首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations REGA:具有刷新激活的可伸缩的Rowhammer缓解
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179327
Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi
Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM rows before bits start to flip. These refreshes are scarce and can only happen periodically, impeding the design of effective mitigations as newer DRAM substrates become more vulnerable to Rowhammer, and more "victim" rows are affected by a single "aggressor" row.We introduce REGA, the first in-DRAM mechanism that can generate extra refresh operations each time a row is activated. Since row activations are the sole cause of Rowhammer, these extra refreshes become available as soon as the DRAM device faces Rowhammer-inducing activations. Refresh operations are traditionally performed using sense amplifiers. Sense amplifiers, however, are also in charge of handling the read and write operations. Consequently, the sense amplifiers cannot be used for refreshing rows during data transfers. To enable refresh operations in parallel to data transfers, REGA uses additional low-overhead buffering sense amplifiers for the sole purpose of data transfers. REGA can then use the original sense amplifiers for parallel refresh operations of other rows during row activations.The refreshes generated by REGA enable the design of simple and scalable in-DRAM mitigations with strong security guarantees. As an example, we build REGAM, the first deterministic in-DRAM mitigation that scales to small Rowhammer thresholds while remaining agnostic to the number of victims per aggressor. REGAM has a constant 2.1% area overhead, and can protect DDR5 devices with Rowhammer thresholds as small as 261, 517, and 1029 with 23.9%, 11.5%, and 4.7% more power, and 3.7%, 0.8% and 0% performance overhead.
缓解Rowhammer需要执行额外的刷新操作,以便在位开始翻转之前为DRAM行充电。这些刷新是稀缺的,只能周期性地发生,阻碍了有效缓解的设计,因为较新的DRAM基板更容易受到Rowhammer的攻击,并且更多的“受害者”行受到单个“侵略者”行的影响。我们介绍REGA,这是第一个可以在每次激活一行时生成额外刷新操作的dram机制。由于行激活是引起Rowhammer的唯一原因,因此只要DRAM设备面临由Rowhammer引起的激活,这些额外的刷新就可用。刷新操作传统上是使用感测放大器执行的。然而,感测放大器也负责处理读和写操作。因此,感测放大器不能用于在数据传输期间刷新行。为了使刷新操作与数据传输并行,REGA使用额外的低开销缓冲感测放大器来进行数据传输。然后,REGA可以在行激活期间使用原始感测放大器对其他行进行并行刷新操作。REGA生成的刷新支持简单且可扩展的dram内缓解设计,并具有强大的安全保证。作为一个例子,我们构建了REGAM,这是第一个确定性的dram缓解,可以扩展到较小的Rowhammer阈值,同时对每个攻击者的受害者数量保持不可知。REGAM具有恒定的2.1%的面积开销,并且可以保护Rowhammer阈值小至261、517和1029的DDR5设备,功率增加23.9%、11.5%和4.7%,性能开销增加3.7%、0.8%和0%。
{"title":"REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations","authors":"Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi","doi":"10.1109/SP46215.2023.10179327","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179327","url":null,"abstract":"Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM rows before bits start to flip. These refreshes are scarce and can only happen periodically, impeding the design of effective mitigations as newer DRAM substrates become more vulnerable to Rowhammer, and more \"victim\" rows are affected by a single \"aggressor\" row.We introduce REGA, the first in-DRAM mechanism that can generate extra refresh operations each time a row is activated. Since row activations are the sole cause of Rowhammer, these extra refreshes become available as soon as the DRAM device faces Rowhammer-inducing activations. Refresh operations are traditionally performed using sense amplifiers. Sense amplifiers, however, are also in charge of handling the read and write operations. Consequently, the sense amplifiers cannot be used for refreshing rows during data transfers. To enable refresh operations in parallel to data transfers, REGA uses additional low-overhead buffering sense amplifiers for the sole purpose of data transfers. REGA can then use the original sense amplifiers for parallel refresh operations of other rows during row activations.The refreshes generated by REGA enable the design of simple and scalable in-DRAM mitigations with strong security guarantees. As an example, we build REGAM, the first deterministic in-DRAM mitigation that scales to small Rowhammer thresholds while remaining agnostic to the number of victims per aggressor. REGAM has a constant 2.1% area overhead, and can protect DDR5 devices with Rowhammer thresholds as small as 261, 517, and 1029 with 23.9%, 11.5%, and 4.7% more power, and 3.7%, 0.8% and 0% performance overhead.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Characterizing Everyday Misuse of Smart Home Devices 智能家居设备的日常滥用特征
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179476
Phoebe Moh, P. Datta, N. Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek
Exploration of Internet of Things (IoT) security often focuses on threats posed by external and technically-skilled attackers. While it is important to understand these most extreme cases, it is equally important to understand the most likely risks of harm posed by smart device ownership. In this paper, we explore how smart devices are misused — used without permission in a manner that causes harm — by device owners’ everyday associates such as friends, family, and romantic partners. In a preliminary characterization survey (n = 100), we broadly capture the kinds of unauthorized use and misuse incidents participants have experienced or engaged in. Then, in a prevalence survey (n = 483), we assess the prevalence of these incidents in a demographically-representative population. Our findings show that unauthorized use of smart devices is widespread (experienced by 43% of participants), and that misuse is also common (experienced by at least 19% of participants). However, highly individual factors determine whether these unauthorized use events constitute misuse. Through a focus on everyday abuses, this work sheds light on the most prevalent security and privacy threats faced by smart-home owners today.
对物联网(IoT)安全的探索通常集中在外部和技术熟练的攻击者所构成的威胁上。虽然了解这些最极端的情况很重要,但了解智能设备所有权最可能造成的危害风险同样重要。在本文中,我们探讨了智能设备是如何被滥用的——未经允许以一种造成伤害的方式使用——设备所有者的日常伙伴,如朋友、家人和恋人。在初步的特征调查(n = 100)中,我们大致捕获了参与者经历或参与的未经授权使用和滥用事件的类型。然后,在患病率调查(n = 483)中,我们评估了这些事件在人口统计学上具有代表性的人群中的患病率。我们的研究结果表明,未经授权使用智能设备的情况很普遍(43%的参与者经历过),滥用智能设备的情况也很常见(至少19%的参与者经历过)。然而,高度个性化的因素决定了这些未经授权的使用事件是否构成滥用。通过关注日常滥用,这项工作揭示了当今智能家居所有者面临的最普遍的安全和隐私威胁。
{"title":"Characterizing Everyday Misuse of Smart Home Devices","authors":"Phoebe Moh, P. Datta, N. Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek","doi":"10.1109/SP46215.2023.10179476","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179476","url":null,"abstract":"Exploration of Internet of Things (IoT) security often focuses on threats posed by external and technically-skilled attackers. While it is important to understand these most extreme cases, it is equally important to understand the most likely risks of harm posed by smart device ownership. In this paper, we explore how smart devices are misused — used without permission in a manner that causes harm — by device owners’ everyday associates such as friends, family, and romantic partners. In a preliminary characterization survey (n = 100), we broadly capture the kinds of unauthorized use and misuse incidents participants have experienced or engaged in. Then, in a prevalence survey (n = 483), we assess the prevalence of these incidents in a demographically-representative population. Our findings show that unauthorized use of smart devices is widespread (experienced by 43% of participants), and that misuse is also common (experienced by at least 19% of participants). However, highly individual factors determine whether these unauthorized use events constitute misuse. Through a focus on everyday abuses, this work sheds light on the most prevalent security and privacy threats faced by smart-home owners today.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks 分散和分裂安全:击败缓存争用和占用攻击
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179440
Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, S. Mangard, D. Gruss
In this paper, we propose SassCache, a secure skewed associative cache with keyed index mapping. For this purpose, we design a new two-layered, low-latency cryptographic construction with configurable output coverage based on state-of-the-art cryptographic primitives. Based on this construction, SassCache is the first secure randomized cache with secure spacing. Victim cache lines automatically hide in locations the attacker cannot reach after less than 1 access on average. Consequently, attackers cannot evict the cache line, no matter which and how many memory accesses they perform. Our security analysis shows that all existing techniques for eviction set construction fail, and state-of-the-art attacks only apply to 1 in 3 million addresses, where SassCache is still as secure as ScatterCache. Compared to standard caches, Sass Cache has a single-threaded performance penalty of 1.75 % on the last-level cache hit rate in the SPEC2017 benchmark, and an average decrease of 11.7 p.p. in hit rate for MiBench, GAP and Scimark for our high-security settings.
在本文中,我们提出了SassCache,一个具有键索引映射的安全倾斜关联缓存。为此,我们设计了一种新的两层、低延迟的加密结构,该结构基于最先进的加密原语,具有可配置的输出覆盖。基于这种构造,SassCache是第一个具有安全间隔的安全随机缓存。受害者缓存线自动隐藏在攻击者平均少于1次访问后无法到达的位置。因此,无论攻击者执行了多少次内存访问,都无法驱逐缓存行。我们的安全分析表明,所有现有的驱逐集构建技术都失败了,最先进的攻击仅适用于300万个地址中的1个,其中SassCache仍然与ScatterCache一样安全。与标准缓存相比,在SPEC2017基准测试中,Sass缓存在最后一级缓存命中率上的单线程性能损失为1.75%,在我们的高安全性设置中,MiBench、GAP和spark的命中率平均下降11.7%。
{"title":"Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks","authors":"Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, S. Mangard, D. Gruss","doi":"10.1109/SP46215.2023.10179440","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179440","url":null,"abstract":"In this paper, we propose SassCache, a secure skewed associative cache with keyed index mapping. For this purpose, we design a new two-layered, low-latency cryptographic construction with configurable output coverage based on state-of-the-art cryptographic primitives. Based on this construction, SassCache is the first secure randomized cache with secure spacing. Victim cache lines automatically hide in locations the attacker cannot reach after less than 1 access on average. Consequently, attackers cannot evict the cache line, no matter which and how many memory accesses they perform. Our security analysis shows that all existing techniques for eviction set construction fail, and state-of-the-art attacks only apply to 1 in 3 million addresses, where SassCache is still as secure as ScatterCache. Compared to standard caches, Sass Cache has a single-threaded performance penalty of 1.75 % on the last-level cache hit rate in the SPEC2017 benchmark, and an average decrease of 11.7 p.p. in hit rate for MiBench, GAP and Scimark for our high-security settings.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering spectrum - dp:基于谱摄动和滤波的差分私有深度学习
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.00171
Ce Feng, Nuo Xu, Wujie Wen, P. Venkitasubramaniam, Caiwen Ding
Differential privacy is a widely accepted measure of privacy in the context of deep learning algorithms, and achieving it relies on a noisy training approach known as differentially private stochastic gradient descent (DP-SGD). DP-SGD requires direct noise addition to every gradient in a dense neural network, the privacy is achieved at a significant utility cost. In this work, we present Spectral-DP, a new differentially private learning approach which combines gradient perturbation in the spectral domain with spectral filtering to achieve a desired privacy guarantee with a lower noise scale and thus better utility. We develop differentially private deep learning methods based on Spectral-DP for architectures that contain both convolution and fully connected layers. In particular, for fully connected layers, we combine a block-circulant based spatial restructuring with Spectral-DP to achieve better utility. Through comprehensive experiments, we study and provide guidelines to implement Spectral-DP deep learning on benchmark datasets. In comparison with state-of-the-art DP-SGD based approaches, Spectral-DP is shown to have uniformly better utility performance in both training from scratch and transfer learning settings.
在深度学习算法中,差分隐私是一种被广泛接受的隐私度量,实现它依赖于一种称为差分私有随机梯度下降(DP-SGD)的噪声训练方法。DP-SGD需要在密集神经网络的每个梯度中直接添加噪声,以显着的效用成本实现隐私。在这项工作中,我们提出了一种新的差分私有学习方法spectrum - dp,它将谱域的梯度扰动与谱滤波相结合,以更低的噪声尺度实现所需的隐私保证,从而获得更好的效用。针对包含卷积层和全连接层的架构,我们开发了基于Spectral-DP的差分私有深度学习方法。特别是,对于完全连接的层,我们将基于块循环的空间重构与光谱- dp相结合,以获得更好的效用。通过全面的实验,我们研究并提供了在基准数据集上实现光谱- dp深度学习的指导方针。与最先进的基于DP-SGD的方法相比,spectrum - dp在从头开始训练和迁移学习设置中都具有更好的实用性能。
{"title":"Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering","authors":"Ce Feng, Nuo Xu, Wujie Wen, P. Venkitasubramaniam, Caiwen Ding","doi":"10.1109/SP46215.2023.00171","DOIUrl":"https://doi.org/10.1109/SP46215.2023.00171","url":null,"abstract":"Differential privacy is a widely accepted measure of privacy in the context of deep learning algorithms, and achieving it relies on a noisy training approach known as differentially private stochastic gradient descent (DP-SGD). DP-SGD requires direct noise addition to every gradient in a dense neural network, the privacy is achieved at a significant utility cost. In this work, we present Spectral-DP, a new differentially private learning approach which combines gradient perturbation in the spectral domain with spectral filtering to achieve a desired privacy guarantee with a lower noise scale and thus better utility. We develop differentially private deep learning methods based on Spectral-DP for architectures that contain both convolution and fully connected layers. In particular, for fully connected layers, we combine a block-circulant based spatial restructuring with Spectral-DP to achieve better utility. Through comprehensive experiments, we study and provide guidelines to implement Spectral-DP deep learning on benchmark datasets. In comparison with state-of-the-art DP-SGD based approaches, Spectral-DP is shown to have uniformly better utility performance in both training from scratch and transfer learning settings.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126179109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses SoK:有效的网站指纹防御的关键评估
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179289
Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, M. Wright
Recent website fingerprinting attacks have been shown to achieve very high performance against traffic through Tor. These attacks allow an adversary to deduce the website a Tor user has visited by simply eavesdropping on the encrypted communication. This has consequently motivated the development of many defense strategies that obfuscate traffic through the addition of dummy packets and/or delays. The efficacy and practicality of many of these recent proposals have yet to be scrutinized in detail. In this study, we re-evaluate nine recent defense proposals that claim to provide adequate security with low-overheads using the latest Deep Learning-based attacks. Furthermore, we assess the feasibility of implementing these defenses within the current confines of Tor. To this end, we additionally provide the first on-network implementation of the DynaFlow defense to better assess its real-world utility.
最近的网站指纹攻击已被证明可以对通过Tor的流量实现非常高的性能。这些攻击允许对手通过简单地窃听加密通信来推断Tor用户访问过的网站。因此,这推动了许多防御策略的发展,这些策略通过添加虚拟数据包和/或延迟来混淆流量。这些最近提出的许多建议的有效性和实用性还有待详细审查。在这项研究中,我们重新评估了最近的九项防御提案,这些提案声称使用最新的基于深度学习的攻击以低开销提供足够的安全性。此外,我们评估了在Tor当前范围内实施这些防御的可行性。为此,我们还提供了DynaFlow防御的第一个网络实现,以更好地评估其实际效用。
{"title":"SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses","authors":"Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, M. Wright","doi":"10.1109/SP46215.2023.10179289","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179289","url":null,"abstract":"Recent website fingerprinting attacks have been shown to achieve very high performance against traffic through Tor. These attacks allow an adversary to deduce the website a Tor user has visited by simply eavesdropping on the encrypted communication. This has consequently motivated the development of many defense strategies that obfuscate traffic through the addition of dummy packets and/or delays. The efficacy and practicality of many of these recent proposals have yet to be scrutinized in detail. In this study, we re-evaluate nine recent defense proposals that claim to provide adequate security with low-overheads using the latest Deep Learning-based attacks. Furthermore, we assess the feasibility of implementing these defenses within the current confines of Tor. To this end, we additionally provide the first on-network implementation of the DynaFlow defense to better assess its real-world utility.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DepthFake: Spoofing 3D Face Authentication with a 2D Photo DepthFake:用2D照片欺骗3D人脸认证
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179429
Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu
Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim’s face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79.4% and RGB-D attack success rate of 59.4% in the real world.
人脸认证已广泛应用于访问控制中,最新的3D人脸认证系统采用3D活体检测技术来应对照片重放攻击,即攻击者使用2D照片绕过认证。在本文中,我们分析了利用结构光深度相机的三维活体检测系统的安全性,并发现了一个针对三维人脸认证系统的新的攻击面。我们提出DepthFake攻击,可以欺骗3D面部认证仅使用一张2D照片。为了实现这一目标,DepthFake首先从目标受害者的2D照片中估计其面部的3D深度信息。然后,DepthFake将嵌入人脸深度信息的精心制作的散射模式投影出来,以使2D照片具有3D身份验证属性。我们克服了一系列实际挑战,例如,2D照片的深度估计误差,基于结构光的深度图像伪造,人脸的RGB图像和深度图像的对齐,并在实验室设置中实现了DepthFake。我们在3个商用人脸认证系统(腾讯云、百度云、3DiVi)和一个商用门禁设备上验证了DepthFake。超过50个用户的结果表明,在真实世界中,DepthFake的整体深度攻击成功率为79.4%,RGB-D攻击成功率为59.4%。
{"title":"DepthFake: Spoofing 3D Face Authentication with a 2D Photo","authors":"Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu","doi":"10.1109/SP46215.2023.10179429","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179429","url":null,"abstract":"Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim’s face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79.4% and RGB-D attack success rate of 59.4% in the real world.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120807902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Program Modularization with Type-Based Dependence Analysis 基于类型依赖分析的实用程序模块化
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179412
Kangjie Lu
Today's software programs are bloating and have become extremely complex. As there is typically no internal isolation among modules in a program, a vulnerability can be exploited to corrupt the memory and take control of the whole program. Program modularization is thus a promising security mechanism that splits a complex program into smaller modules, so that memory-access instructions can be constrained from corrupting irrelevant modules. A general approach to realizing program modularization is dependence analysis which determines if an instruction is independent of specific code or data; and if so, it can be modularized. Unfortunately, dependence analysis in complex programs is generally considered infeasible, due to problems in data-flow analysis, such as unknown indirect-call targets, pointer aliasing, and path explosion. As a result, we have not seen practical automated program modularization built on dependence analysis.This paper presents a breakthrough—Type-based dependence analysis for Program Modularization (TyPM). Its goal is to determine which modules in a program can never pass a type of object (including references) to a memory-access instruction; therefore, objects of this type that are created by these modules can never be valid targets of the instruction. The idea is to employ a type-based analysis to first determine which types of data flows can take place between two modules, and then transitively resolve all dependent modules of a memory-access instruction, with respect to the specific type. Such an approach avoids the data-flow analysis and can be practical. We develop two important security applications based on TyPM: refining indirect-call targets and protecting critical data structures. We extensively evaluate TyPM with various system software, including an OS kernel, a hypervisor, UEFI firmware, and a browser. Results show that on average TyPM additionally refines indirect-call targets produced by the state of the art by 31%-91%. TyPM can also remove 99.9% of modules for memory-write instructions to prevent them from corrupting critical data structures in the Linux kernel.
今天的软件程序正在膨胀,并且已经变得极其复杂。由于程序中的模块之间通常没有内部隔离,因此可以利用漏洞破坏内存并控制整个程序。因此,程序模块化是一种很有前途的安全机制,它将一个复杂的程序分割成更小的模块,这样内存访问指令就可以受到约束,不会破坏不相关的模块。实现程序模块化的一般方法是依赖性分析,它确定指令是否独立于特定的代码或数据;如果是这样,它可以被模块化。不幸的是,由于数据流分析中存在未知的间接调用目标、指针混叠和路径爆炸等问题,复杂程序中的依赖分析通常被认为是不可行的。因此,我们还没有看到建立在依赖性分析基础上的实用的自动化程序模块化。提出了一种突破性的基于类型的程序模块化(TyPM)依赖分析方法。它的目标是确定程序中的哪些模块永远不能将对象类型(包括引用)传递给内存访问指令;因此,由这些模块创建的这种类型的对象永远不可能是指令的有效目标。其思想是采用基于类型的分析,首先确定两个模块之间可以发生哪种类型的数据流,然后根据特定类型传递地解析内存访问指令的所有依赖模块。这种方法避免了数据流分析,具有实用性。我们基于TyPM开发了两个重要的安全应用程序:精炼间接调用目标和保护关键数据结构。我们使用各种系统软件对TyPM进行了广泛的评估,包括操作系统内核、管理程序、UEFI固件和浏览器。结果表明,平均而言,TyPM对现有技术产生的间接调用目标进行了31%-91%的额外改进。TyPM还可以删除99.9%的内存写指令模块,以防止它们破坏Linux内核中的关键数据结构。
{"title":"Practical Program Modularization with Type-Based Dependence Analysis","authors":"Kangjie Lu","doi":"10.1109/SP46215.2023.10179412","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179412","url":null,"abstract":"Today's software programs are bloating and have become extremely complex. As there is typically no internal isolation among modules in a program, a vulnerability can be exploited to corrupt the memory and take control of the whole program. Program modularization is thus a promising security mechanism that splits a complex program into smaller modules, so that memory-access instructions can be constrained from corrupting irrelevant modules. A general approach to realizing program modularization is dependence analysis which determines if an instruction is independent of specific code or data; and if so, it can be modularized. Unfortunately, dependence analysis in complex programs is generally considered infeasible, due to problems in data-flow analysis, such as unknown indirect-call targets, pointer aliasing, and path explosion. As a result, we have not seen practical automated program modularization built on dependence analysis.This paper presents a breakthrough—Type-based dependence analysis for Program Modularization (TyPM). Its goal is to determine which modules in a program can never pass a type of object (including references) to a memory-access instruction; therefore, objects of this type that are created by these modules can never be valid targets of the instruction. The idea is to employ a type-based analysis to first determine which types of data flows can take place between two modules, and then transitively resolve all dependent modules of a memory-access instruction, with respect to the specific type. Such an approach avoids the data-flow analysis and can be practical. We develop two important security applications based on TyPM: refining indirect-call targets and protecting critical data structures. We extensively evaluate TyPM with various system software, including an OS kernel, a hypervisor, UEFI firmware, and a browser. Results show that on average TyPM additionally refines indirect-call targets produced by the state of the art by 31%-91%. TyPM can also remove 99.9% of modules for memory-write instructions to prevent them from corrupting critical data structures in the Linux kernel.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122863974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling D-ARM:基于轻量级超集指令解释和图建模的ARM二进制文件反汇编
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179307
Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, X. Zhang
ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of unique features making disassembly distinct from x86 disassembly, such as the mixing of ARM and Thumb instruction modes, implicit mode switching within an application, and more prevalent use of inlined data. Existing techniques cannot achieve high accuracy when binaries become complex and have undergone obfuscation. We propose a novel ARM binary disassembly technique that is particularly designed to address challenges in legacy code for 32-bit ARM binaries. It features a lightweight superset instruction interpretation method to derive rich semantic information and a graph-theory based method that aggregates such information to produce final results. Our comparative evaluation with a number of state-of-the-art disassemblers, including Ghidra, IDA, P-Disasm, XDA, D-Disasm, and Spedi, on thousands of binaries generated from SPEC2000 and SPEC2006 with various settings, and real-world applications collected online show that our technique D-ARM substantially outperforms the baselines.
ARM二进制分析在ARM系统安全中有着广泛的应用。一个基本的挑战是ARM的反汇编。ARM,特别是AArch32,具有许多独特的特性,使反汇编与x86反汇编不同,例如ARM和Thumb指令模式的混合,应用程序中的隐式模式切换,以及更普遍地使用内联数据。当二进制文件变得复杂并经历了混淆时,现有的技术无法达到高精度。我们提出了一种新的ARM二进制反汇编技术,专门用于解决32位ARM二进制文件遗留代码中的挑战。它具有轻量级的超集指令解释方法来获得丰富的语义信息,以及基于图论的方法来聚合这些信息以产生最终结果。我们与许多最先进的反汇编器(包括Ghidra、IDA、P-Disasm、XDA、D-Disasm和Spedi)对SPEC2000和SPEC2006在各种设置下生成的数千个二进制文件以及在线收集的实际应用程序进行了比较评估,结果表明我们的D-ARM技术大大优于基线。
{"title":"D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling","authors":"Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, X. Zhang","doi":"10.1109/SP46215.2023.10179307","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179307","url":null,"abstract":"ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of unique features making disassembly distinct from x86 disassembly, such as the mixing of ARM and Thumb instruction modes, implicit mode switching within an application, and more prevalent use of inlined data. Existing techniques cannot achieve high accuracy when binaries become complex and have undergone obfuscation. We propose a novel ARM binary disassembly technique that is particularly designed to address challenges in legacy code for 32-bit ARM binaries. It features a lightweight superset instruction interpretation method to derive rich semantic information and a graph-theory based method that aggregates such information to produce final results. Our comparative evaluation with a number of state-of-the-art disassemblers, including Ghidra, IDA, P-Disasm, XDA, D-Disasm, and Spedi, on thousands of binaries generated from SPEC2000 and SPEC2006 with various settings, and real-world applications collected online show that our technique D-ARM substantially outperforms the baselines.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Specification Blind Spots via Fuzz Testing 通过模糊测试找到规范盲点
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179438
Ru Ji, Meng Xu
A formally verified program is only as correct as its specifications (SPEC). But how to assure that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing-Assisted Specification Testing, as a potential answer. The key insight is to exploit and synergize the "redundancy" and "diversity" in formally verified programs for cross-checking. Specifically, within the same codebase, SPEC, implementation (CODE), and test suites are all derived from the same set of business requirements. Therefore, if some intention is captured in CODE and test case but not in SPEC, this is a strong indication that there is a blind spot in SPEC.Fast examines the SPEC for incompleteness issues in an automated way: it first locates SPEC gaps via mutation testing, i.e., by checking whether a CODE variant conforms to the original SPEC. If so, Fast further leverages the test suites to infer whether the gap is introduced by intention or by mistake. Depending on the codebase size, Fast may choose to generate CODE variants in either an enumerative or evolutionary way. Fast is applied to two open-source codebases that feature formal verification and helps to confirm 13 and 21 blind spots in their SPEC respectively. This highlights the prevalence of SPEC incompleteness in real-world applications.
经过正式验证的程序只有在其规范(SPEC)中才是正确的。但是如何确保SPEC是完整的并且没有漏洞呢?本文提出了Fast(模糊辅助规格测试的缩写)作为一种可能的解决方案。关键的洞察力是利用和协同“冗余”和“多样性”的正式验证程序进行交叉检查。具体地说,在相同的代码库中,SPEC、实现(CODE)和测试套件都来自相同的业务需求集。因此,如果在CODE和测试用例中捕获了一些意图,但在SPEC中没有,这是SPEC中存在盲点的强烈迹象。Fast以自动化的方式检查SPEC的不完整性问题:它首先通过突变测试定位SPEC差距,即,通过检查CODE变体是否符合原始SPEC。如果是这样,Fast进一步利用测试套件来推断差距是由意图还是错误引入的。根据代码库的大小,Fast可以选择以枚举或演化的方式生成CODE变体。Fast应用于两个开源代码库,这两个代码库以正式验证为特征,并分别帮助确认其SPEC中的13个和21个盲点。这突出了在实际应用程序中普遍存在的SPEC不完整性。
{"title":"Finding Specification Blind Spots via Fuzz Testing","authors":"Ru Ji, Meng Xu","doi":"10.1109/SP46215.2023.10179438","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179438","url":null,"abstract":"A formally verified program is only as correct as its specifications (SPEC). But how to assure that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing-Assisted Specification Testing, as a potential answer. The key insight is to exploit and synergize the \"redundancy\" and \"diversity\" in formally verified programs for cross-checking. Specifically, within the same codebase, SPEC, implementation (CODE), and test suites are all derived from the same set of business requirements. Therefore, if some intention is captured in CODE and test case but not in SPEC, this is a strong indication that there is a blind spot in SPEC.Fast examines the SPEC for incompleteness issues in an automated way: it first locates SPEC gaps via mutation testing, i.e., by checking whether a CODE variant conforms to the original SPEC. If so, Fast further leverages the test suites to infer whether the gap is introduced by intention or by mistake. Depending on the codebase size, Fast may choose to generate CODE variants in either an enumerative or evolutionary way. Fast is applied to two open-source codebases that feature formal verification and helps to confirm 13 and 21 blind spots in their SPEC respectively. This highlights the prevalence of SPEC incompleteness in real-world applications.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179409
Hanshen Xiao, Zihang Xiang, Di Wang, S. Devadas
We study the bias introduced in Differentially-Private Stochastic Gradient Descent (DP-SGD) with clipped or normalized per-sample gradient. As one of the most popular but artificial operations to ensure bounded sensitivity, gradient clipping enables composite privacy analysis of many iterative optimization methods without additional assumptions on either learning models or input data. Despite its wide applicability, gradient clipping also presents theoretical challenges in systematically instructing improvement of privacy or utility. In general, without an assumption on globally-bounded gradient, classic convergence analyses do not apply to clipped gradient descent. Further, given limited understanding of the utility loss, many existing improvements to DP-SGD are heuristic, especially in the applications of private deep learning.In this paper, we provide meaningful theoretical analysis validated by thorough empirical results of DP-SGD. We point out that the bias caused by gradient clipping is underestimated in previous works. For generic non-convex optimization via DP-SGD, we show one key factor contributing to the bias is the sampling noise of stochastic gradient to be clipped. Accordingly, we use the developed theory to build a series of improvements for sampling noise reduction from various perspectives. From an optimization angle, we study variance reduction techniques and propose inner-outer momentum. At the learning model (neural network) level, we propose several tricks to enhance network internal normalization and BatchClipping to carefully clip the gradient of a batch of samples. For data preprocessing, we provide theoretical justification of recently proposed improvements via data normalization and (self-)augmentation.Putting these systematic improvements together, private deep learning via DP-SGD can be significantly strengthened in many tasks. For example, in computer vision applications, with an (ϵ = 8, δ = 10−5) DP guarantee, we successfully train ResNet20 on CIFAR10 and SVHN with test accuracy 76.0% and 90.1%, respectively; for natural language processing, with (ϵ = 4, δ = 10−5), we successfully train a recurrent neural network on IMDb data with test accuracy 77.5%.
我们研究了具有截断或归一化的每样本梯度的微分私有随机梯度下降(DP-SGD)中引入的偏差。作为一种最流行的人工操作,梯度裁剪可以对许多迭代优化方法进行复合隐私分析,而无需对学习模型或输入数据进行额外的假设。尽管梯度裁剪具有广泛的适用性,但在系统地指导私密性或实用性的改进方面也提出了理论挑战。一般来说,如果没有全局有界梯度的假设,经典的收敛分析不适用于裁剪梯度下降。此外,由于对效用损失的理解有限,对DP-SGD的许多现有改进都是启发式的,特别是在私有深度学习的应用中。在本文中,我们提供了有意义的理论分析,并得到了DP-SGD的实证结果的验证。我们指出,以前的工作低估了梯度裁剪引起的偏置。对于通过DP-SGD进行的一般非凸优化,我们表明导致偏差的一个关键因素是要剪切的随机梯度的采样噪声。因此,我们运用已发展的理论,从不同的角度对采样降噪进行了一系列的改进。从优化的角度研究方差缩减技术,提出内外动量。在学习模型(神经网络)层面,我们提出了几个技巧来增强网络内部归一化和BatchClipping,以仔细剪辑一批样本的梯度。对于数据预处理,我们通过数据规范化和(自)增强为最近提出的改进提供了理论依据。将这些系统改进结合在一起,通过DP-SGD进行的私人深度学习可以在许多任务中得到显着加强。例如,在计算机视觉应用中,在(ε = 8, δ = 10−5)DP保证下,我们成功地在CIFAR10和SVHN上训练ResNet20,测试准确率分别为76.0%和90.1%;对于自然语言处理,我们使用(ε = 4, δ = 10−5)在IMDb数据上成功训练了一个递归神经网络,测试准确率为77.5%。
{"title":"A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction","authors":"Hanshen Xiao, Zihang Xiang, Di Wang, S. Devadas","doi":"10.1109/SP46215.2023.10179409","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179409","url":null,"abstract":"We study the bias introduced in Differentially-Private Stochastic Gradient Descent (DP-SGD) with clipped or normalized per-sample gradient. As one of the most popular but artificial operations to ensure bounded sensitivity, gradient clipping enables composite privacy analysis of many iterative optimization methods without additional assumptions on either learning models or input data. Despite its wide applicability, gradient clipping also presents theoretical challenges in systematically instructing improvement of privacy or utility. In general, without an assumption on globally-bounded gradient, classic convergence analyses do not apply to clipped gradient descent. Further, given limited understanding of the utility loss, many existing improvements to DP-SGD are heuristic, especially in the applications of private deep learning.In this paper, we provide meaningful theoretical analysis validated by thorough empirical results of DP-SGD. We point out that the bias caused by gradient clipping is underestimated in previous works. For generic non-convex optimization via DP-SGD, we show one key factor contributing to the bias is the sampling noise of stochastic gradient to be clipped. Accordingly, we use the developed theory to build a series of improvements for sampling noise reduction from various perspectives. From an optimization angle, we study variance reduction techniques and propose inner-outer momentum. At the learning model (neural network) level, we propose several tricks to enhance network internal normalization and BatchClipping to carefully clip the gradient of a batch of samples. For data preprocessing, we provide theoretical justification of recently proposed improvements via data normalization and (self-)augmentation.Putting these systematic improvements together, private deep learning via DP-SGD can be significantly strengthened in many tasks. For example, in computer vision applications, with an (ϵ = 8, δ = 10−5) DP guarantee, we successfully train ResNet20 on CIFAR10 and SVHN with test accuracy 76.0% and 90.1%, respectively; for natural language processing, with (ϵ = 4, δ = 10−5), we successfully train a recurrent neural network on IMDb data with test accuracy 77.5%.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1