or data; and if so, it can be modularized. Unfortunately, dependence analysis in complex programs is generally considered infeasible, due to problems in data-flow analysis, such as unknown indirect-call targets, pointer aliasing, and path explosion. As a result, we have not seen practical automated program modularization built on dependence analysis.This paper presents a breakthrough—Type-based dependence analysis for Program Modularization (TyPM). Its goal is to determine which modules in a program can never pass a type of object (including references) to a memory-access instruction; therefore, objects of this type that are created by these modules can never be valid targets of the instruction. The idea is to employ a type-based analysis to first determine which types of data flows can take place between two modules, and then transitively resolve all dependent modules of a memory-access instruction, with respect to the specific type. Such an approach avoids the data-flow analysis and can be practical. We develop two important security applications based on TyPM: refining indirect-call targets and protecting critical data structures. We extensively evaluate TyPM with various system software, including an OS kernel, a hypervisor, UEFI firmware, and a browser. Results show that on average TyPM additionally refines indirect-call targets produced by the state of the art by 31%-91%. TyPM can also remove 99.9% of modules for memory-write instructions to prevent them from corrupting critical data structures in the Linux kernel.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122863974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling D-ARM:基于轻量级超集指令解释和图建模的ARM二进制文件反汇编
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179307
Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, X. Zhang
ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of unique features making disassembly distinct from x86 disassembly, such as the mixing of ARM and Thumb instruction modes, implicit mode switching within an application, and more prevalent use of inlined data. Existing techniques cannot achieve high accuracy when binaries become complex and have undergone obfuscation. We propose a novel ARM binary disassembly technique that is particularly designed to address challenges in legacy code for 32-bit ARM binaries. It features a lightweight superset instruction interpretation method to derive rich semantic information and a graph-theory based method that aggregates such information to produce final results. Our comparative evaluation with a number of state-of-the-art disassemblers, including Ghidra, IDA, P-Disasm, XDA, D-Disasm, and Spedi, on thousands of binaries generated from SPEC2000 and SPEC2006 with various settings, and real-world applications collected online show that our technique D-ARM substantially outperforms the baselines.
ARM二进制分析在ARM系统安全中有着广泛的应用。一个基本的挑战是ARM的反汇编。ARM,特别是AArch32,具有许多独特的特性,使反汇编与x86反汇编不同,例如ARM和Thumb指令模式的混合,应用程序中的隐式模式切换,以及更普遍地使用内联数据。当二进制文件变得复杂并经历了混淆时,现有的技术无法达到高精度。我们提出了一种新的ARM二进制反汇编技术,专门用于解决32位ARM二进制文件遗留代码中的挑战。它具有轻量级的超集指令解释方法来获得丰富的语义信息,以及基于图论的方法来聚合这些信息以产生最终结果。我们与许多最先进的反汇编器(包括Ghidra、IDA、P-Disasm、XDA、D-Disasm和Spedi)对SPEC2000和SPEC2006在各种设置下生成的数千个二进制文件以及在线收集的实际应用程序进行了比较评估,结果表明我们的D-ARM技术大大优于基线。
{"title":"D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling","authors":"Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, X. Zhang","doi":"10.1109/SP46215.2023.10179307","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179307","url":null,"abstract":"ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of unique features making disassembly distinct from x86 disassembly, such as the mixing of ARM and Thumb instruction modes, implicit mode switching within an application, and more prevalent use of inlined data. Existing techniques cannot achieve high accuracy when binaries become complex and have undergone obfuscation. We propose a novel ARM binary disassembly technique that is particularly designed to address challenges in legacy code for 32-bit ARM binaries. It features a lightweight superset instruction interpretation method to derive rich semantic information and a graph-theory based method that aggregates such information to produce final results. Our comparative evaluation with a number of state-of-the-art disassemblers, including Ghidra, IDA, P-Disasm, XDA, D-Disasm, and Spedi, on thousands of binaries generated from SPEC2000 and SPEC2006 with various settings, and real-world applications collected online show that our technique D-ARM substantially outperforms the baselines.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Specification Blind Spots via Fuzz Testing 通过模糊测试找到规范盲点
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179438
Ru Ji, Meng Xu
A formally verified program is only as correct as its specifications (SPEC). But how to assure that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing-Assisted Specification Testing, as a potential answer. The key insight is to exploit and synergize the "redundancy" and "diversity" in formally verified programs for cross-checking. Specifically, within the same codebase, SPEC, implementation (CODE), and test suites are all derived from the same set of business requirements. Therefore, if some intention is captured in CODE and test case but not in SPEC, this is a strong indication that there is a blind spot in SPEC.Fast examines the SPEC for incompleteness issues in an automated way: it first locates SPEC gaps via mutation testing, i.e., by checking whether a CODE variant conforms to the original SPEC. If so, Fast further leverages the test suites to infer whether the gap is introduced by intention or by mistake. Depending on the codebase size, Fast may choose to generate CODE variants in either an enumerative or evolutionary way. Fast is applied to two open-source codebases that feature formal verification and helps to confirm 13 and 21 blind spots in their SPEC respectively. This highlights the prevalence of SPEC incompleteness in real-world applications.
经过正式验证的程序只有在其规范(SPEC)中才是正确的。但是如何确保SPEC是完整的并且没有漏洞呢?本文提出了Fast(模糊辅助规格测试的缩写)作为一种可能的解决方案。关键的洞察力是利用和协同“冗余”和“多样性”的正式验证程序进行交叉检查。具体地说,在相同的代码库中,SPEC、实现(CODE)和测试套件都来自相同的业务需求集。因此,如果在CODE和测试用例中捕获了一些意图,但在SPEC中没有,这是SPEC中存在盲点的强烈迹象。Fast以自动化的方式检查SPEC的不完整性问题:它首先通过突变测试定位SPEC差距,即,通过检查CODE变体是否符合原始SPEC。如果是这样,Fast进一步利用测试套件来推断差距是由意图还是错误引入的。根据代码库的大小,Fast可以选择以枚举或演化的方式生成CODE变体。Fast应用于两个开源代码库,这两个代码库以正式验证为特征,并分别帮助确认其SPEC中的13个和21个盲点。这突出了在实际应用程序中普遍存在的SPEC不完整性。
{"title":"Finding Specification Blind Spots via Fuzz Testing","authors":"Ru Ji, Meng Xu","doi":"10.1109/SP46215.2023.10179438","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179438","url":null,"abstract":"A formally verified program is only as correct as its specifications (SPEC). But how to assure that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing-Assisted Specification Testing, as a potential answer. The key insight is to exploit and synergize the \"redundancy\" and \"diversity\" in formally verified programs for cross-checking. Specifically, within the same codebase, SPEC, implementation (CODE), and test suites are all derived from the same set of business requirements. Therefore, if some intention is captured in CODE and test case but not in SPEC, this is a strong indication that there is a blind spot in SPEC.Fast examines the SPEC for incompleteness issues in an automated way: it first locates SPEC gaps via mutation testing, i.e., by checking whether a CODE variant conforms to the original SPEC. If so, Fast further leverages the test suites to infer whether the gap is introduced by intention or by mistake. Depending on the codebase size, Fast may choose to generate CODE variants in either an enumerative or evolutionary way. Fast is applied to two open-source codebases that feature formal verification and helps to confirm 13 and 21 blind spots in their SPEC respectively. This highlights the prevalence of SPEC incompleteness in real-world applications.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179409
Hanshen Xiao, Zihang Xiang, Di Wang, S. Devadas
We study the bias introduced in Differentially-Private Stochastic Gradient Descent (DP-SGD) with clipped or normalized per-sample gradient. As one of the most popular but artificial operations to ensure bounded sensitivity, gradient clipping enables composite privacy analysis of many iterative optimization methods without additional assumptions on either learning models or input data. Despite its wide applicability, gradient clipping also presents theoretical challenges in systematically instructing improvement of privacy or utility. In general, without an assumption on globally-bounded gradient, classic convergence analyses do not apply to clipped gradient descent. Further, given limited understanding of the utility loss, many existing improvements to DP-SGD are heuristic, especially in the applications of private deep learning.In this paper, we provide meaningful theoretical analysis validated by thorough empirical results of DP-SGD. We point out that the bias caused by gradient clipping is underestimated in previous works. For generic non-convex optimization via DP-SGD, we show one key factor contributing to the bias is the sampling noise of stochastic gradient to be clipped. Accordingly, we use the developed theory to build a series of improvements for sampling noise reduction from various perspectives. From an optimization angle, we study variance reduction techniques and propose inner-outer momentum. At the learning model (neural network) level, we propose several tricks to enhance network internal normalization and BatchClipping to carefully clip the gradient of a batch of samples. For data preprocessing, we provide theoretical justification of recently proposed improvements via data normalization and (self-)augmentation.Putting these systematic improvements together, private deep learning via DP-SGD can be significantly strengthened in many tasks. For example, in computer vision applications, with an (ϵ = 8, δ = 10−5) DP guarantee, we successfully train ResNet20 on CIFAR10 and SVHN with test accuracy 76.0% and 90.1%, respectively; for natural language processing, with (ϵ = 4, δ = 10−5), we successfully train a recurrent neural network on IMDb data with test accuracy 77.5%.
我们研究了具有截断或归一化的每样本梯度的微分私有随机梯度下降(DP-SGD)中引入的偏差。作为一种最流行的人工操作,梯度裁剪可以对许多迭代优化方法进行复合隐私分析,而无需对学习模型或输入数据进行额外的假设。尽管梯度裁剪具有广泛的适用性,但在系统地指导私密性或实用性的改进方面也提出了理论挑战。一般来说,如果没有全局有界梯度的假设,经典的收敛分析不适用于裁剪梯度下降。此外,由于对效用损失的理解有限,对DP-SGD的许多现有改进都是启发式的,特别是在私有深度学习的应用中。在本文中,我们提供了有意义的理论分析,并得到了DP-SGD的实证结果的验证。我们指出,以前的工作低估了梯度裁剪引起的偏置。对于通过DP-SGD进行的一般非凸优化,我们表明导致偏差的一个关键因素是要剪切的随机梯度的采样噪声。因此,我们运用已发展的理论,从不同的角度对采样降噪进行了一系列的改进。从优化的角度研究方差缩减技术,提出内外动量。在学习模型(神经网络)层面,我们提出了几个技巧来增强网络内部归一化和BatchClipping,以仔细剪辑一批样本的梯度。对于数据预处理,我们通过数据规范化和(自)增强为最近提出的改进提供了理论依据。将这些系统改进结合在一起,通过DP-SGD进行的私人深度学习可以在许多任务中得到显着加强。例如,在计算机视觉应用中,在(ε = 8, δ = 10−5)DP保证下,我们成功地在CIFAR10和SVHN上训练ResNet20,测试准确率分别为76.0%和90.1%;对于自然语言处理,我们使用(ε = 4, δ = 10−5)在IMDb数据上成功训练了一个递归神经网络,测试准确率为77.5%。
{"title":"A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction","authors":"Hanshen Xiao, Zihang Xiang, Di Wang, S. Devadas","doi":"10.1109/SP46215.2023.10179409","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179409","url":null,"abstract":"We study the bias introduced in Differentially-Private Stochastic Gradient Descent (DP-SGD) with clipped or normalized per-sample gradient. As one of the most popular but artificial operations to ensure bounded sensitivity, gradient clipping enables composite privacy analysis of many iterative optimization methods without additional assumptions on either learning models or input data. Despite its wide applicability, gradient clipping also presents theoretical challenges in systematically instructing improvement of privacy or utility. In general, without an assumption on globally-bounded gradient, classic convergence analyses do not apply to clipped gradient descent. Further, given limited understanding of the utility loss, many existing improvements to DP-SGD are heuristic, especially in the applications of private deep learning.In this paper, we provide meaningful theoretical analysis validated by thorough empirical results of DP-SGD. We point out that the bias caused by gradient clipping is underestimated in previous works. For generic non-convex optimization via DP-SGD, we show one key factor contributing to the bias is the sampling noise of stochastic gradient to be clipped. Accordingly, we use the developed theory to build a series of improvements for sampling noise reduction from various perspectives. From an optimization angle, we study variance reduction techniques and propose inner-outer momentum. At the learning model (neural network) level, we propose several tricks to enhance network internal normalization and BatchClipping to carefully clip the gradient of a batch of samples. For data preprocessing, we provide theoretical justification of recently proposed improvements via data normalization and (self-)augmentation.Putting these systematic improvements together, private deep learning via DP-SGD can be significantly strengthened in many tasks. For example, in computer vision applications, with an (ϵ = 8, δ = 10−5) DP guarantee, we successfully train ResNet20 on CIFAR10 and SVHN with test accuracy 76.0% and 90.1%, respectively; for natural language processing, with (ϵ = 4, δ = 10−5), we successfully train a recurrent neural network on IMDb data with test accuracy 77.5%.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1