首页 > 最新文献

Journal of Computer Security最新文献

英文 中文
Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism 基于自适应多级联 ResNet 的高效多媒体隐写术框架,采用鱼-企鹅混合口编码优化机制
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.3233/jcs-230049
Garikamukkala Vijaya Kiran, Vidhya Krishnan
A massive amount of data is transmitted in the Internet of Things (IoT). Nowadays, the concerning of security issues are the major factor while transferring data through wireless networks. Since, data privacy becomes complicated. In this research work, a newly proposed model for multimedia steganography is developed. Initially, the required video is obtained from the publically available datasets, and then the acquired input is subjected to the Adaptive Discrete Cosine Transformation (DCT) based block process. The optimal blocks are chosen by the Adaptive Multi-cascaded ResNet (AMC-ResNet) model for applying stego data. Here, the parameter optimization takes place in the DCT and ResNet model to enhance the steganography performance via the Mouth Brooding Fish Emperor Penguin Optimization (MBFEPO) derived from the Mouth Brooding Fish Algorithm (MBFA) and Emperor Penguin Optimization Algorithm (EPOA). Finally, the inverse DCT is employed at the blocks to get the final stego video. In the audio steganography phase, the wanted audio is gathered from external websites. The collected data are given to the Short-time Fourier Transform (STFT) to convert into the spectrogram image, and then the spectrogram image is given to the Adaptive DCT block, selecting the block to apply stego data. Thus, the blocks are selected with the utilization of the Adaptive Multi-cascaded ResNet (AMC-ResNet), where the parameters within the DCT and the ResNet are optimized via the same MBFEPO to improve the performance. After, the Inverse ADCT is applied to reconstruct the spectrogram image. Then, the resultant stego audio is obtained by using the Inverse STFT. Finally, several experiments are conducted to estimate the working ability of the proposed steganography model. The outcome of the recommended model shows 12.3%, 52.6%, 12.3%, and 84.3% better performance SFO, HBA, MBFA, and EPOA in terms of median. The recommended model performs superior performance rather than the existing approaches.
物联网(IoT)传输大量数据。如今,在通过无线网络传输数据时,有关安全问题是主要因素。因此,数据隐私变得复杂。在这项研究工作中,开发了一种新提出的多媒体隐写术模型。首先,从公开的数据集中获取所需的视频,然后对获取的输入数据进行基于自适应离散余弦变换(DCT)的块处理。自适应多级联 ResNet(AMC-ResNet)模型选择最佳区块来应用偷窃数据。在此,DCT 和 ResNet 模型中进行了参数优化,以通过从鱼口编码算法(MBFA)和帝企鹅优化算法(EPOA)衍生出的鱼口编码帝企鹅优化算法(MBFEPO)提高隐写性能。最后,在区块中使用反 DCT,得到最终的隐秘视频。在音频隐写阶段,需要从外部网站收集音频。收集到的数据通过短时傅里叶变换(STFT)转换成频谱图图像,然后将频谱图图像交给自适应 DCT 块,选择应用偷窃数据的块。因此,块的选择利用了自适应多级联 ResNet(AMC-ResNet),其中 DCT 和 ResNet 内的参数通过相同的 MBFEPO 进行优化,以提高性能。然后,应用反 ADCT 重构频谱图图像。然后,通过使用反 STFT 来获得偷窃音频。最后,我们进行了多次实验,以评估建议的隐写术模型的工作能力。结果显示,在中位数方面,推荐模型分别比 SFO、HBA、MBFA 和 EPOA 高出 12.3%、52.6%、12.3% 和 84.3%。与现有方法相比,推荐模型的性能更优越。
{"title":"Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism","authors":"Garikamukkala Vijaya Kiran, Vidhya Krishnan","doi":"10.3233/jcs-230049","DOIUrl":"https://doi.org/10.3233/jcs-230049","url":null,"abstract":"A massive amount of data is transmitted in the Internet of Things (IoT). Nowadays, the concerning of security issues are the major factor while transferring data through wireless networks. Since, data privacy becomes complicated. In this research work, a newly proposed model for multimedia steganography is developed. Initially, the required video is obtained from the publically available datasets, and then the acquired input is subjected to the Adaptive Discrete Cosine Transformation (DCT) based block process. The optimal blocks are chosen by the Adaptive Multi-cascaded ResNet (AMC-ResNet) model for applying stego data. Here, the parameter optimization takes place in the DCT and ResNet model to enhance the steganography performance via the Mouth Brooding Fish Emperor Penguin Optimization (MBFEPO) derived from the Mouth Brooding Fish Algorithm (MBFA) and Emperor Penguin Optimization Algorithm (EPOA). Finally, the inverse DCT is employed at the blocks to get the final stego video. In the audio steganography phase, the wanted audio is gathered from external websites. The collected data are given to the Short-time Fourier Transform (STFT) to convert into the spectrogram image, and then the spectrogram image is given to the Adaptive DCT block, selecting the block to apply stego data. Thus, the blocks are selected with the utilization of the Adaptive Multi-cascaded ResNet (AMC-ResNet), where the parameters within the DCT and the ResNet are optimized via the same MBFEPO to improve the performance. After, the Inverse ADCT is applied to reconstruct the spectrogram image. Then, the resultant stego audio is obtained by using the Inverse STFT. Finally, several experiments are conducted to estimate the working ability of the proposed steganography model. The outcome of the recommended model shows 12.3%, 52.6%, 12.3%, and 84.3% better performance SFO, HBA, MBFA, and EPOA in terms of median. The recommended model performs superior performance rather than the existing approaches.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141803397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Images using Bifid Cipher associated with Arnold Map 使用与阿诺德地图相关的双翼密码保护图像
IF 1.2 Q3 Engineering Pub Date : 2024-06-04 DOI: 10.3233/jcs-230101
Sachin Kumar, Swati Suyal, Ashok Kumar
In this paper, a scheme for image data security is designed by using Bifid cipher and Arnold map. The conventional 2D-Bifid cipher is changed to handle the encryption and decryption of color images. Further, a block-based method is realized using Arnold map to encrypt and decrypt the image data of square as well as non-square sizes. The proposed scheme is constructed on a widely adopted cryptographic framework, i.e., substitution-permutation design, where Bifid cipher-based scheme acts as a substitution layer and Arnold map-based scheme acts as a diffusion layer. The designed scheme has a huge key space with key sensitivity not only to accurate keys but also to their accurate orders. The practicability and performance of the designed scheme is validated by conducting a detailed analysis along with a comparative study. This paper contributes to a simple, efficient and secure image encryption method, which outperforms to the related works.
本文设计了一种使用 Bifid 密码和阿诺德图的图像数据安全方案。传统的 2D 双叉密码被改成处理彩色图像的加密和解密。此外,还利用阿诺德图实现了一种基于块的方法,用于加密和解密正方形和非正方形大小的图像数据。所提出的方案是在广泛采用的加密框架(即置换-扩散设计)上构建的,其中基于 Bifid 密码的方案充当置换层,基于阿诺德图的方案充当扩散层。所设计的方案具有巨大的密钥空间,其密钥敏感性不仅取决于精确的密钥,还取决于它们的精确顺序。通过详细分析和比较研究,验证了所设计方案的实用性和性能。本文提出了一种简单、高效、安全的图像加密方法,其性能优于相关研究成果。
{"title":"Securing Images using Bifid Cipher associated with Arnold Map","authors":"Sachin Kumar, Swati Suyal, Ashok Kumar","doi":"10.3233/jcs-230101","DOIUrl":"https://doi.org/10.3233/jcs-230101","url":null,"abstract":"In this paper, a scheme for image data security is designed by using Bifid cipher and Arnold map. The conventional 2D-Bifid cipher is changed to handle the encryption and decryption of color images. Further, a block-based method is realized using Arnold map to encrypt and decrypt the image data of square as well as non-square sizes. The proposed scheme is constructed on a widely adopted cryptographic framework, i.e., substitution-permutation design, where Bifid cipher-based scheme acts as a substitution layer and Arnold map-based scheme acts as a diffusion layer. The designed scheme has a huge key space with key sensitivity not only to accurate keys but also to their accurate orders. The practicability and performance of the designed scheme is validated by conducting a detailed analysis along with a comparative study. This paper contributes to a simple, efficient and secure image encryption method, which outperforms to the related works.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141266709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based chameleon hash from lattices 基于身份的网格变色龙哈希算法
IF 1.2 Q3 Engineering Pub Date : 2024-06-03 DOI: 10.3233/jcs-220121
Yiming Li, Shengli Liu
Identity-based chameleon hash (IBCH) is a cryptographic primitive with nice properties. IBCH equips each user with a trapdoor and the hash values can be publicly evaluated w.r.t. the identity of any user. On the one hand, it is hard to find collisions for the hash values without the user’s trapdoor. On the other hand, with the help of the user’s trapdoor, finding collisions becomes easy. An important application of IBCH is to upgrade an identity-based signature (IBS) scheme to an on-line/off-line identity-based signature (OO-IBS) scheme. OO-IBS is a useful tool to provide authenticity in lightweight smart devices, since it only involves light on-line computations and does not need key certificate. Up to now, there are many IBCH constructions from traditional number-theoretic assumptions like RSA, CDH, etc. However, none of the existing IBCH schemes achieve the post-quantum security in the standard model. In this paper, we propose a new IBCH scheme from lattices. The security of our IBCH is reduced to a well-accepted lattice-based assumption – the Short Integer Solution (SIS) assumption in the standard model. Our work provides the first post-quantum solution to IBCH in the standard model.
基于身份的变色龙哈希算法(IBCH)是一种具有良好特性的加密原语。IBCH 为每个用户配备了一个陷阱门,哈希值可以根据任何用户的身份进行公开评估。一方面,在没有用户陷阱门的情况下,很难找到哈希值的碰撞。另一方面,在用户陷阱门的帮助下,找到碰撞就变得容易了。IBCH 的一个重要应用是将基于身份的签名(IBS)方案升级为基于身份的在线/离线签名(OO-IBS)方案。OO-IBS 只涉及少量在线计算,不需要密钥证书,因此是为轻型智能设备提供真实性的有用工具。迄今为止,已有许多基于 RSA、CDH 等传统数论假设的 IBCH 结构。然而,现有的 IBCH 方案都没有在标准模型中实现后量子安全。在本文中,我们提出了一种新的网格 IBCH 方案。我们的 IBCH 方案的安全性被简化为一个公认的基于网格的假设--标准模型中的短整数解(SIS)假设。我们的工作为标准模型中的 IBCH 提供了第一个后量子解决方案。
{"title":"Identity-based chameleon hash from lattices","authors":"Yiming Li, Shengli Liu","doi":"10.3233/jcs-220121","DOIUrl":"https://doi.org/10.3233/jcs-220121","url":null,"abstract":"Identity-based chameleon hash (IBCH) is a cryptographic primitive with nice properties. IBCH equips each user with a trapdoor and the hash values can be publicly evaluated w.r.t. the identity of any user. On the one hand, it is hard to find collisions for the hash values without the user’s trapdoor. On the other hand, with the help of the user’s trapdoor, finding collisions becomes easy. An important application of IBCH is to upgrade an identity-based signature (IBS) scheme to an on-line/off-line identity-based signature (OO-IBS) scheme. OO-IBS is a useful tool to provide authenticity in lightweight smart devices, since it only involves light on-line computations and does not need key certificate. Up to now, there are many IBCH constructions from traditional number-theoretic assumptions like RSA, CDH, etc. However, none of the existing IBCH schemes achieve the post-quantum security in the standard model. In this paper, we propose a new IBCH scheme from lattices. The security of our IBCH is reduced to a well-accepted lattice-based assumption – the Short Integer Solution (SIS) assumption in the standard model. Our work provides the first post-quantum solution to IBCH in the standard model.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141269943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1 任意串通下的实用多方私有集合交集明细表和交集和协议1
IF 1.2 Q3 Engineering Pub Date : 2024-04-04 DOI: 10.3233/jcs-230091
You Chen, Ning Ding, Dawu Gu, Yang Bian
Private set intersection cardinality (PSI-CA) and private intersection-sum with cardinality (PSI-CA-sum) are two primitives that enable data owners to learn the intersection cardinality of their data sets, with the difference that PSI-CA-sum additionally outputs the sum of the associated integer values of all the data that belongs to the intersection (i.e., intersection-sum). However, to the best of our knowledge, all existing multi-party PSI-CA (MPSI-CA) protocols are either limited by high computational cost or face security challenges under arbitrary collusion. As for multi-party PSI-CA-sum (MPSI-CA-sum), there is even no formalization for this notion at present, not to mention secure constructions for it. In this paper, we first present an efficient MPSI-CA protocol with two non-colluding parties. This protocol significantly decreases the number of parties involved in expensive interactive procedures, leading to a significant enhancement in runtime efficiency. Our numeric results demonstrate that the running time of this protocol is merely one-quarter of the time required by our proposed MPSI-CA protocol that is secure against arbitrary collusion. Therefore, in scenarios where performance is a priority, this protocol stands out as an excellent choice. Second, we successfully construct the first MPSI-CA protocol that achieves simultaneous practicality and security against arbitrary collusion. Additionally, we also conduct implementation to verify its practicality (while the previous results under arbitrary collusion only present theoretical analysis of performance, lacking real implementation). Numeric results show that by shifting the costly operations to an offline phase, the online computation can be completed in just 12.805 seconds, even in the dishonest majority setting, where 15 parties each hold a set of size 2 16 . Third, we formalize the concept of MPSI-CA-sum and present the first realization that ensures simultaneous practicality and security against arbitrary collusion. The computational complexity of this protocol is roughly twice that of our MPSI-CA protocol. Besides the main results, we introduce the concepts and efficient constructions of two novel building blocks: multi-party secret-shared shuffle and multi-party oblivious zero-sum check, which may be of independent interest.
私有集合交集-明细度(PSI-CA)和私有交集-明细度和(PSI-CA-sum)是使数据所有者能够了解其数据集的交集-明细度的两种原语,不同之处在于 PSI-CA-sum 还能输出属于交集的所有数据的相关整数值之和(即交集-和)。然而,据我们所知,所有现有的多方 PSI-CA (MPSI-CA)协议要么受限于高计算成本,要么面临任意串通下的安全挑战。至于多方 PSI-CA-求和(MPSI-CA-sum),目前甚至还没有形式化的概念,更不用说它的安全构造了。在本文中,我们首先提出了一种有两个非共谋方的高效 MPSI-CA 协议。该协议大大减少了昂贵的交互式程序中的参与方数量,从而显著提高了运行效率。我们的数值结果表明,该协议的运行时间仅为我们提出的 MPSI-CA 协议所需时间的四分之一,而 MPSI-CA 协议是安全的,可防止任意串通。因此,在性能优先的情况下,该协议是一个极佳的选择。其次,我们成功地构建了首个同时实现实用性和安全性的 MPSI-CA 协议,以对抗任意串通。此外,我们还进行了实施以验证其实用性(而之前的任意串通下的结果只提供了性能的理论分析,缺乏实际实施)。数值结果表明,通过将代价高昂的操作转移到离线阶段,在线计算只需 12.805 秒就能完成,即使是在不诚实多数设置中,即 15 方各自持有一个大小为 2 16 的集合。第三,我们正式提出了 MPSI-CA-sum 的概念,并首次实现了同时确保实用性和安全性以防止任意串通的协议。该协议的计算复杂度大约是我们的 MPSI-CA 协议的两倍。除了主要结果,我们还介绍了两个新构件的概念和高效构造:多方秘密共享洗牌和多方遗忘零和校验,这两个构件可能会引起独立的兴趣。
{"title":"Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1","authors":"You Chen, Ning Ding, Dawu Gu, Yang Bian","doi":"10.3233/jcs-230091","DOIUrl":"https://doi.org/10.3233/jcs-230091","url":null,"abstract":"Private set intersection cardinality (PSI-CA) and private intersection-sum with cardinality (PSI-CA-sum) are two primitives that enable data owners to learn the intersection cardinality of their data sets, with the difference that PSI-CA-sum additionally outputs the sum of the associated integer values of all the data that belongs to the intersection (i.e., intersection-sum). However, to the best of our knowledge, all existing multi-party PSI-CA (MPSI-CA) protocols are either limited by high computational cost or face security challenges under arbitrary collusion. As for multi-party PSI-CA-sum (MPSI-CA-sum), there is even no formalization for this notion at present, not to mention secure constructions for it. In this paper, we first present an efficient MPSI-CA protocol with two non-colluding parties. This protocol significantly decreases the number of parties involved in expensive interactive procedures, leading to a significant enhancement in runtime efficiency. Our numeric results demonstrate that the running time of this protocol is merely one-quarter of the time required by our proposed MPSI-CA protocol that is secure against arbitrary collusion. Therefore, in scenarios where performance is a priority, this protocol stands out as an excellent choice. Second, we successfully construct the first MPSI-CA protocol that achieves simultaneous practicality and security against arbitrary collusion. Additionally, we also conduct implementation to verify its practicality (while the previous results under arbitrary collusion only present theoretical analysis of performance, lacking real implementation). Numeric results show that by shifting the costly operations to an offline phase, the online computation can be completed in just 12.805 seconds, even in the dishonest majority setting, where 15 parties each hold a set of size 2 16 . Third, we formalize the concept of MPSI-CA-sum and present the first realization that ensures simultaneous practicality and security against arbitrary collusion. The computational complexity of this protocol is roughly twice that of our MPSI-CA protocol. Besides the main results, we introduce the concepts and efficient constructions of two novel building blocks: multi-party secret-shared shuffle and multi-party oblivious zero-sum check, which may be of independent interest.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MVDet: Encrypted malware traffic detection via multi-view analysis MVDet:通过多视角分析进行加密恶意软件流量检测
IF 1.2 Q3 Engineering Pub Date : 2024-02-12 DOI: 10.3233/jcs-230024
Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu, Yuling Liu
Detecting encrypted malware traffic promptly to halt the further propagation of an attack is critical. Currently, machine learning becomes a key technique for extracting encrypted malware traffic patterns. However, due to the dynamic nature of network environments and the frequent updates of malware, current methods face the challenges of detecting unknown malware traffic in open-world environment. To address the issue, we introduce MVDet, a novel method that employs machine learning to mine the behavioral features of malware traffic based on multi-view analysis. Unlike traditional methods, MVDet innovatively characterizes the behavioral features of malware traffic at 4-tuple flows from four views: statistical view, DNS view, TLS view, and business view, which is a more stable feature representation capable of handling complex network environments and malware updates. Additionally, we achieve a short-time behavioral features construction, significantly reducing the time cost for feature extraction and malware detection. As a result, we can detect malware behavior at an early stage promptly. Our evaluation demonstrates that MVDet can detect a wide variety of known malware traffic and exhibits efficient and robust detection in both open-world and unknown malware scenarios. MVDet outperforms state-of-the-art methods in closed-world known malware detection, open-world known malware detection, and open-world unknown malware detection.
及时检测加密恶意软件流量以阻止攻击的进一步传播至关重要。目前,机器学习已成为提取加密恶意软件流量模式的关键技术。然而,由于网络环境的动态性和恶意软件的频繁更新,目前的方法面临着在开放世界环境中检测未知恶意软件流量的挑战。为了解决这个问题,我们引入了 MVDet,这是一种基于多视角分析、利用机器学习挖掘恶意软件流量行为特征的新方法。与传统方法不同的是,MVDet 创新性地从统计视图、DNS 视图、TLS 视图和业务视图这四个视图来描述恶意软件流量在 4 元组流中的行为特征,这是一种更稳定的特征表示,能够处理复杂的网络环境和恶意软件更新。此外,我们还实现了短时间行为特征构建,大大降低了特征提取和恶意软件检测的时间成本。因此,我们可以在早期阶段及时发现恶意软件行为。我们的评估表明,MVDet 可以检测到各种已知的恶意软件流量,并在开放世界和未知恶意软件场景中表现出高效、稳健的检测能力。MVDet 在封闭世界已知恶意软件检测、开放世界已知恶意软件检测和开放世界未知恶意软件检测方面都优于最先进的方法。
{"title":"MVDet: Encrypted malware traffic detection via multi-view analysis","authors":"Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu, Yuling Liu","doi":"10.3233/jcs-230024","DOIUrl":"https://doi.org/10.3233/jcs-230024","url":null,"abstract":"Detecting encrypted malware traffic promptly to halt the further propagation of an attack is critical. Currently, machine learning becomes a key technique for extracting encrypted malware traffic patterns. However, due to the dynamic nature of network environments and the frequent updates of malware, current methods face the challenges of detecting unknown malware traffic in open-world environment. To address the issue, we introduce MVDet, a novel method that employs machine learning to mine the behavioral features of malware traffic based on multi-view analysis. Unlike traditional methods, MVDet innovatively characterizes the behavioral features of malware traffic at 4-tuple flows from four views: statistical view, DNS view, TLS view, and business view, which is a more stable feature representation capable of handling complex network environments and malware updates. Additionally, we achieve a short-time behavioral features construction, significantly reducing the time cost for feature extraction and malware detection. As a result, we can detect malware behavior at an early stage promptly. Our evaluation demonstrates that MVDet can detect a wide variety of known malware traffic and exhibits efficient and robust detection in both open-world and unknown malware scenarios. MVDet outperforms state-of-the-art methods in closed-world known malware detection, open-world known malware detection, and open-world unknown malware detection.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139782042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MVDet: Encrypted malware traffic detection via multi-view analysis MVDet:通过多视角分析进行加密恶意软件流量检测
IF 1.2 Q3 Engineering Pub Date : 2024-02-12 DOI: 10.3233/jcs-230024
Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu, Yuling Liu
Detecting encrypted malware traffic promptly to halt the further propagation of an attack is critical. Currently, machine learning becomes a key technique for extracting encrypted malware traffic patterns. However, due to the dynamic nature of network environments and the frequent updates of malware, current methods face the challenges of detecting unknown malware traffic in open-world environment. To address the issue, we introduce MVDet, a novel method that employs machine learning to mine the behavioral features of malware traffic based on multi-view analysis. Unlike traditional methods, MVDet innovatively characterizes the behavioral features of malware traffic at 4-tuple flows from four views: statistical view, DNS view, TLS view, and business view, which is a more stable feature representation capable of handling complex network environments and malware updates. Additionally, we achieve a short-time behavioral features construction, significantly reducing the time cost for feature extraction and malware detection. As a result, we can detect malware behavior at an early stage promptly. Our evaluation demonstrates that MVDet can detect a wide variety of known malware traffic and exhibits efficient and robust detection in both open-world and unknown malware scenarios. MVDet outperforms state-of-the-art methods in closed-world known malware detection, open-world known malware detection, and open-world unknown malware detection.
及时检测加密恶意软件流量以阻止攻击的进一步传播至关重要。目前,机器学习已成为提取加密恶意软件流量模式的关键技术。然而,由于网络环境的动态性和恶意软件的频繁更新,目前的方法面临着在开放世界环境中检测未知恶意软件流量的挑战。为了解决这个问题,我们引入了 MVDet,这是一种基于多视角分析、利用机器学习挖掘恶意软件流量行为特征的新方法。与传统方法不同的是,MVDet 创新性地从统计视图、DNS 视图、TLS 视图和业务视图这四个视图来描述恶意软件流量在 4 元组流中的行为特征,这是一种更稳定的特征表示,能够处理复杂的网络环境和恶意软件更新。此外,我们还实现了短时间行为特征构建,大大降低了特征提取和恶意软件检测的时间成本。因此,我们可以在早期阶段及时发现恶意软件行为。我们的评估表明,MVDet 可以检测到各种已知的恶意软件流量,并在开放世界和未知恶意软件场景中表现出高效、稳健的检测能力。MVDet 在封闭世界已知恶意软件检测、开放世界已知恶意软件检测和开放世界未知恶意软件检测方面都优于最先进的方法。
{"title":"MVDet: Encrypted malware traffic detection via multi-view analysis","authors":"Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu, Yuling Liu","doi":"10.3233/jcs-230024","DOIUrl":"https://doi.org/10.3233/jcs-230024","url":null,"abstract":"Detecting encrypted malware traffic promptly to halt the further propagation of an attack is critical. Currently, machine learning becomes a key technique for extracting encrypted malware traffic patterns. However, due to the dynamic nature of network environments and the frequent updates of malware, current methods face the challenges of detecting unknown malware traffic in open-world environment. To address the issue, we introduce MVDet, a novel method that employs machine learning to mine the behavioral features of malware traffic based on multi-view analysis. Unlike traditional methods, MVDet innovatively characterizes the behavioral features of malware traffic at 4-tuple flows from four views: statistical view, DNS view, TLS view, and business view, which is a more stable feature representation capable of handling complex network environments and malware updates. Additionally, we achieve a short-time behavioral features construction, significantly reducing the time cost for feature extraction and malware detection. As a result, we can detect malware behavior at an early stage promptly. Our evaluation demonstrates that MVDet can detect a wide variety of known malware traffic and exhibits efficient and robust detection in both open-world and unknown malware scenarios. MVDet outperforms state-of-the-art methods in closed-world known malware detection, open-world known malware detection, and open-world unknown malware detection.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139842212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritization and exchange chains in privacy-preserving kidney exchange 保护隐私的肾脏交换中的优先级和交换链
IF 1.2 Q3 Engineering Pub Date : 2024-02-05 DOI: 10.3233/jcs-230012
Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel
The Kidney Exchange Problem (KEP) aims at finding an optimal set of exchanges among pairs of patients and their medically incompatible living kidney donors as well as altruistic donors who are not associated with any particular patient but want to donate a kidney to any person in need. Existing platforms that offer the finding of such exchanges for patient-donor pairs and altruistic donors are organized in a centralized fashion and operated by a single platform operator. This makes them susceptible to manipulation and corruption. Recent research has targeted these security issues by proposing decentralized Secure Multi-Party Computation (SMPC) protocols for solving the KEP. However, these protocols fail to meet two important requirements for kidney exchange in practice. First, they do not allow for altruistic donors. While such donors are not legally allowed in all countries, they have been shown to have a positive effect on the number of transplants that can be found. Second, the existing SMPC protocols do not support prioritization, which is used in existing platforms to give priority to certain exchanges or patient-donor pairs, e.g., to patients who are hard to match due to their medical characteristics. In this paper, we introduce a generic gate for implementing prioritization in kidney exchange. We extend two existing SMPC protocols for solving the KEP such that they allow for altruistic donors and prioritization and present one novel SMPC protocol for solving the KEP with altruistic donors and prioritization based on dynamic programming. We prove the security of all protocols and analyze their complexity. We implement all protocols and evaluate their performance for the setting where altruistic donors are legally allowed and for the setting where they are not. Thereby, we determine the performance impact of the inclusion of altruistic donors and obtain those approaches that perform best for each setting.
肾脏交换问题(Kepney Exchange Problem,KEP)的目的是在成对的患者及其医学上不相容的活体肾脏捐献者以及与任何特定患者无关但希望向任何有需要的人捐献肾脏的利他主义捐献者之间找到一组最佳交换方案。为患者-捐献者配对和利他主义捐献者提供此类交换的现有平台是集中式组织的,由单一平台运营商运营。这使它们容易受到操纵和腐败的影响。最近的研究针对这些安全问题,提出了解决 KEP 的分散式安全多方计算(SMPC)协议。然而,这些协议在实践中无法满足肾交换的两个重要要求。首先,它们不允许利他主义捐赠者。虽然并非所有国家的法律都允许利他主义捐赠者,但事实证明,利他主义捐赠者会对能够找到的移植数量产生积极影响。其次,现有的 SMPC 协议不支持优先级排序,而现有平台使用优先级排序来优先处理某些交换或患者-捐献者配对,例如,因其医疗特征而难以匹配的患者。在本文中,我们介绍了在肾脏交换中实现优先级的通用门。我们扩展了两个现有的解决 KEP 的 SMPC 协议,使其允许利他捐赠者和优先级,并提出了一个新颖的 SMPC 协议,用于解决具有利他捐赠者和优先级的基于动态编程的 KEP。我们证明了所有协议的安全性,并分析了它们的复杂性。我们实现了所有协议,并评估了它们在法律允许利他捐赠者和不允许利他捐赠者情况下的性能。因此,我们确定了纳入利他捐赠者对性能的影响,并获得了在各种情况下性能最佳的方法。
{"title":"Prioritization and exchange chains in privacy-preserving kidney exchange","authors":"Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel","doi":"10.3233/jcs-230012","DOIUrl":"https://doi.org/10.3233/jcs-230012","url":null,"abstract":"The Kidney Exchange Problem (KEP) aims at finding an optimal set of exchanges among pairs of patients and their medically incompatible living kidney donors as well as altruistic donors who are not associated with any particular patient but want to donate a kidney to any person in need. Existing platforms that offer the finding of such exchanges for patient-donor pairs and altruistic donors are organized in a centralized fashion and operated by a single platform operator. This makes them susceptible to manipulation and corruption. Recent research has targeted these security issues by proposing decentralized Secure Multi-Party Computation (SMPC) protocols for solving the KEP. However, these protocols fail to meet two important requirements for kidney exchange in practice. First, they do not allow for altruistic donors. While such donors are not legally allowed in all countries, they have been shown to have a positive effect on the number of transplants that can be found. Second, the existing SMPC protocols do not support prioritization, which is used in existing platforms to give priority to certain exchanges or patient-donor pairs, e.g., to patients who are hard to match due to their medical characteristics. In this paper, we introduce a generic gate for implementing prioritization in kidney exchange. We extend two existing SMPC protocols for solving the KEP such that they allow for altruistic donors and prioritization and present one novel SMPC protocol for solving the KEP with altruistic donors and prioritization based on dynamic programming. We prove the security of all protocols and analyze their complexity. We implement all protocols and evaluate their performance for the setting where altruistic donors are legally allowed and for the setting where they are not. Thereby, we determine the performance impact of the inclusion of altruistic donors and obtain those approaches that perform best for each setting.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritization and exchange chains in privacy-preserving kidney exchange 保护隐私的肾脏交换中的优先级和交换链
IF 1.2 Q3 Engineering Pub Date : 2024-02-05 DOI: 10.3233/jcs-230012
Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel
The Kidney Exchange Problem (KEP) aims at finding an optimal set of exchanges among pairs of patients and their medically incompatible living kidney donors as well as altruistic donors who are not associated with any particular patient but want to donate a kidney to any person in need. Existing platforms that offer the finding of such exchanges for patient-donor pairs and altruistic donors are organized in a centralized fashion and operated by a single platform operator. This makes them susceptible to manipulation and corruption. Recent research has targeted these security issues by proposing decentralized Secure Multi-Party Computation (SMPC) protocols for solving the KEP. However, these protocols fail to meet two important requirements for kidney exchange in practice. First, they do not allow for altruistic donors. While such donors are not legally allowed in all countries, they have been shown to have a positive effect on the number of transplants that can be found. Second, the existing SMPC protocols do not support prioritization, which is used in existing platforms to give priority to certain exchanges or patient-donor pairs, e.g., to patients who are hard to match due to their medical characteristics. In this paper, we introduce a generic gate for implementing prioritization in kidney exchange. We extend two existing SMPC protocols for solving the KEP such that they allow for altruistic donors and prioritization and present one novel SMPC protocol for solving the KEP with altruistic donors and prioritization based on dynamic programming. We prove the security of all protocols and analyze their complexity. We implement all protocols and evaluate their performance for the setting where altruistic donors are legally allowed and for the setting where they are not. Thereby, we determine the performance impact of the inclusion of altruistic donors and obtain those approaches that perform best for each setting.
肾脏交换问题(Kepney Exchange Problem,KEP)的目的是在成对的患者及其医学上不相容的活体肾脏捐献者以及与任何特定患者无关但希望向任何有需要的人捐献肾脏的利他主义捐献者之间找到一组最佳交换方案。为患者-捐献者配对和利他主义捐献者提供此类交换的现有平台是集中式组织的,由单一平台运营商运营。这使它们容易受到操纵和腐败的影响。最近的研究针对这些安全问题,提出了解决 KEP 的分散式安全多方计算(SMPC)协议。然而,这些协议在实践中无法满足肾交换的两个重要要求。首先,它们不允许利他主义捐赠者。虽然并非所有国家的法律都允许利他主义捐赠者,但事实证明,利他主义捐赠者会对能够找到的移植数量产生积极影响。其次,现有的 SMPC 协议不支持优先级排序,而现有平台使用优先级排序来优先处理某些交换或患者-捐献者配对,例如,因其医疗特征而难以匹配的患者。在本文中,我们介绍了在肾脏交换中实现优先级的通用门。我们扩展了两个现有的解决 KEP 的 SMPC 协议,使其允许利他捐赠者和优先级,并提出了一个新颖的 SMPC 协议,用于解决具有利他捐赠者和优先级的基于动态编程的 KEP。我们证明了所有协议的安全性,并分析了它们的复杂性。我们实现了所有协议,并评估了它们在法律允许利他捐赠者和不允许利他捐赠者情况下的性能。因此,我们确定了纳入利他捐赠者对性能的影响,并获得了在各种情况下性能最佳的方法。
{"title":"Prioritization and exchange chains in privacy-preserving kidney exchange","authors":"Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel","doi":"10.3233/jcs-230012","DOIUrl":"https://doi.org/10.3233/jcs-230012","url":null,"abstract":"The Kidney Exchange Problem (KEP) aims at finding an optimal set of exchanges among pairs of patients and their medically incompatible living kidney donors as well as altruistic donors who are not associated with any particular patient but want to donate a kidney to any person in need. Existing platforms that offer the finding of such exchanges for patient-donor pairs and altruistic donors are organized in a centralized fashion and operated by a single platform operator. This makes them susceptible to manipulation and corruption. Recent research has targeted these security issues by proposing decentralized Secure Multi-Party Computation (SMPC) protocols for solving the KEP. However, these protocols fail to meet two important requirements for kidney exchange in practice. First, they do not allow for altruistic donors. While such donors are not legally allowed in all countries, they have been shown to have a positive effect on the number of transplants that can be found. Second, the existing SMPC protocols do not support prioritization, which is used in existing platforms to give priority to certain exchanges or patient-donor pairs, e.g., to patients who are hard to match due to their medical characteristics. In this paper, we introduce a generic gate for implementing prioritization in kidney exchange. We extend two existing SMPC protocols for solving the KEP such that they allow for altruistic donors and prioritization and present one novel SMPC protocol for solving the KEP with altruistic donors and prioritization based on dynamic programming. We prove the security of all protocols and analyze their complexity. We implement all protocols and evaluate their performance for the setting where altruistic donors are legally allowed and for the setting where they are not. Thereby, we determine the performance impact of the inclusion of altruistic donors and obtain those approaches that perform best for each setting.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139804424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks 确保工业网络的网络安全:基于 ARP 的 MITM 攻击解决方案
IF 1.2 Q3 Engineering Pub Date : 2024-02-01 DOI: 10.3233/jcs-230023
Danilo Bruschi, Andrea Di Pasquale, A. Lanzi, Elena Pagani
The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET + + network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.
ICS 中越来越多地采用互联网协议 (IP),这使得这些系统很容易受到与传统 IT 环境相同的安全风险的威胁。ICS 的传统性质及其独特的操作要求使其容易受到不同于 IT 环境的安全威胁。在本文中,我们介绍了一种名为 ArpON 的协议,它能够实时清除任何 ARP 缓存中毒企图,从而使其失效。与文献中针对 ARP 缓存中毒提出的解决方案不同,ArpON 运行成本低,向后兼容,对 ARP 协议透明,并且不使用任何硬件特性或加密功能。我们还在 OMNET + + 网络模拟器中对 ArpON 进行了建模和验证。仿真结果表明,ArpON 能有效避免 ARP 中毒,与传统 ARP 协议相比,其通信开销可以忽略不计。
{"title":"Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks","authors":"Danilo Bruschi, Andrea Di Pasquale, A. Lanzi, Elena Pagani","doi":"10.3233/jcs-230023","DOIUrl":"https://doi.org/10.3233/jcs-230023","url":null,"abstract":"The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET + + network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139819891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks 确保工业网络的网络安全:基于 ARP 的 MITM 攻击解决方案
IF 1.2 Q3 Engineering Pub Date : 2024-02-01 DOI: 10.3233/jcs-230023
Danilo Bruschi, Andrea Di Pasquale, A. Lanzi, Elena Pagani
The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET + + network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.
ICS 中越来越多地采用互联网协议 (IP),这使得这些系统很容易受到与传统 IT 环境相同的安全风险的威胁。ICS 的传统性质及其独特的操作要求使其容易受到不同于 IT 环境的安全威胁。在本文中,我们介绍了一种名为 ArpON 的协议,它能够实时清除任何 ARP 缓存中毒企图,从而使其失效。与文献中针对 ARP 缓存中毒提出的解决方案不同,ArpON 运行成本低,向后兼容,对 ARP 协议透明,并且不使用任何硬件特性或加密功能。我们还在 OMNET + + 网络模拟器中对 ArpON 进行了建模和验证。仿真结果表明,ArpON 能有效避免 ARP 中毒,与传统 ARP 协议相比,其通信开销可以忽略不计。
{"title":"Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks","authors":"Danilo Bruschi, Andrea Di Pasquale, A. Lanzi, Elena Pagani","doi":"10.3233/jcs-230023","DOIUrl":"https://doi.org/10.3233/jcs-230023","url":null,"abstract":"The increased adoption of the Internet Protocol (IP) in ICSs has made these systems vulnerable to the same security risks that are present in traditional IT environments. The legacy nature of ICSs and their unique operational requirements make them vulnerable to security threats that are different from those in IT environments. In this paper, we describe a protocol, named ArpON, which is able to wipe out in quasi real time any ARP cache poisoning attempt, thus making it ineffective. Contrarily to solutions presented in the literature for contrasting ARP cache poisoning, ArpON incurs in low operational costs, is backward compatible, transparent to the ARP protocol and does not use any HW feature nor cryptography functionality. We also model and validate ArpON in the OMNET + + network simulator. The simulation results show that ArpON is effective in avoiding ARP poisoning, and its communication overhead is negligible with respect to classical ARP protocol.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139880154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1