首页 > 最新文献

Journal of Computer Security最新文献

英文 中文
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system E-Tenon:电子病历系统的高效隐私保护安全开放数据共享方案
IF 1.2 Q3 Engineering Pub Date : 2024-01-29 DOI: 10.3233/jcs-220097
P. Gope, Zhihui Lin, Yang Yang, Jianting Ning
The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security solutions excessively encrypt the whole database, thus requiring the entire database to be decrypted for each access request, which is time-consuming. On the other hand, the use of EHR for medical research (e.g., development of precision medicine and diagnostics techniques) and optimisation of practices in healthcare organisations require the EHR to be analysed. To achieve that, they should be easily accessible without compromising the patient’s privacy. In this paper, we propose an efficient technique called E-Tenon that not only securely keeps all EHR publicly accessible but also provides the desired security features. To the best of our knowledge, this is the first work in which an Open Database is used for protecting EHR. The proposed E-Tenon empowers patients to securely share their EHR under their own multi-level, fine-grained access policies. Analyses show that our system outperforms existing solutions in terms of computational complexity.
从纸质信息到电子健康记录(EHR)的转变推动了现代医疗保健行业的各种进步。在许多情况下,患者需要与医疗保健专业人员共享电子健康记录。鉴于电子健康记录的敏感性和安全关键性,必须考虑存储和共享电子健康记录的安全和隐私问题。然而,现有的安全解决方案过度加密整个数据库,因此每次访问请求都需要解密整个数据库,这非常耗时。另一方面,将电子健康记录用于医学研究(如精准医学和诊断技术的开发)和优化医疗机构的实践需要对电子健康记录进行分析。为此,应在不损害患者隐私的情况下方便地访问电子病历。在本文中,我们提出了一种名为 E-Tenon 的高效技术,它不仅能安全地保持所有电子病历的可公开访问性,还能提供所需的安全功能。据我们所知,这是第一项使用开放数据库保护电子病历的工作。所提出的 E-Tenon 使患者能够根据自己的多级、细粒度访问策略安全地共享电子健康记录。分析表明,我们的系统在计算复杂性方面优于现有的解决方案。
{"title":"E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system","authors":"P. Gope, Zhihui Lin, Yang Yang, Jianting Ning","doi":"10.3233/jcs-220097","DOIUrl":"https://doi.org/10.3233/jcs-220097","url":null,"abstract":"The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security solutions excessively encrypt the whole database, thus requiring the entire database to be decrypted for each access request, which is time-consuming. On the other hand, the use of EHR for medical research (e.g., development of precision medicine and diagnostics techniques) and optimisation of practices in healthcare organisations require the EHR to be analysed. To achieve that, they should be easily accessible without compromising the patient’s privacy. In this paper, we propose an efficient technique called E-Tenon that not only securely keeps all EHR publicly accessible but also provides the desired security features. To the best of our knowledge, this is the first work in which an Open Database is used for protecting EHR. The proposed E-Tenon empowers patients to securely share their EHR under their own multi-level, fine-grained access policies. Analyses show that our system outperforms existing solutions in terms of computational complexity.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140487537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate authentication based on ECG using deep learning 利用深度学习基于心电图进行精确认证
IF 1.2 Q3 Engineering Pub Date : 2024-01-16 DOI: 10.3233/jcs-220137
Liping Zhang, Shukai Chen, Wei Ren, Geyong Min, K. Choo
Biometric-based authentication methods have been widely used, for example on portable devices (e.g., Android and iOS devices). However, there are several known limitations in existing authentication methods based on biometrics (e.g., those using facial, iris, and fingerprint). For example, in a healthcare context, a user may be physically incapable of completing the authentication due to his/her medical conditions. Hence, as a complementary authentication mechanism, there have been attempts to also utilize electrocardiogram (ECG). In this work, we propose an ECG authentication system that leverages deep learning. Specifically, to achieve generalization ability, complementary ensemble empirical decomposition (CEEMD) is introduced in our design. Moreover, a 1-D Multi-scale Convolutional Neural Network (1-D MCNN) is implemented to achieve accurate authentication. To evaluate the usability of our proposed approach, we have performed extensive experiments on eight databases, and the findings show that our proposed approach achieves good performance even on abnormal databases and can be adapted for different application environments. In addition, our adopted data from eight public databases requires theoretical statistical treatment for practical applications in real authentication scenarios.
基于生物识别的身份验证方法已被广泛使用,例如在便携式设备(如安卓和 iOS 设备)上。然而,现有的基于生物识别的身份验证方法(如使用面部、虹膜和指纹的方法)存在一些已知的局限性。例如,在医疗保健领域,用户可能会因为身体状况而无法完成身份验证。因此,作为一种补充认证机制,也有人尝试利用心电图(ECG)。在这项工作中,我们提出了一种利用深度学习的心电图身份验证系统。具体来说,为了实现泛化能力,我们在设计中引入了互补集合经验分解(CEEMD)。此外,我们还采用了一维多尺度卷积神经网络(1-D MCNN)来实现准确的身份验证。为了评估我们提出的方法的可用性,我们在八个数据库上进行了广泛的实验,结果表明我们提出的方法即使在异常数据库上也能实现良好的性能,并能适用于不同的应用环境。此外,我们采用的八个公共数据库的数据需要进行理论统计处理,以便在实际认证场景中进行实际应用。
{"title":"Accurate authentication based on ECG using deep learning","authors":"Liping Zhang, Shukai Chen, Wei Ren, Geyong Min, K. Choo","doi":"10.3233/jcs-220137","DOIUrl":"https://doi.org/10.3233/jcs-220137","url":null,"abstract":"Biometric-based authentication methods have been widely used, for example on portable devices (e.g., Android and iOS devices). However, there are several known limitations in existing authentication methods based on biometrics (e.g., those using facial, iris, and fingerprint). For example, in a healthcare context, a user may be physically incapable of completing the authentication due to his/her medical conditions. Hence, as a complementary authentication mechanism, there have been attempts to also utilize electrocardiogram (ECG). In this work, we propose an ECG authentication system that leverages deep learning. Specifically, to achieve generalization ability, complementary ensemble empirical decomposition (CEEMD) is introduced in our design. Moreover, a 1-D Multi-scale Convolutional Neural Network (1-D MCNN) is implemented to achieve accurate authentication. To evaluate the usability of our proposed approach, we have performed extensive experiments on eight databases, and the findings show that our proposed approach achieves good performance even on abnormal databases and can be adapted for different application environments. In addition, our adopted data from eight public databases requires theoretical statistical treatment for practical applications in real authentication scenarios.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139619394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework 使用单双向图嵌入和多任务学习框架进行基于序列的恶意软件检测
IF 1.2 Q3 Engineering Pub Date : 2023-12-01 DOI: 10.3233/jcs-230041
Jiale Luo, Zhewngyu Zhang, Jiesi Luo, Pin Yang, Runyu Jing
As an important part of malware detection and classification, sequence-based analysis can be integrated into dynamic detection system for real-time detection. This work presents a novel learning method for malware detection models that leverages advances in graph embedding for fusing the n-gram data into a one-hot feature space with different transmission directions. By capturing the information flow, our method finds a better feature representation for detection tasks with rely solely on sequence information. To enhance the stability of feature representation, this work adopts a multi-task learning strategy which achieves better performance in independent testing. We evaluate our method on two different realworld datasets and compare it against four superior malware detection models. During malware detection using our method, we conducted in-depth discussions on feature length, graph embedding direction, model depth, and different multi-task learning strategies. Experimental and discussion results show that our method significantly outperforms alternative approaches across evaluation settings.
序列分析作为恶意软件检测和分类的重要组成部分,可以集成到动态检测系统中进行实时检测。这项工作提出了一种新的恶意软件检测模型学习方法,该方法利用图嵌入技术的进步,将n-gram数据融合到具有不同传输方向的单热特征空间中。通过捕获信息流,我们的方法为仅依赖序列信息的检测任务找到了更好的特征表示。为了增强特征表示的稳定性,本文采用了多任务学习策略,在独立测试中获得了更好的性能。我们在两个不同的真实世界数据集上评估了我们的方法,并将其与四种高级恶意软件检测模型进行了比较。在使用我们的方法检测恶意软件时,我们对特征长度、图嵌入方向、模型深度以及不同的多任务学习策略进行了深入的讨论。实验和讨论结果表明,我们的方法在评估设置上明显优于其他方法。
{"title":"Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework","authors":"Jiale Luo, Zhewngyu Zhang, Jiesi Luo, Pin Yang, Runyu Jing","doi":"10.3233/jcs-230041","DOIUrl":"https://doi.org/10.3233/jcs-230041","url":null,"abstract":"As an important part of malware detection and classification, sequence-based analysis can be integrated into dynamic detection system for real-time detection. This work presents a novel learning method for malware detection models that leverages advances in graph embedding for fusing the n-gram data into a one-hot feature space with different transmission directions. By capturing the information flow, our method finds a better feature representation for detection tasks with rely solely on sequence information. To enhance the stability of feature representation, this work adopts a multi-task learning strategy which achieves better performance in independent testing. We evaluate our method on two different realworld datasets and compare it against four superior malware detection models. During malware detection using our method, we conducted in-depth discussions on feature length, graph embedding direction, model depth, and different multi-task learning strategies. Experimental and discussion results show that our method significantly outperforms alternative approaches across evaluation settings.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138621042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive enforcement of provisions and obligations 积极主动地执行规定和履行义务
IF 1.2 Q3 Engineering Pub Date : 2023-11-28 DOI: 10.3233/jcs-210078
David Basin, S. Debois, Thomas Hildebrandt
We present an approach to the proactive enforcement of provisions and obligations, suitable for building policy enforcement mechanisms that both prevent and cause system actions. Our approach encompasses abstract requirements for proactive policy enforcement, a system model describing how enforcement mechanisms interact with and control target systems, and concrete policy languages and associated enforcement mechanisms. As examples of policy languages, we consider finite automata and timed dynamic condition response (DCR) graphs. We use finite automata to illustrate the basic principles and DCR graphs to show how these principles can be adapted to a practical, real-time policy language. In both cases, we show how to algorithmically determine whether a given policy is enforceable and, when this is the case, construct an associated enforcement mechanism. Our approach improves upon existing formalisms in two ways: (1) we exploit the target system’s existing functionality to avert policy violations proactively, rather than compensate for them reactively; and (2) rather than requiring the manual specification of remedial actions in the policy, we deduce required actions directly from the policy.
我们提出了一种主动执行规定和义务的方法,适用于建立既能防止又能导致系统行为的政策执行机制。我们的方法包括主动执行政策的抽象要求、描述执行机制如何与目标系统交互并控制目标系统的系统模型,以及具体的政策语言和相关的执行机制。作为策略语言的示例,我们考虑了有限自动机和定时动态条件响应(DCR)图。我们用有限自动机来说明基本原理,用 DCR 图来说明如何将这些原理应用到实用的实时策略语言中。在这两种情况下,我们都展示了如何通过算法确定给定策略是否可执行,以及在可执行的情况下如何构建相关的执行机制。我们的方法在两个方面改进了现有的形式主义:(1) 我们利用目标系统的现有功能来主动避免违反策略的行为,而不是被动地对其进行补偿;(2) 我们不需要在策略中手动指定补救措施,而是直接从策略中推导出所需的措施。
{"title":"Proactive enforcement of provisions and obligations","authors":"David Basin, S. Debois, Thomas Hildebrandt","doi":"10.3233/jcs-210078","DOIUrl":"https://doi.org/10.3233/jcs-210078","url":null,"abstract":"We present an approach to the proactive enforcement of provisions and obligations, suitable for building policy enforcement mechanisms that both prevent and cause system actions. Our approach encompasses abstract requirements for proactive policy enforcement, a system model describing how enforcement mechanisms interact with and control target systems, and concrete policy languages and associated enforcement mechanisms. As examples of policy languages, we consider finite automata and timed dynamic condition response (DCR) graphs. We use finite automata to illustrate the basic principles and DCR graphs to show how these principles can be adapted to a practical, real-time policy language. In both cases, we show how to algorithmically determine whether a given policy is enforceable and, when this is the case, construct an associated enforcement mechanism. Our approach improves upon existing formalisms in two ways: (1) we exploit the target system’s existing functionality to avert policy violations proactively, rather than compensate for them reactively; and (2) rather than requiring the manual specification of remedial actions in the policy, we deduce required actions directly from the policy.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139224523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android SIAT:用于检测安卓系统数据泄露威胁的系统化组件间通信实时分析技术
IF 1.2 Q3 Engineering Pub Date : 2023-11-28 DOI: 10.3233/jcs-220044
Yupeng Hu, Wenxin Kuang, Jin Zhe, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu
This paper presents the design and implementation of a systematic Inter-Component Communications (ICCs) dynamic Analysis Technique (SIAT) for detecting privacy-sensitive data leak threats. SIAT’s specific approach involves the identification of malicious ICC patterns by actively tracing both data flows and implicit control flows within ICC processes during runtime. This is achieved by utilizing the taint tagging methodology, a technique utilized by TaintDroid. As a result, it can discover the malicious intent usage pattern and further resolve the coincidental malicious ICCs and bypass cases without incurring performance degradation. SIAT comprises two key modules: Monitor and Analyzer. The Monitor makes the first attempt to revise the taint tag approach named TaintDroid by developing the built-in intent service primitives to help Android capture the intent-related taint propagation at multi-level for malicious ICC detection. Specifically, we enable the Monitor to perform systemwide tracking of intent with five abstraction functionalities embedded in the interactive workflow of components. By analyzing the taint logs offered by the Monitor, the Analyzer can build the accurate and integrated ICC patterns adopted to identify the specific leak threat patterns with the identification algorithms and predefined rules. Meanwhile, we employ the patterns’ deflation technique to improve the efficiency of the Analyzer. We implement the SIAT with Android Open Source Project and evaluate its performance through extensive experiments on a particular dataset consisting of well-known datasets and real-world apps. The experimental results show that, compared to state-of-the-art approaches, the SIAT can achieve about 25% ∼200% accuracy improvements with 1.0 precision and 0.98 recall at negligible runtime overhead. Apart from that, the SIAT can identify two undisclosed cases of bypassing that prior technologies cannot detect and quite a few malicious ICC threats in real-world apps with lots of downloads on the Google Play market.
本文介绍了用于检测隐私敏感数据泄漏威胁的系统化组件间通信(ICC)动态分析技术(SIAT)的设计与实现。SIAT 的具体方法包括在运行期间主动跟踪 ICC 进程内的数据流和隐式控制流,从而识别恶意 ICC 模式。这是通过利用 TaintDroid 使用的污点标记方法实现的。因此,它可以发现恶意意图的使用模式,并进一步解决巧合的恶意 ICC 和旁路情况,而不会导致性能下降。SIAT 包括两个关键模块:监控器和分析器。监控器首次尝试修改名为 TaintDroid 的污点标签方法,开发了内置的意图服务原语,以帮助 Android 捕捉多层次的意图相关污点传播,从而实现恶意 ICC 检测。具体来说,我们在组件的交互式工作流程中嵌入了五个抽象功能,使监控器能够执行全系统的意图跟踪。通过分析监控器提供的污点日志,分析器可以建立准确、综合的 ICC 模式,采用识别算法和预定义规则识别特定的泄漏威胁模式。同时,我们还采用了模式放缩技术来提高分析器的效率。我们利用安卓开源项目实现了 SIAT,并通过在由知名数据集和真实应用程序组成的特定数据集上进行大量实验来评估其性能。实验结果表明,与最先进的方法相比,SIAT 在精度为 1.0、召回率为 0.98 的情况下,准确率提高了约 25% ∼ 200%,运行时开销几乎可以忽略不计。除此以外,SIAT 还能在 Google Play 市场上下载量较大的真实应用程序中识别出两种之前的技术无法检测到的未公开绕过情况和大量恶意 ICC 威胁。
{"title":"SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android","authors":"Yupeng Hu, Wenxin Kuang, Jin Zhe, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu","doi":"10.3233/jcs-220044","DOIUrl":"https://doi.org/10.3233/jcs-220044","url":null,"abstract":"This paper presents the design and implementation of a systematic Inter-Component Communications (ICCs) dynamic Analysis Technique (SIAT) for detecting privacy-sensitive data leak threats. SIAT’s specific approach involves the identification of malicious ICC patterns by actively tracing both data flows and implicit control flows within ICC processes during runtime. This is achieved by utilizing the taint tagging methodology, a technique utilized by TaintDroid. As a result, it can discover the malicious intent usage pattern and further resolve the coincidental malicious ICCs and bypass cases without incurring performance degradation. SIAT comprises two key modules: Monitor and Analyzer. The Monitor makes the first attempt to revise the taint tag approach named TaintDroid by developing the built-in intent service primitives to help Android capture the intent-related taint propagation at multi-level for malicious ICC detection. Specifically, we enable the Monitor to perform systemwide tracking of intent with five abstraction functionalities embedded in the interactive workflow of components. By analyzing the taint logs offered by the Monitor, the Analyzer can build the accurate and integrated ICC patterns adopted to identify the specific leak threat patterns with the identification algorithms and predefined rules. Meanwhile, we employ the patterns’ deflation technique to improve the efficiency of the Analyzer. We implement the SIAT with Android Open Source Project and evaluate its performance through extensive experiments on a particular dataset consisting of well-known datasets and real-world apps. The experimental results show that, compared to state-of-the-art approaches, the SIAT can achieve about 25% ∼200% accuracy improvements with 1.0 precision and 0.98 recall at negligible runtime overhead. Apart from that, the SIAT can identify two undisclosed cases of bypassing that prior technologies cannot detect and quite a few malicious ICC threats in real-world apps with lots of downloads on the Google Play market.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139223246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming DSLR-:用于防御面向数据编程的低开销数据结构布局随机化
IF 1.2 Q3 Engineering Pub Date : 2023-11-24 DOI: 10.3233/jcs-230053
Jin Wei, Ping Chen
By developing a Turing-complete non-control data attack to bypass existing defenses against control flow attacks, Data-Oriented Programming (DOP) has gained significant attention from researchers in recent years. While several defense techniques have been proposed to mitigate DOP attacks, they often introduce substantial overhead due to the blind protection of a large range of data objects. To address this issue, we focus on selecting and protecting the specific target data that are of interest to DOP attackers, rather than securing the entire non-control data in the program. In this regard, we perform static analysis on 20 real-world applications and identify the target data, verifying that they constitute only a small percentage of the overall program, averaging around 3%. Additionally, we propose a semi-automated tool to analyze how to chain operations on the target data in these 20 applications to achieve Turing-complete attacks. Furthermore, we introduce DSLR-: a low-overhead Data Structure Layout Randomization (DSLR) method, which modifies the existing DSLR technique to only randomize the selected target data for DOP. Experimental results demonstrate that DSLR- effectively mitigates DOP attacks, reducing performance overhead by 71.2% and memory overhead by 82.5% compared to the original DSLR technique.
通过开发图灵完备的非控制数据攻击来绕过现有的控制流攻击防御,数据导向编程(DOP)近年来获得了研究人员的极大关注。虽然已经提出了多种防御技术来缓解 DOP 攻击,但由于需要盲目保护大量数据对象,这些技术往往会带来巨大的开销。为了解决这个问题,我们专注于选择和保护 DOP 攻击者感兴趣的特定目标数据,而不是保护程序中的全部非控制数据。为此,我们对 20 个现实世界的应用程序进行了静态分析,并确定了目标数据,验证了它们只占整个程序的一小部分,平均约为 3%。此外,我们还提出了一种半自动工具,用于分析如何对这 20 个应用程序中的目标数据进行连锁操作,以实现图灵完备攻击。此外,我们还引入了 DSLR-:一种低开销的数据结构布局随机化(DSLR)方法,它修改了现有的 DSLR 技术,只对 DOP 所选的目标数据进行随机化。实验结果表明,DSLR- 能有效缓解 DOP 攻击,与原始 DSLR 技术相比,性能开销降低了 71.2%,内存开销降低了 82.5%。
{"title":"DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming","authors":"Jin Wei, Ping Chen","doi":"10.3233/jcs-230053","DOIUrl":"https://doi.org/10.3233/jcs-230053","url":null,"abstract":"By developing a Turing-complete non-control data attack to bypass existing defenses against control flow attacks, Data-Oriented Programming (DOP) has gained significant attention from researchers in recent years. While several defense techniques have been proposed to mitigate DOP attacks, they often introduce substantial overhead due to the blind protection of a large range of data objects. To address this issue, we focus on selecting and protecting the specific target data that are of interest to DOP attackers, rather than securing the entire non-control data in the program. In this regard, we perform static analysis on 20 real-world applications and identify the target data, verifying that they constitute only a small percentage of the overall program, averaging around 3%. Additionally, we propose a semi-automated tool to analyze how to chain operations on the target data in these 20 applications to achieve Turing-complete attacks. Furthermore, we introduce DSLR-: a low-overhead Data Structure Layout Randomization (DSLR) method, which modifies the existing DSLR technique to only randomize the selected target data for DOP. Experimental results demonstrate that DSLR- effectively mitigates DOP attacks, reducing performance overhead by 71.2% and memory overhead by 82.5% compared to the original DSLR technique.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139241761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
StegEraser: Defending cybersecurity against malicious covert communications StegEraser:抵御恶意隐蔽通信,保护网络安全
IF 1.2 Q3 Engineering Pub Date : 2023-11-17 DOI: 10.3233/jcs-220094
Jianfeng Zhang, Wensheng Zhang, Jingdong Xu
Traditionally, the mission of intercepting malicious traffic between the Internet and the internal network of entities like organizations and corporations, is largely fulfilled by techniques such as deep packet inspection (DPI). However, steganography, the methodology of hiding secret data in seemingly benign public mediums (e.g., images), has been leveraged by advanced persistent threat (APT) groups in recent years, and is almost impossible to be detected and intercepted by traditional techniques, posing a pervasive and realistic threat to cybersecurity. Additionally, internal networks’ vulnerability to steganography is further exacerbated by the connectivity and large attack surface of the Internet of Things (IoT), whose adoption and deployment are quickly expanding. To protect computer systems against malicious communications that apply steganographic methods potentially unknown to cybersecurity stakeholders, we propose StegEraser, an approach to removing the secret information embedded in public mediums by adversaries, that is fundamentally distinct from existing research which is primarily designed for known steganographic methods. Implemented for images, StegEraser injects an excessively huge amount of random binary data with a novel steganographic method into the images, by utilizing the information-merging capabilities of invertible neural networks (INNs), in order to “overload” adversaries’ steganographic hiding capacity of images transmitted through the firewall performing DPI. In the meantime, StegEraser preserves the perceptual quality of the images. In other words, StegEraser “defeats unknown steganography with steganography”. Extensive evaluation verifies that StegEraser significantly outperforms state-of-the-art (SOTA) methods in terms of removing secret information embedded with both traditional and neural network-based steganographic methods, while visually maintaining the image quality.
传统上,拦截互联网与组织和公司等实体内部网络之间恶意流量的任务主要由深度数据包检测(DPI)等技术来完成。然而,隐写术是一种将秘密数据隐藏在看似无害的公共媒介(如图像)中的方法,近年来已被高级持续威胁(APT)组织所利用,传统技术几乎无法检测和拦截,对网络安全构成了无处不在的现实威胁。此外,物联网(IoT)的连接性和巨大的攻击面进一步加剧了内部网络对隐写术的脆弱性,而物联网的采用和部署正在迅速扩大。为了保护计算机系统免受恶意通信的攻击,这些恶意通信采用了网络安全利益相关者可能不知道的隐写方法,我们提出了 StegEraser,这是一种移除对手嵌入公共媒介中的秘密信息的方法,与主要针对已知隐写方法设计的现有研究有着本质区别。针对图像,StegEraser 利用可逆神经网络(INNs)的信息合并能力,通过一种新颖的隐写方法向图像中注入过量的随机二进制数据,以 "超载 "对手通过执行 DPI 的防火墙传输的图像的隐写隐藏能力。同时,StegEraser 还能保持图像的感知质量。换句话说,StegEraser "用隐写术打败未知隐写术"。广泛的评估证明,StegEraser 在去除传统和基于神经网络的隐写方法所嵌入的秘密信息方面,明显优于最先进的(SOTA)方法,同时在视觉上保持了图像质量。
{"title":"StegEraser: Defending cybersecurity against malicious covert communications","authors":"Jianfeng Zhang, Wensheng Zhang, Jingdong Xu","doi":"10.3233/jcs-220094","DOIUrl":"https://doi.org/10.3233/jcs-220094","url":null,"abstract":"Traditionally, the mission of intercepting malicious traffic between the Internet and the internal network of entities like organizations and corporations, is largely fulfilled by techniques such as deep packet inspection (DPI). However, steganography, the methodology of hiding secret data in seemingly benign public mediums (e.g., images), has been leveraged by advanced persistent threat (APT) groups in recent years, and is almost impossible to be detected and intercepted by traditional techniques, posing a pervasive and realistic threat to cybersecurity. Additionally, internal networks’ vulnerability to steganography is further exacerbated by the connectivity and large attack surface of the Internet of Things (IoT), whose adoption and deployment are quickly expanding. To protect computer systems against malicious communications that apply steganographic methods potentially unknown to cybersecurity stakeholders, we propose StegEraser, an approach to removing the secret information embedded in public mediums by adversaries, that is fundamentally distinct from existing research which is primarily designed for known steganographic methods. Implemented for images, StegEraser injects an excessively huge amount of random binary data with a novel steganographic method into the images, by utilizing the information-merging capabilities of invertible neural networks (INNs), in order to “overload” adversaries’ steganographic hiding capacity of images transmitted through the firewall performing DPI. In the meantime, StegEraser preserves the perceptual quality of the images. In other words, StegEraser “defeats unknown steganography with steganography”. Extensive evaluation verifies that StegEraser significantly outperforms state-of-the-art (SOTA) methods in terms of removing secret information embedded with both traditional and neural network-based steganographic methods, while visually maintaining the image quality.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of neural network detectors for network attacks 网络攻击神经网络探测器分析
IF 1.2 Q3 Engineering Pub Date : 2023-11-15 DOI: 10.3233/jcs-230031
Qingtian Zou, Lan Zhang, A. Singhal, Xiaoyan Sun, Peng Liu
While network attacks play a critical role in many advanced persistent threat (APT) campaigns, an arms race exists between the network defenders and the adversary: to make APT campaigns stealthy, the adversary is strongly motivated to evade the detection system. However, new studies have shown that neural network is likely a game-changer in the arms race: neural network could be applied to achieve accurate, signature-free, and low-false-alarm-rate detection. In this work, we investigate whether the adversary could fight back during the next phase of the arms race. In particular, noticing that none of the existing adversarial example generation methods could generate malicious packets (and sessions) that can simultaneously compromise the target machine and evade the neural network detection model, we propose a novel attack method to achieve this goal. We have designed and implemented the new attack. We have also used Address Resolution Protocol (ARP) Poisoning and Domain Name System (DNS) Cache Poisoning as the case study to demonstrate the effectiveness of the proposed attack.
虽然网络攻击在许多高级持续威胁(APT)活动中扮演着重要角色,但网络防御者与对手之间存在着军备竞赛:为了使 APT 活动隐蔽,对手有强烈的动机逃避检测系统。然而,新的研究表明,神经网络很可能改变这场军备竞赛的格局:神经网络可用于实现精确、无签名和低误报率的检测。在这项工作中,我们研究了对手能否在军备竞赛的下一阶段进行反击。特别是,我们注意到现有的对抗范例生成方法都无法生成既能入侵目标机器又能躲避神经网络检测模型的恶意数据包(和会话),因此我们提出了一种新的攻击方法来实现这一目标。我们设计并实现了新的攻击方法。我们还使用地址解析协议(ARP)中毒和域名系统(DNS)缓存中毒作为案例研究,以证明所提攻击的有效性。
{"title":"Analysis of neural network detectors for network attacks","authors":"Qingtian Zou, Lan Zhang, A. Singhal, Xiaoyan Sun, Peng Liu","doi":"10.3233/jcs-230031","DOIUrl":"https://doi.org/10.3233/jcs-230031","url":null,"abstract":"While network attacks play a critical role in many advanced persistent threat (APT) campaigns, an arms race exists between the network defenders and the adversary: to make APT campaigns stealthy, the adversary is strongly motivated to evade the detection system. However, new studies have shown that neural network is likely a game-changer in the arms race: neural network could be applied to achieve accurate, signature-free, and low-false-alarm-rate detection. In this work, we investigate whether the adversary could fight back during the next phase of the arms race. In particular, noticing that none of the existing adversarial example generation methods could generate malicious packets (and sessions) that can simultaneously compromise the target machine and evade the neural network detection model, we propose a novel attack method to achieve this goal. We have designed and implemented the new attack. We have also used Address Resolution Protocol (ARP) Poisoning and Domain Name System (DNS) Cache Poisoning as the case study to demonstrate the effectiveness of the proposed attack.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139273299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache attacks on subkey calculation of Blowfish 对 Blowfish 算法子密钥计算的缓存攻击
IF 1.2 Q3 Engineering Pub Date : 2023-11-15 DOI: 10.3233/jcs-230052
Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao
Cache attacks pose a serious security threat to cryptographic implementations in processor architectures. In this paper, we first propose cache attacks against Blowfish, which can break the protection of key-dependent S-box. This attack targets at the subkey calculation of Blowfish, and fully exploits features of the subkey calculation to construct a leakage equation group about the key. Without any knowledge of plaintext and ciphertext, the attacker only needs to obtain the cache leakage once to recover a variable-length key in minute-level time. More than that, we establish a leakage model for cache attack situations to evaluate the exhausting space of the intermediate value of block ciphers, and estimate the time complexity of cache attacks. In our experiments, we perform Flush + Reload and Prime + Probe attacks and recover the random key of Blowfish in OpenSSL 1.1.1h in 4 minutes. Furthermore, we have applied our attacks to existing systems, such as JavaScript-blowfish and Bcrypt. Our attack on JavaScript-blowfish can recover any plaintext input by the user. As for Bcrypt, our attack can recover the hash values stored in the database, thereby allowing attackers to impersonate the user’s identity.
缓存攻击对处理器架构中的加密实现构成了严重的安全威胁。在本文中,我们首先提出了针对 Blowfish 的缓存攻击,它可以破坏依赖密钥的 S-box 的保护。这种攻击以 Blowfish 的子密钥计算为目标,充分利用子密钥计算的特点来构建密钥泄漏方程组。在不知道明文和密文的情况下,攻击者只需获得一次缓存泄漏,就能在分钟级的时间内恢复可变长度的密钥。此外,我们还建立了缓存攻击情况下的泄漏模型,以评估块密码中间值的耗尽空间,并估算缓存攻击的时间复杂度。在实验中,我们执行了 Flush + Reload 和 Prime + Probe 攻击,并在 4 分钟内恢复了 OpenSSL 1.1.1h 中 Blowfish 的随机密钥。此外,我们还将攻击应用于现有系统,如 JavaScript-blowfish 和 Bcrypt。我们对 JavaScript-blowfish 的攻击可以恢复用户输入的任何明文。至于 Bcrypt,我们的攻击可以恢复数据库中存储的哈希值,从而允许攻击者冒充用户身份。
{"title":"Cache attacks on subkey calculation of Blowfish","authors":"Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao","doi":"10.3233/jcs-230052","DOIUrl":"https://doi.org/10.3233/jcs-230052","url":null,"abstract":"Cache attacks pose a serious security threat to cryptographic implementations in processor architectures. In this paper, we first propose cache attacks against Blowfish, which can break the protection of key-dependent S-box. This attack targets at the subkey calculation of Blowfish, and fully exploits features of the subkey calculation to construct a leakage equation group about the key. Without any knowledge of plaintext and ciphertext, the attacker only needs to obtain the cache leakage once to recover a variable-length key in minute-level time. More than that, we establish a leakage model for cache attack situations to evaluate the exhausting space of the intermediate value of block ciphers, and estimate the time complexity of cache attacks. In our experiments, we perform Flush + Reload and Prime + Probe attacks and recover the random key of Blowfish in OpenSSL 1.1.1h in 4 minutes. Furthermore, we have applied our attacks to existing systems, such as JavaScript-blowfish and Bcrypt. Our attack on JavaScript-blowfish can recover any plaintext input by the user. As for Bcrypt, our attack can recover the hash values stored in the database, thereby allowing attackers to impersonate the user’s identity.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing blockchain-based timed data release against adversarial attacks 保护基于区块链的定时数据发布免受对抗性攻击
Q3 Engineering Pub Date : 2023-11-10 DOI: 10.3233/jcs-230001
Jingzhe Wang, Balaji Palanisamy
Timed data release refers to protecting sensitive data that can be accessed only after a pre-determined amount of time has passed. While blockchain-based solutions for timed data release provide a promising approach for decentralizing the process, designing an attack-resilient timed-release service that is resilient to malicious adversaries in a blockchain network is inherently challenging. A timed-release service on a blockchain network is inevitably exposed to the risk of post-facto attacks where adversaries may launch attacks after the data is released in the blockchain network. Existing incentive-based solutions for timed data release in Ethereum blockchains guarantee protection under the assumption of a fully rational adversarial environment in which every peer acts rationally. However, these schemes fail invariably when even a single participating peer node in the protocol starts acting maliciously and deviates from the rational behavior. In this paper, we propose a systematic solution for attack-resilient and practical blockchain-based timed data release in a mixed adversarial environment, where both malicious adversaries and rational adversaries exist. We first propose an effective uncertainty-aware reputation measure to capture the behaviors of the peer involved in timed data release activities in the network. In light of such a measure, we present the design of a basic protocol that consists of two critical ingredients, namely reputation-aware peer recruitment and verifiable enforcement protocols. The former, prior to the start of the enforcement protocols, performs peer recruitment based on the reputation measure to make the design probabilistically attack-resilient to the post-facto attacks. The latter is responsible for contractually guarding the recruited peers at runtime by transparently reporting observed adversarial behaviors. However, the basic recruitment design is only aware of the reputation of the peers and it does not consider the working time schedule of the participating peers and as a result, it results in lower attack-resilience. To enhance the attack resilience further without impacting the verifiable enforcement protocols, we propose a temporal graph-based reputation-aware peer recruitment algorithm that carefully determines the peer recruitment plan to make the service more attack-resilient. In our proposed approach, we formally capture the timed data release service as a temporal graph and we develop a novel maximal attack-resilient path-finding algorithm on the temporal graph for the participating peers. We implement a prototype of the proposed approach using Smart Contracts and deploy it on the Ethereum official test network, Rinkeby. For extensively evaluating the proposed techniques, we perform simulation experiments to validate the effectiveness of the reputation-aware timed data release protocols as well as our proposed temporal-graph-based improvements. The results demonstrate the effectiveness and strong att
定时数据释放是指在预先设定的时间过后才能访问的敏感数据。虽然基于区块链的定时数据发布解决方案为分散流程提供了一种有希望的方法,但在区块链网络中设计一种具有攻击弹性的定时发布服务,以抵御恶意对手,这本身就是一项挑战。区块链网络上的定时发布服务不可避免地会面临事后攻击的风险,即对手可能会在数据在区块链网络中发布后发起攻击。在以太坊区块链中,现有的基于激励的定时数据发布解决方案保证了在一个完全理性的对抗环境下的保护,在这个环境中,每个对等体都有理性的行为。然而,当协议中的单个参与对等节点开始恶意行为并偏离理性行为时,这些方案总是失败。在本文中,我们提出了一种系统的解决方案,用于在混合对抗环境中进行攻击弹性和实用的基于区块链的定时数据发布,其中存在恶意对手和理性对手。我们首先提出了一种有效的不确定性感知信誉度量,以捕获网络中参与定时数据发布活动的对等体的行为。鉴于这种措施,我们提出了一个基本协议的设计,该协议由两个关键组成部分组成,即声誉意识对等招聘和可验证的执行协议。前者,在执行协议开始之前,基于声誉度量执行对等招募,以使设计对事后攻击具有概率攻击弹性。后者负责通过透明地报告观察到的敌对行为,在运行时以契约的方式保护被招募的同伴。然而,基本的招聘设计只考虑了同行的声誉,而没有考虑参与同行的工作时间安排,这导致了较低的攻击弹性。为了在不影响可验证强制协议的情况下进一步增强攻击弹性,我们提出了一种基于时间图的声誉感知对等招聘算法,该算法仔细确定对等招聘计划,使服务更具攻击弹性。在我们提出的方法中,我们将定时数据发布服务形式化地捕获为一个时间图,并在参与节点的时间图上开发了一种新的最大攻击弹性寻路算法。我们使用智能合约实现了提议方法的原型,并将其部署在以太坊官方测试网络Rinkeby上。为了广泛评估所提出的技术,我们进行了模拟实验,以验证声誉感知定时数据发布协议以及我们提出的基于时间图的改进的有效性。结果证明了所提出机制的有效性和强大的攻击弹性,并且我们的方法仅产生适度的gas成本。
{"title":"Securing blockchain-based timed data release against adversarial attacks","authors":"Jingzhe Wang, Balaji Palanisamy","doi":"10.3233/jcs-230001","DOIUrl":"https://doi.org/10.3233/jcs-230001","url":null,"abstract":"Timed data release refers to protecting sensitive data that can be accessed only after a pre-determined amount of time has passed. While blockchain-based solutions for timed data release provide a promising approach for decentralizing the process, designing an attack-resilient timed-release service that is resilient to malicious adversaries in a blockchain network is inherently challenging. A timed-release service on a blockchain network is inevitably exposed to the risk of post-facto attacks where adversaries may launch attacks after the data is released in the blockchain network. Existing incentive-based solutions for timed data release in Ethereum blockchains guarantee protection under the assumption of a fully rational adversarial environment in which every peer acts rationally. However, these schemes fail invariably when even a single participating peer node in the protocol starts acting maliciously and deviates from the rational behavior. In this paper, we propose a systematic solution for attack-resilient and practical blockchain-based timed data release in a mixed adversarial environment, where both malicious adversaries and rational adversaries exist. We first propose an effective uncertainty-aware reputation measure to capture the behaviors of the peer involved in timed data release activities in the network. In light of such a measure, we present the design of a basic protocol that consists of two critical ingredients, namely reputation-aware peer recruitment and verifiable enforcement protocols. The former, prior to the start of the enforcement protocols, performs peer recruitment based on the reputation measure to make the design probabilistically attack-resilient to the post-facto attacks. The latter is responsible for contractually guarding the recruited peers at runtime by transparently reporting observed adversarial behaviors. However, the basic recruitment design is only aware of the reputation of the peers and it does not consider the working time schedule of the participating peers and as a result, it results in lower attack-resilience. To enhance the attack resilience further without impacting the verifiable enforcement protocols, we propose a temporal graph-based reputation-aware peer recruitment algorithm that carefully determines the peer recruitment plan to make the service more attack-resilient. In our proposed approach, we formally capture the timed data release service as a temporal graph and we develop a novel maximal attack-resilient path-finding algorithm on the temporal graph for the participating peers. We implement a prototype of the proposed approach using Smart Contracts and deploy it on the Ethereum official test network, Rinkeby. For extensively evaluating the proposed techniques, we perform simulation experiments to validate the effectiveness of the reputation-aware timed data release protocols as well as our proposed temporal-graph-based improvements. The results demonstrate the effectiveness and strong att","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135088511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1