首页 > 最新文献

2023 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses 时尚失礼:绕过浏览器反指纹防御的隐含风格指纹
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179437
Xu Lin, F. Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis
Browser fingerprinting remains a topic of particular interest for both the research community and the browser ecosystem, and various anti-fingerprinting countermeasures have been proposed by prior work or deployed by browsers. While preventing fingerprinting presents a challenging task, modern fingerprinting techniques heavily rely on JavaScript APIs, which creates a choke point that can be targeted by countermeasures. In this paper, we explore how browser fingerprints can be generated without using any JavaScript APIs. To that end we develop StylisticFP, a novel fingerprinting system that relies exclusively on CSS features and implicitly infers system characteristics, including advanced fingerprinting attributes like the list of supported fonts, through carefully constructed and arranged HTML elements. We empirically demonstrate our system's effectiveness against privacy-focused browsers (e.g., Safari, Firefox, Brave, Tor) and popular privacy-preserving extensions. We also conduct a pilot study in a research organization and find that our system is comparable to a state-of-the-art JavaScript-based fingerprinting library at distinguishing devices, while outperforming it against browsers with anti-fingerprinting defenses. Our work highlights an additional dimension of the significant challenge posed by browser fingerprinting, and reaffirms the need for more robust detection systems and countermeasures.
浏览器指纹识别仍然是研究社区和浏览器生态系统特别感兴趣的主题,各种反指纹识别对策已经被先前的工作提出或被浏览器部署。虽然防止指纹识别是一项具有挑战性的任务,但现代指纹识别技术严重依赖于JavaScript api,这创建了一个可以被对策针对的瓶颈。在本文中,我们将探讨如何在不使用任何JavaScript api的情况下生成浏览器指纹。为此,我们开发了StylisticFP,这是一个新颖的指纹识别系统,它完全依赖CSS特性,并通过精心构造和安排的HTML元素隐含地推断系统特征,包括高级指纹识别属性,如支持的字体列表。我们通过经验证明了我们的系统对以隐私为中心的浏览器(例如,Safari, Firefox, Brave, Tor)和流行的隐私保护扩展的有效性。我们还在一个研究组织中进行了试点研究,发现我们的系统在区分设备方面可以与最先进的基于javascript的指纹库相媲美,同时在对抗具有反指纹防御的浏览器方面表现优于它。我们的工作强调了浏览器指纹识别带来的重大挑战的另一个方面,并重申需要更强大的检测系统和对策。
{"title":"Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses","authors":"Xu Lin, F. Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis","doi":"10.1109/SP46215.2023.10179437","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179437","url":null,"abstract":"Browser fingerprinting remains a topic of particular interest for both the research community and the browser ecosystem, and various anti-fingerprinting countermeasures have been proposed by prior work or deployed by browsers. While preventing fingerprinting presents a challenging task, modern fingerprinting techniques heavily rely on JavaScript APIs, which creates a choke point that can be targeted by countermeasures. In this paper, we explore how browser fingerprints can be generated without using any JavaScript APIs. To that end we develop StylisticFP, a novel fingerprinting system that relies exclusively on CSS features and implicitly infers system characteristics, including advanced fingerprinting attributes like the list of supported fonts, through carefully constructed and arranged HTML elements. We empirically demonstrate our system's effectiveness against privacy-focused browsers (e.g., Safari, Firefox, Brave, Tor) and popular privacy-preserving extensions. We also conduct a pilot study in a research organization and find that our system is comparable to a state-of-the-art JavaScript-based fingerprinting library at distinguishing devices, while outperforming it against browsers with anti-fingerprinting defenses. Our work highlights an additional dimension of the significant challenge posed by browser fingerprinting, and reaffirms the need for more robust detection systems and countermeasures.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User Perceptions and Experiences with Smart Home Updates 用户对智能家居更新的感知和体验
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179459
Julie M. Haney, S. Furman
Updates may be one of the few tools consumers have to mitigate security and privacy vulnerabilities in smart home devices. However, little research has been undertaken to understand users’ perceptions and experiences with smart home updates. To address this gap, we conducted an online survey of a demographically diverse sample of 412 smart home users in the United States. We found that users overwhelmingly view smart home updates as important and urgent. However, relationships between update perceptions and security and privacy perceptions are less clear. We also identify problematic aspects of updates and gaps between current and preferred update modes. We then suggest ways in which update mechanisms and interfaces can be designed to be more usable and understandable to users.
更新可能是消费者用来减轻智能家居设备的安全和隐私漏洞的少数工具之一。然而,很少有研究来了解用户对智能家居更新的看法和体验。为了解决这一差距,我们对美国412名智能家居用户进行了一项在线调查。我们发现,绝大多数用户认为智能家居更新既重要又紧急。然而,更新感知与安全和隐私感知之间的关系不太清楚。我们还确定了更新的问题方面以及当前和首选更新模式之间的差距。然后,我们提出了更新机制和界面的设计方法,使其对用户来说更可用和更容易理解。
{"title":"User Perceptions and Experiences with Smart Home Updates","authors":"Julie M. Haney, S. Furman","doi":"10.1109/SP46215.2023.10179459","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179459","url":null,"abstract":"Updates may be one of the few tools consumers have to mitigate security and privacy vulnerabilities in smart home devices. However, little research has been undertaken to understand users’ perceptions and experiences with smart home updates. To address this gap, we conducted an online survey of a demographically diverse sample of 412 smart home users in the United States. We found that users overwhelmingly view smart home updates as important and urgent. However, relationships between update perceptions and security and privacy perceptions are less clear. We also identify problematic aspects of updates and gaps between current and preferred update modes. We then suggest ways in which update mechanisms and interfaces can be designed to be more usable and understandable to users.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128752782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution Half&Half:揭秘英特尔的定向分支预测器,实现快速、安全的分区执行
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179309
Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, D. Stefan, D. Tullsen
This paper presents Half&Half, a novel software defense against branch-based side-channel attacks. Half&Half isolates the effects of different protection domains on the conditional branch predictors (CBPs) in modern Intel processors. This work presents the first exhaustive analysis of modern conditional branch prediction structures, and reveals for the first time an unknown opportunity to physically partition all CBP structures and completely prevent leakage between two domains using the shared predictor. Half&Half is a software-only solution to branch predictor isolation that requires no changes to the hardware or ISA, and only requires minor modifications to be supported in existing compilers. We implement Half&Half in the LLVM and WebAssembly compilers and show that it incurs an order of magnitude lower overhead compared to the current state-of-the-art branch-based side-channel defenses.
本文提出了一种针对分支侧信道攻击的新型防御软件Half&Half。Half&Half隔离了现代英特尔处理器中不同保护域对条件分支预测器(CBPs)的影响。这项工作首次对现代条件分支预测结构进行了详尽的分析,并首次揭示了一个未知的机会,即使用共享预测器对所有CBP结构进行物理分区,并完全防止两个域之间的泄漏。Half&Half是一个分支预测器隔离的纯软件解决方案,不需要更改硬件或ISA,只需要在现有编译器中支持少量修改。我们在LLVM和WebAssembly编译器中实现了Half&Half,并表明与当前最先进的基于分支的侧通道防御相比,它的开销降低了一个数量级。
{"title":"Half&Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution","authors":"Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, D. Stefan, D. Tullsen","doi":"10.1109/SP46215.2023.10179309","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179309","url":null,"abstract":"This paper presents Half&Half, a novel software defense against branch-based side-channel attacks. Half&Half isolates the effects of different protection domains on the conditional branch predictors (CBPs) in modern Intel processors. This work presents the first exhaustive analysis of modern conditional branch prediction structures, and reveals for the first time an unknown opportunity to physically partition all CBP structures and completely prevent leakage between two domains using the shared predictor. Half&Half is a software-only solution to branch predictor isolation that requires no changes to the hardware or ISA, and only requires minor modifications to be supported in existing compilers. We implement Half&Half in the LLVM and WebAssembly compilers and show that it incurs an order of magnitude lower overhead compared to the current state-of-the-art branch-based side-channel defenses.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Access Control for Function Secret Sharing 功能秘密共享的私有访问控制
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179295
Sacha Servan-Schreiber, Simon Beyzerov, Elizabeth A. Yablon, Hyojae Park
Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f (x) for any input x, without learning information about f in the process.In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family $mathcal{F}$ and an access control list defined over the family, the evaluators receiving the shares of $f in mathcal{F}$ can efficiently check that the dealer knows the access key for f.This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems.Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest.We evaluate our constructions and show a 50–70× reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5–3×, when amortized over databases with 500,000 or more items.
功能秘密共享;Eurocrypt 2015)允许交易商与两个或更多评估者共享函数f。给定函数f的秘密份额,求值器可以局部计算任何输入x的f (x)的秘密份额,而无需在此过程中学习有关f的信息。本文对FSS的访问控制进行了初步研究。给定f的份额,评估者可以确保经销商被授权共享所提供的功能。对于函数族$mathcal{F}$和在函数族上定义的访问控制列表,在mathcal{F}$中接收$ F 的评估器可以有效地检查经销商是否知道F的访问密钥。该模型支持FSS的新应用,例如:(1)多方设置中的匿名身份验证,(2)私有数据库中的访问控制,以及(3)匿名通信系统中的身份验证和垃圾邮件预防。我们的定义和结构抽象并提高了最近几个系统的具体效率,这些系统实现了对FSS的访问控制的特设机制。我们提高效率背后的主要构建块是秘密共享元素的离散对数零知识知识证明,这可能是独立的兴趣。我们评估了我们的结构,并显示与匿名通信中使用的现有访问控制技术相比,计算开销减少了50 - 70倍。在其他应用程序(如私有数据库)中,引入访问控制的处理成本仅为1.5 - 3倍,分摊到拥有500,000或更多项的数据库上。
{"title":"Private Access Control for Function Secret Sharing","authors":"Sacha Servan-Schreiber, Simon Beyzerov, Elizabeth A. Yablon, Hyojae Park","doi":"10.1109/SP46215.2023.10179295","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179295","url":null,"abstract":"Function Secret Sharing (FSS; Eurocrypt 2015) allows a dealer to share a function f with two or more evaluators. Given secret shares of a function f, the evaluators can locally compute secret shares of f (x) for any input x, without learning information about f in the process.In this paper, we initiate the study of access control for FSS. Given the shares of f, the evaluators can ensure that the dealer is authorized to share the provided function. For a function family $mathcal{F}$ and an access control list defined over the family, the evaluators receiving the shares of $f in mathcal{F}$ can efficiently check that the dealer knows the access key for f.This model enables new applications of FSS, such as: (1) anonymous authentication in a multi-party setting, (2) access control in private databases, and (3) authentication and spam prevention in anonymous communication systems.Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS. The main building block behind our efficiency improvement is a discrete-logarithm zero-knowledge proof-of-knowledge over secret-shared elements, which may be of independent interest.We evaluate our constructions and show a 50–70× reduction in computational overhead compared to existing access control techniques used in anonymous communication. In other applications, such as private databases, the processing cost of introducing access control is only 1.5–3×, when amortized over databases with 500,000 or more items.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts BlindHub:支持可变金额的比特币兼容隐私保护支付通道中心
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179427
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, O. Ersoy, A. Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen
Payment Channel Hub (PCH) is a promising solution to the scalability issue of first-generation blockchains or cryptocurrencies such as Bitcoin. It supports off-chain payments between a sender and a receiver through an intermediary (called the tumbler). Relationship anonymity and value privacy are desirable features of privacy-preserving PCHs, which prevent the tumbler from identifying the sender and receiver pairs as well as the payment amounts. To our knowledge, all existing Bitcoin-compatible PCH constructions that guarantee relationship anonymity allow only a (predefined) fixed payment amount. Thus, to achieve payments with different amounts, they would require either multiple PCH systems or running one PCH system multiple times. Neither of these solutions would be deemed practical.In this paper, we propose the first Bitcoin-compatible PCH that achieves relationship anonymity and supports variable amounts for payment. To achieve this, we have several layers of technical constructions, each of which could be of independent interest to the community. First, we propose BlindChannel, a novel bi-directional payment channel protocol for privacy-preserving payments, where one of the channel parties is unable to see the channel balances. Then, we further propose BlindHub, a three-party (sender, tumbler, receiver) protocol for private conditional payments, where the tumbler pays to the receiver only if the sender pays to the tumbler. The appealing additional feature of BlindHub is that the tumbler cannot link the sender and the receiver while supporting a variable payment amount. To construct BlindHub, we also introduce two new cryptographic primitives as building blocks, namely Blind Adaptor Signature (BAS), and Flexible Blind Conditional Signature (FBCS). BAS is an adaptor signature protocol built on top of a blind signature scheme. FBCS is a new cryptographic notion enabling us to provide an atomic and privacy-preserving PCH. Lastly, we instantiate both BlindChannel and BlindHub protocols and present implementation results to show their practicality.
支付通道中心(PCH)是解决第一代区块链或比特币等加密货币的可扩展性问题的一个有前途的解决方案。它支持通过中介(称为tumbler)在发送方和接收方之间进行链下支付。关系匿名性和价值隐私性是隐私保护PCHs的理想特性,它可以防止破坏者识别发送方和接收方对以及支付金额。据我们所知,所有现有的保证关系匿名的比特币兼容PCH结构只允许(预定义的)固定支付金额。因此,为了实现不同金额的支付,他们要么需要多个PCH系统,要么需要多次运行一个PCH系统。这两种解决办法都被认为是不切实际的。在本文中,我们提出了第一个比特币兼容的PCH,它实现了关系匿名并支持可变支付金额。为了实现这一点,我们有几层技术结构,每一层都可能对社区有独立的兴趣。首先,我们提出了盲通道,这是一种用于保护隐私支付的新型双向支付通道协议,其中通道一方无法看到通道余额。然后,我们进一步提出了BlindHub,这是一个用于私人有条件支付的三方(发送方、翻转者、接收方)协议,其中翻转者只有在发送方向翻转者付款时才向接收方付款。BlindHub的另一个吸引人的功能是,在支持可变支付金额的情况下,玻璃杯不能连接发送方和接收方。为了构建盲hub,我们还引入了两个新的加密原语作为构建块,即盲适配器签名(BAS)和灵活盲条件签名(FBCS)。BAS是一种建立在盲签名方案之上的适配器签名协议。FBCS是一种新的密码学概念,使我们能够提供原子和隐私保护的PCH。最后,我们对盲通道和盲hub协议进行了实例化,并给出了实现结果来证明它们的实用性。
{"title":"BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts","authors":"Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, O. Ersoy, A. Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen","doi":"10.1109/SP46215.2023.10179427","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179427","url":null,"abstract":"Payment Channel Hub (PCH) is a promising solution to the scalability issue of first-generation blockchains or cryptocurrencies such as Bitcoin. It supports off-chain payments between a sender and a receiver through an intermediary (called the tumbler). Relationship anonymity and value privacy are desirable features of privacy-preserving PCHs, which prevent the tumbler from identifying the sender and receiver pairs as well as the payment amounts. To our knowledge, all existing Bitcoin-compatible PCH constructions that guarantee relationship anonymity allow only a (predefined) fixed payment amount. Thus, to achieve payments with different amounts, they would require either multiple PCH systems or running one PCH system multiple times. Neither of these solutions would be deemed practical.In this paper, we propose the first Bitcoin-compatible PCH that achieves relationship anonymity and supports variable amounts for payment. To achieve this, we have several layers of technical constructions, each of which could be of independent interest to the community. First, we propose BlindChannel, a novel bi-directional payment channel protocol for privacy-preserving payments, where one of the channel parties is unable to see the channel balances. Then, we further propose BlindHub, a three-party (sender, tumbler, receiver) protocol for private conditional payments, where the tumbler pays to the receiver only if the sender pays to the tumbler. The appealing additional feature of BlindHub is that the tumbler cannot link the sender and the receiver while supporting a variable payment amount. To construct BlindHub, we also introduce two new cryptographic primitives as building blocks, namely Blind Adaptor Signature (BAS), and Flexible Blind Conditional Signature (FBCS). BAS is an adaptor signature protocol built on top of a blind signature scheme. FBCS is a new cryptographic notion enabling us to provide an atomic and privacy-preserving PCH. Lastly, we instantiate both BlindChannel and BlindHub protocols and present implementation results to show their practicality.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121698141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of Inconsistencies in Privacy Practices of Browser Extensions 检测不一致的隐私实践的浏览器扩展
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179338
D. Bui, Brian Tang, K. Shin
All major web browsers support extensions to provide additional functionalities and enhance users’ browsing experience while the extensions can access and collect users’ data during their web browsing. Although the web extensions inform users of their data practices via multiple forms of notices, prior work has overlooked the critical gap between the actual data practices and the published privacy notices of browser extensions. To fill this gap, we propose ExtPrivA that automatically detects the inconsistencies between browser extensions’ data collection and their privacy disclosures. From the privacy policies and Dashboard disclosures, ExtPrivA extracts privacy statements to have a clear interpretation of the privacy practices of an extension. It emulates user interactions to trigger the extension’s functionalities and analyzes the initiators of network requests to accurately extract the users’ data transferred by the extension from the browser to external servers. Our end-to-end evaluation has shown ExtPrivA to detect inconsistencies between the privacy disclosures and data-collection behavior with an 85% precision. In a large-scale study of 47.2k extensions on the Chrome Web Store, we found 820 extensions with 1,290 flows that are inconsistent with their privacy statements. Even worse, we have found 525 pairs of contradictory privacy statements in the Dashboard disclosures and privacy policies of 360 extensions. These discrepancies between the privacy disclosures and the actual data-collection behavior are deemed as serious violations of the Store’s policies. Our findings highlight the critical issues in the privacy disclosures of browser extensions that potentially mislead, and even pose high privacy risks to, end-users.
所有主要的web浏览器都支持扩展,以提供额外的功能,增强用户的浏览体验,而扩展可以在用户浏览网页时访问和收集用户的数据。虽然网络扩展通过多种形式的通知告知用户他们的数据实践,但之前的工作忽略了实际数据实践与浏览器扩展发布的隐私声明之间的关键差距。为了填补这一空白,我们提出了ExtPrivA,它可以自动检测浏览器扩展的数据收集和隐私披露之间的不一致。从隐私政策和仪表板披露中,ExtPrivA提取隐私声明,以便对扩展的隐私实践有一个清晰的解释。它模拟用户交互来触发扩展的功能,并分析网络请求的发起者,以准确地提取由扩展从浏览器传输到外部服务器的用户数据。我们的端到端评估表明,ExtPrivA能够以85%的精度检测隐私披露和数据收集行为之间的不一致性。在一项针对Chrome Web Store上47.2万个扩展的大规模研究中,我们发现820个扩展中有1290个流与其隐私声明不一致。更糟糕的是,我们在360扩展的仪表板披露和隐私政策中发现了525对相互矛盾的隐私声明。这些隐私披露与实际数据收集行为之间的差异被视为严重违反商店政策。我们的研究结果强调了浏览器扩展隐私披露中的关键问题,这些问题可能会误导甚至给最终用户带来很高的隐私风险。
{"title":"Detection of Inconsistencies in Privacy Practices of Browser Extensions","authors":"D. Bui, Brian Tang, K. Shin","doi":"10.1109/SP46215.2023.10179338","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179338","url":null,"abstract":"All major web browsers support extensions to provide additional functionalities and enhance users’ browsing experience while the extensions can access and collect users’ data during their web browsing. Although the web extensions inform users of their data practices via multiple forms of notices, prior work has overlooked the critical gap between the actual data practices and the published privacy notices of browser extensions. To fill this gap, we propose ExtPrivA that automatically detects the inconsistencies between browser extensions’ data collection and their privacy disclosures. From the privacy policies and Dashboard disclosures, ExtPrivA extracts privacy statements to have a clear interpretation of the privacy practices of an extension. It emulates user interactions to trigger the extension’s functionalities and analyzes the initiators of network requests to accurately extract the users’ data transferred by the extension from the browser to external servers. Our end-to-end evaluation has shown ExtPrivA to detect inconsistencies between the privacy disclosures and data-collection behavior with an 85% precision. In a large-scale study of 47.2k extensions on the Chrome Web Store, we found 820 extensions with 1,290 flows that are inconsistent with their privacy statements. Even worse, we have found 525 pairs of contradictory privacy statements in the Dashboard disclosures and privacy policies of 360 extensions. These discrepancies between the privacy disclosures and the actual data-collection behavior are deemed as serious violations of the Store’s policies. Our findings highlight the critical issues in the privacy disclosures of browser extensions that potentially mislead, and even pose high privacy risks to, end-users.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115272695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Jolt: Recovering TLS Signing Keys via Rowhammer Faults Jolt:通过Rowhammer故障恢复TLS签名密钥
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179450
K. Mus, Yarkin Doröz, M. Tol, Kristi Rahman, B. Sunar
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA and (EC)DSA are used to sign the state of the agreed upon protocol parameters during the handshake phase. Naturally, RSA and (EC)DSA implementations have become the target of numerous attacks, including powerful side-channel attacks. Hence, cryptographic libraries were patched repeatedly over the years.Here we introduce Jolt, a novel attack targeting signature scheme implementations. Our attack exploits faulty signatures gained by injecting faults during signature generation. By using the signature verification primitive, we correct faulty signatures and, in the process deduce bits of the secret signing key. Compared to recent attacks that exploit single bit biases in the nonce that require 245 signatures, our attack requires less than a thousand faulty signatures for a 256-bit (EC)DSA. The performance improvement is due to the fact that our attack targets the secret signing key, which does not change across signing sessions. We show that the proposed attack also works on Schnorr and RSA signatures with minor modifications.We demonstrate the viability of Jolt by running experiments targeting TLS handshakes in common cryptographic libraries such as WolfSSL, OpenSSL, Microsoft SymCrypt, LibreSSL, and Amazon s2n. On our target platform, the online phase takes less than 2 hours to recover 192 bits of a 256-bit ECDSA key, which is sufficient for full key recovery. We note that while RSA signatures are protected in popular cryptographic libraries, OpenSSL remains vulnerable to double fault injection. We have also reviewed their Federal Information Processing Standard (FIPS) hardened versions which are slightly less efficient but still vulnerable to our attack. We found that (EC)DSA signatures remain largely unprotected against software-only faults, posing a threat to real-life deployments such as TLS, and potentially other security protocols such as SSH and IPSec. This highlights the need for a thorough review and implementation of faults checking in security protocol implementations.
为了保护TLS、SSH、IPSec等安全协议的完整性,目前广泛采用DSA、ECDSA、RSA等数字签名方案。例如,在TLS中,RSA和(EC)DSA用于在握手阶段对商定的协议参数的状态进行签名。当然,RSA和(EC)DSA实现已经成为许多攻击的目标,包括强大的侧信道攻击。因此,加密库多年来不断被修补。本文介绍了一种针对签名方案实现的新型攻击——Jolt。我们的攻击利用了在签名生成过程中注入错误而获得的错误签名。通过使用签名验证原语,我们纠正错误的签名,并在此过程中推断出秘密签名密钥的位。与最近利用nonce中需要245个签名的单个位偏差的攻击相比,我们的攻击对256位(EC)DSA只需要不到一千个错误签名。性能的提高是由于我们的攻击目标是秘密签名密钥,它在签名会话中不会改变。我们表明,所提出的攻击也适用于Schnorr和RSA签名,只需稍加修改。我们通过在常见的加密库(如WolfSSL、OpenSSL、Microsoft SymCrypt、LibreSSL和Amazon s2n)中运行针对TLS握手的实验来证明Jolt的可行性。在我们的目标平台上,在线阶段需要不到2小时的时间来恢复256位ECDSA密钥中的192位,这足以实现完整的密钥恢复。我们注意到,虽然RSA签名在流行的加密库中受到保护,但OpenSSL仍然容易受到双故障注入的攻击。我们还审查了他们的联邦信息处理标准(FIPS)强化版本,该版本的效率略低,但仍然容易受到我们的攻击。我们发现(EC)DSA签名在很大程度上仍然不受软件故障的保护,这对现实生活中的部署(如TLS)以及潜在的其他安全协议(如SSH和IPSec)构成了威胁。这突出了对安全协议实现中的错误检查进行彻底检查和实现的必要性。
{"title":"Jolt: Recovering TLS Signing Keys via Rowhammer Faults","authors":"K. Mus, Yarkin Doröz, M. Tol, Kristi Rahman, B. Sunar","doi":"10.1109/SP46215.2023.10179450","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179450","url":null,"abstract":"Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA and (EC)DSA are used to sign the state of the agreed upon protocol parameters during the handshake phase. Naturally, RSA and (EC)DSA implementations have become the target of numerous attacks, including powerful side-channel attacks. Hence, cryptographic libraries were patched repeatedly over the years.Here we introduce Jolt, a novel attack targeting signature scheme implementations. Our attack exploits faulty signatures gained by injecting faults during signature generation. By using the signature verification primitive, we correct faulty signatures and, in the process deduce bits of the secret signing key. Compared to recent attacks that exploit single bit biases in the nonce that require 245 signatures, our attack requires less than a thousand faulty signatures for a 256-bit (EC)DSA. The performance improvement is due to the fact that our attack targets the secret signing key, which does not change across signing sessions. We show that the proposed attack also works on Schnorr and RSA signatures with minor modifications.We demonstrate the viability of Jolt by running experiments targeting TLS handshakes in common cryptographic libraries such as WolfSSL, OpenSSL, Microsoft SymCrypt, LibreSSL, and Amazon s2n. On our target platform, the online phase takes less than 2 hours to recover 192 bits of a 256-bit ECDSA key, which is sufficient for full key recovery. We note that while RSA signatures are protected in popular cryptographic libraries, OpenSSL remains vulnerable to double fault injection. We have also reviewed their Federal Information Processing Standard (FIPS) hardened versions which are slightly less efficient but still vulnerable to our attack. We found that (EC)DSA signatures remain largely unprotected against software-only faults, posing a threat to real-life deployments such as TLS, and potentially other security protocols such as SSH and IPSec. This highlights the need for a thorough review and implementation of faults checking in security protocol implementations.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Message from the General Chair 主席致辞
Pub Date : 2023-05-01 DOI: 10.1109/TABLETOP.2006.21
Leoncio Aguilar Negrete
Welcome to APCCAS and PrimeAsia 2019. On behalf of the organizing committee, it is our pleasure to cordially welcome and invite you to the 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2019), and the 2019 IEEE Asia Pacific Conference on Post Graduate Research in Microelectronics and Electronics (PrimeAsia 2019), to be held in Bangkok, Thailand, during November 11-14, 2019. The IEEE APCCAS is one of the major conferences sponsored by the IEEE Circuits and Systems (CAS) Society and has been held in Asia-Pacific countries, where APCCAS 2019 is the 15th annual conference in the series. APCCAS is the international forum for researchers, scientists, educators, students and engineers to discuss and exchange experiences with the aim to stimulate and enhance the research and development in the areas that are related to Circuits and Systems. This year the theme of the conference is “Innovative CAS Towards Sustainable Energy and Technology Disruption”. Bangkok (“Krungthep” in Thai or the city of Angles) is the city of very famous and appreciated by visitors in a large range of attractions, from temples, the Grand Palace, shopping centers, galleries and museums. Most of the sightseeing places can easily be reached by Skytrain (BTS) or Underground train (MRT). Please make sure to take this opportunity to visit and get around Bangkok with your own eyes. Finally, as the General Chair of the Conference, I would like to invite you to submit your technical paper for review, presentation and also attend the APCCAS and PrimeAsia 2019. We do hope that this conference will provide a good opportunity for researchers to meet and exchange ideas and to make contacts and collaboration.
欢迎参加APCCAS和PrimeAsia 2019。我们谨代表组委会热烈欢迎并邀请您参加将于2019年11月11日至14日在泰国曼谷举行的2019年IEEE亚太电路与系统会议(APCCAS 2019)和2019年IEEE亚太微电子研究生研究会议(PrimeAsia 2019)。IEEE APCCAS是由IEEE电路与系统(CAS)学会主办的主要会议之一,已在亚太国家举行,APCCAS 2019是该系列的第15届年会。APCCAS是研究人员、科学家、教育工作者、学生和工程师讨论和交流经验的国际论坛,旨在促进和加强与电路和系统相关领域的研究和发展。今年会议的主题是“创新CAS走向可持续能源和技术颠覆”。曼谷(泰语“Krungthep”或盎格鲁之城)是一个非常著名的城市,游客们欣赏它的众多景点,从寺庙、大皇宫、购物中心、画廊和博物馆。乘坐轻轨(BTS)或地铁(MRT)可以轻松到达大多数观光景点。请一定要抓住这个机会,用自己的眼睛游览曼谷。最后,作为会议的总主席,我想邀请您提交您的技术论文以供审查和展示,并参加APCCAS和PrimeAsia 2019。我们希望这次会议将为研究人员提供一个良好的机会,以满足和交流思想,并进行联系和合作。
{"title":"Message from the General Chair","authors":"Leoncio Aguilar Negrete","doi":"10.1109/TABLETOP.2006.21","DOIUrl":"https://doi.org/10.1109/TABLETOP.2006.21","url":null,"abstract":"Welcome to APCCAS and PrimeAsia 2019. On behalf of the organizing committee, it is our pleasure to cordially welcome and invite you to the 2019 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2019), and the 2019 IEEE Asia Pacific Conference on Post Graduate Research in Microelectronics and Electronics (PrimeAsia 2019), to be held in Bangkok, Thailand, during November 11-14, 2019. The IEEE APCCAS is one of the major conferences sponsored by the IEEE Circuits and Systems (CAS) Society and has been held in Asia-Pacific countries, where APCCAS 2019 is the 15th annual conference in the series. APCCAS is the international forum for researchers, scientists, educators, students and engineers to discuss and exchange experiences with the aim to stimulate and enhance the research and development in the areas that are related to Circuits and Systems. This year the theme of the conference is “Innovative CAS Towards Sustainable Energy and Technology Disruption”. Bangkok (“Krungthep” in Thai or the city of Angles) is the city of very famous and appreciated by visitors in a large range of attractions, from temples, the Grand Palace, shopping centers, galleries and museums. Most of the sightseeing places can easily be reached by Skytrain (BTS) or Underground train (MRT). Please make sure to take this opportunity to visit and get around Bangkok with your own eyes. Finally, as the General Chair of the Conference, I would like to invite you to submit your technical paper for review, presentation and also attend the APCCAS and PrimeAsia 2019. We do hope that this conference will provide a good opportunity for researchers to meet and exchange ideas and to make contacts and collaboration.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“It’s up to the Consumer to be Smart”: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit “是否聪明取决于消费者”:了解Reddit上智能家居用户的安全和隐私态度
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179344
Jingjie Li, Kaiwen Sun, Brittany Skye Huff, Anna Marie Bierley, Younghyun Kim, F. Schaub, Kassem Fawaz
Smart home technologies offer many benefits to users. Yet, they also carry complex security and privacy implications that users often struggle to assess and account for during adoption. To better understand users’ considerations and attitudes regarding smart home security and privacy, in particular how users develop them progressively, we conducted a qualitative content analysis of 4,957 Reddit comments in 180 security- and privacy-related discussion threads from /r/homeautomation, a major Reddit smart home forum. Our analysis reveals that users’ security and privacy attitudes, manifested in the levels of concern and degree to which they incorporate protective strategies, are shaped by multi-dimensional considerations. Users’ attitudes evolve according to changing contextual factors, such as adoption phases, and how they become aware of these factors. Further, we describe how online discourse about security and privacy risks and protections contributes to individual and collective attitude development. Based on our findings, we provide recommendations to improve smart home designs, support users’ attitude development, facilitate information exchange, and guide future research regarding smart home security and privacy.
智能家居技术为用户提供了许多好处。然而,它们也带来了复杂的安全和隐私问题,用户在采用过程中往往难以评估和解释这些问题。为了更好地了解用户对智能家居安全和隐私的考虑和态度,特别是用户如何逐步发展它们,我们对Reddit上一个主要的智能家居论坛/r/homeautomation的180个安全和隐私相关讨论线程中的4,957条评论进行了定性内容分析。我们的分析表明,用户的安全和隐私态度,表现在关注程度和他们纳入保护策略的程度上,是由多维考虑因素形成的。用户的态度会随着环境因素的变化而变化,比如采用阶段,以及他们如何意识到这些因素。此外,我们描述了关于安全和隐私风险和保护的在线话语如何有助于个人和集体态度的发展。基于我们的研究结果,我们提出了改进智能家居设计的建议,支持用户的态度发展,促进信息交流,并指导未来关于智能家居安全和隐私的研究。
{"title":"“It’s up to the Consumer to be Smart”: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit","authors":"Jingjie Li, Kaiwen Sun, Brittany Skye Huff, Anna Marie Bierley, Younghyun Kim, F. Schaub, Kassem Fawaz","doi":"10.1109/SP46215.2023.10179344","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179344","url":null,"abstract":"Smart home technologies offer many benefits to users. Yet, they also carry complex security and privacy implications that users often struggle to assess and account for during adoption. To better understand users’ considerations and attitudes regarding smart home security and privacy, in particular how users develop them progressively, we conducted a qualitative content analysis of 4,957 Reddit comments in 180 security- and privacy-related discussion threads from /r/homeautomation, a major Reddit smart home forum. Our analysis reveals that users’ security and privacy attitudes, manifested in the levels of concern and degree to which they incorporate protective strategies, are shaped by multi-dimensional considerations. Users’ attitudes evolve according to changing contextual factors, such as adoption phases, and how they become aware of these factors. Further, we describe how online discourse about security and privacy risks and protections contributes to individual and collective attitude development. Based on our findings, we provide recommendations to improve smart home designs, support users’ attitude development, facilitate information exchange, and guide future research regarding smart home security and privacy.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning Flamingo:多轮单服务器安全聚合与私有联邦学习的应用
Pub Date : 2023-05-01 DOI: 10.1109/SP46215.2023.10179434
Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, T. Rabin
This paper introduces Flamingo, a system for secure aggregation of data across a large set of clients. In secure aggregation, a server sums up the private inputs of clients and obtains the result without learning anything about the individual inputs beyond what is implied by the final sum. Flamingo focuses on the multi-round setting found in federated learning in which many consecutive summations (averages) of model weights are performed to derive a good model. Previous protocols, such as Bell et al. (CCS ’20), have been designed for a single round and are adapted to the federated learning setting by repeating the protocol multiple times. Flamingo eliminates the need for the per-round setup of previous protocols, and has a new lightweight dropout resilience protocol to ensure that if clients leave in the middle of a sum the server can still obtain a meaningful result. Furthermore, Flamingo introduces a new way to locally choose the so-called client neighborhood introduced by Bell et al. These techniques help Flamingo reduce the number of interactions between clients and the server, resulting in a significant reduction in the end-to-end runtime for a full training session over prior work.We implement and evaluate Flamingo and show that it can securely train a neural network on the (Extended) MNIST and CIFAR-100 datasets, and the model converges without a loss in accuracy, compared to a non-private federated learning system.
本文介绍了Flamingo,一个用于跨大型客户端安全聚合数据的系统。在安全聚合中,服务器对客户机的私有输入求和并获得结果,而不需要了解最终总和所暗示的任何关于单个输入的信息。Flamingo专注于在联邦学习中发现的多轮设置,其中执行许多模型权重的连续求和(平均)以获得一个好的模型。以前的协议,如Bell等人(CCS ' 20),是为单轮设计的,并通过多次重复协议来适应联邦学习设置。Flamingo消除了以前协议的每轮设置的需要,并且有一个新的轻量级退出弹性协议,以确保如果客户端在一笔钱的中间离开,服务器仍然可以获得有意义的结果。此外,Flamingo引入了Bell等人引入的一种新的本地选择所谓客户端邻域的方法。这些技术帮助Flamingo减少了客户机和服务器之间的交互次数,从而大大减少了完整培训会话的端到端运行时时间。我们实现并评估了Flamingo,并表明它可以在(扩展的)MNIST和CIFAR-100数据集上安全地训练神经网络,并且与非私有联邦学习系统相比,模型收敛而精度没有损失。
{"title":"Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning","authors":"Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, T. Rabin","doi":"10.1109/SP46215.2023.10179434","DOIUrl":"https://doi.org/10.1109/SP46215.2023.10179434","url":null,"abstract":"This paper introduces Flamingo, a system for secure aggregation of data across a large set of clients. In secure aggregation, a server sums up the private inputs of clients and obtains the result without learning anything about the individual inputs beyond what is implied by the final sum. Flamingo focuses on the multi-round setting found in federated learning in which many consecutive summations (averages) of model weights are performed to derive a good model. Previous protocols, such as Bell et al. (CCS ’20), have been designed for a single round and are adapted to the federated learning setting by repeating the protocol multiple times. Flamingo eliminates the need for the per-round setup of previous protocols, and has a new lightweight dropout resilience protocol to ensure that if clients leave in the middle of a sum the server can still obtain a meaningful result. Furthermore, Flamingo introduces a new way to locally choose the so-called client neighborhood introduced by Bell et al. These techniques help Flamingo reduce the number of interactions between clients and the server, resulting in a significant reduction in the end-to-end runtime for a full training session over prior work.We implement and evaluate Flamingo and show that it can securely train a neural network on the (Extended) MNIST and CIFAR-100 datasets, and the model converges without a loss in accuracy, compared to a non-private federated learning system.","PeriodicalId":439989,"journal":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2023 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1