首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
“Animation” URL in NFT marketplaces considered harmful for privacy NFT 市场中的 "动画 "URL 被认为对隐私有害
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1007/s10207-024-00908-x
Patricia Callejo, Ignacio Gómez Fernández, Marcelo Bagnulo

Non-Fungible Tokens (NFTs) are becoming increasingly popular as a way to represent and own digital property. However, the usage of NFTs also prompts questions about privacy. In this work, we show that it is possible to use NFTs to retrieve enough information to fingerprint users. By doing so, we can uniquely associate users with blockchain accounts. This would allow linking several blockchain accounts to the same user. This work focuses on the vulnerabilities presented by some popular NFT marketplaces. Since NFTs may have HTML files embedded, they allow the use of fingerprinting techniques if not handled carefully. Finally, we provide recommendations and countermeasures for the different actors in this ecosystem to avoid these kinds of tracking methods and, in doing so, safeguard user privacy.

作为代表和拥有数字财产的一种方式,不可兑换代币(NFT)正变得越来越流行。然而,NFT 的使用也引发了有关隐私的问题。在这项工作中,我们展示了使用 NFT 获取足够信息来对用户进行指纹识别的可能性。通过这种方法,我们可以将用户与区块链账户唯一关联起来。这样就可以将多个区块链账户与同一个用户联系起来。这项工作的重点是一些流行的 NFT 市场带来的漏洞。由于 NFT 可能嵌入了 HTML 文件,因此如果处理不慎,就有可能使用指纹识别技术。最后,我们为该生态系统中的不同参与者提供了建议和对策,以避免此类跟踪方法,并在此过程中保护用户隐私。
{"title":"“Animation” URL in NFT marketplaces considered harmful for privacy","authors":"Patricia Callejo, Ignacio Gómez Fernández, Marcelo Bagnulo","doi":"10.1007/s10207-024-00908-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00908-x","url":null,"abstract":"<p>Non-Fungible Tokens (NFTs) are becoming increasingly popular as a way to represent and own digital property. However, the usage of NFTs also prompts questions about privacy. In this work, we show that it is possible to use NFTs to retrieve enough information to fingerprint users. By doing so, we can uniquely associate users with blockchain accounts. This would allow linking several blockchain accounts to the same user. This work focuses on the vulnerabilities presented by some popular NFT marketplaces. Since NFTs may have HTML files embedded, they allow the use of fingerprinting techniques if not handled carefully. Finally, we provide recommendations and countermeasures for the different actors in this ecosystem to avoid these kinds of tracking methods and, in doing so, safeguard user privacy.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"189 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142264223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of proposals towards the privacy-preserving publication of trajectory data 轨迹数据隐私保护发布建议概览
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1007/s10207-024-00894-0
Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe

The privacy risks of processing human locations and their trajectories have been demonstrated by a large number of studies and real-world incidents. As a result, many efforts are aimed at making human location trajectories available for processing while protecting the privacy of individuals. A majority of these, however, are based on concepts and evaluation methodologies that do not always provide convincing results or obvious guarantees. The processing of locations and trajectories yields benefits in numerous domains, from municipal development over traffic engineering to personalized navigation and recommendations. It can also enable a variety of promising, entirely new applications, and is, therefore, the focus of many ongoing projects. With this article, we describe common trajectory types and representations and give a classification of meaningful utility measures, describe risks and attacks, and systematize previously published privacy notions. We then survey the field of protection mechanisms, classifying them into approaches of syntactic privacy, masking for differential privacy (DP), and generative approaches with DP for synthetic data. Key insights are that syntactic notions have serious drawbacks, especially in the field of trajectory data, but also that a large part of the literature that claims DP guarantees is considerably flawed. We also gather evidence that there may be hidden potential in the development of synthetic data generators, probably especially using deep learning with DP, since the utility of synthetic data has not been very satisfactory so far.

大量研究和现实世界中的事件已经证明,处理人类位置及其轨迹存在隐私风险。因此,许多人都致力于在保护个人隐私的同时处理人类位置轨迹。然而,其中大部分都是基于概念和评估方法,并不总能提供令人信服的结果或明显的保证。对位置和轨迹的处理可为众多领域带来益处,从市政发展到交通工程,再到个性化导航和推荐。它还能实现各种前景广阔的全新应用,因此是许多正在进行的项目的重点。在本文中,我们将介绍常见的轨迹类型和表示方法,并对有意义的效用衡量标准进行分类,描述风险和攻击,并将之前发布的隐私概念系统化。然后,我们对保护机制领域进行了调查,将其分为句法隐私方法、差分隐私(DP)遮蔽方法和合成数据的 DP 生成方法。我们的主要见解是,语法概念有严重的缺陷,尤其是在轨迹数据领域,而且声称有 DP 保证的大部分文献都存在很大缺陷。我们还收集到证据表明,合成数据生成器的开发可能隐藏着巨大潜力,尤其是使用深度学习与 DP 的合成数据生成器,因为合成数据的实用性至今还不尽如人意。
{"title":"An overview of proposals towards the privacy-preserving publication of trajectory data","authors":"Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe","doi":"10.1007/s10207-024-00894-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00894-0","url":null,"abstract":"<p>The privacy risks of processing human locations and their trajectories have been demonstrated by a large number of studies and real-world incidents. As a result, many efforts are aimed at making human location trajectories available for processing while protecting the privacy of individuals. A majority of these, however, are based on concepts and evaluation methodologies that do not always provide convincing results or obvious guarantees. The processing of locations and trajectories yields benefits in numerous domains, from municipal development over traffic engineering to personalized navigation and recommendations. It can also enable a variety of promising, entirely new applications, and is, therefore, the focus of many ongoing projects. With this article, we describe common trajectory types and representations and give a classification of meaningful utility measures, describe risks and attacks, and systematize previously published privacy notions. We then survey the field of protection mechanisms, classifying them into approaches of syntactic privacy, masking for differential privacy (DP), and generative approaches with DP for synthetic data. Key insights are that syntactic notions have serious drawbacks, especially in the field of trajectory data, but also that a large part of the literature that claims DP guarantees is considerably flawed. We also gather evidence that there may be hidden potential in the development of synthetic data generators, probably especially using deep learning with DP, since the utility of synthetic data has not been very satisfactory so far.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"101 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design 加强国家身份识别系统中的隐私保护:审查利益相关者对隐私设计的认识、态度和做法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s10207-024-00905-0
Mohamed Abomhara, Livinus Obiora Nweke, Sule Yildirim Yayilgan, Debora Comparin, Kristel Teyras, Stéphanie de Labriolle

Privacy by Design (PbD) is a well-known concept that aims to provide a high level of protection for privacy throughout the entire life cycle of systems development. Despite the considerable attention from stakeholders such as researchers, government agencies, and system suppliers, the widespread adoption of PbD faces obstacles due to a lack of knowledge, insufficient awareness of PbD benefits, and the absence of specific implementation guidelines. In this study, stakeholders are identified primarily as diverse participants from government agencies and system suppliers engaged in National Identification Systems (NIDS). Specifically, government agencies representing regulatory bodies and administrators of NIDS, setting the legal framework that governs the NIDS’s privacy aspects. The NIDS system suppliers includes private companies playing a crucial role in the development and implementation of NIDS with a focus on privacy considerations. Through the perspectives of NIDS stakeholders, this study aimed to examine the Knowledge, Attitudes and Practices (KAP) of PbD principles and its integration in NIDS. A survey involving 203 participants from government agencies and NIDS system suppliers engaged in NIDS development was conducted. Subsequently, a focus group discussion was held with 11 members to provide qualitative insights into the KAP of PbD. The survey results revealed a significant correlation between attitudes and practices but a weak correlation between knowledge and attitudes or practices. The focus group discussion assured these findings, emphasizing the role of positive attitudes in facilitating PbD practices and highlighting knowledge-practice gaps. In conclusion, this study offers tailored recommendations for improving the integration of PbD in NIDS development. The recommendations includes strategies such as developing training programs, establishing clear guidelines and standards and creating awareness campaigns.

隐私保护设计(PbD)是一个众所周知的概念,其目的是在系统开发的整个生命周期中提供高水平的隐私保护。尽管受到了研究人员、政府机构和系统供应商等利益相关者的广泛关注,但由于缺乏相关知识、对 PbD 的益处认识不足以及缺乏具体的实施指南,PbD 的广泛采用仍面临重重障碍。在本研究中,利益相关者主要是指从事国家身份识别系统(NIDS)的政府机构和系统供应商的不同参与者。具体来说,政府机构代表国家身份识别系统的监管机构和管理者,制定管理国家身份识别系统隐私方面的法律框架。国家身份识别系统供应商包括在开发和实施国家身份识别系统中发挥关键作用的私营公司,其重点是隐私方面的考虑。本研究旨在通过 NIDS 利益相关者的视角,考察他们对 PbD 原则的认识、态度和做法 (KAP),以及将其纳入 NIDS 的情况。本研究进行了一项调查,有 203 名来自政府机构和参与 NIDS 开发的 NIDS 系统供应商的人员参加。随后,与 11 名成员进行了焦点小组讨论,以提供有关 PbD 的 KAP 的定性见解。调查结果显示,态度与实践之间存在明显的相关性,但知识与态度或实践之间的相关性较弱。焦点小组讨论证实了这些结果,强调了积极态度在促进实践中的作用,并突出了知识与实践之间的差距。总之,本研究提出了有针对性的建议,以更好地将项目促发展纳入国家艾滋病规划署的发展。这些建议包括制定培训计划、建立明确的指导方针和标准以及开展宣传活动等战略。
{"title":"Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design","authors":"Mohamed Abomhara, Livinus Obiora Nweke, Sule Yildirim Yayilgan, Debora Comparin, Kristel Teyras, Stéphanie de Labriolle","doi":"10.1007/s10207-024-00905-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00905-0","url":null,"abstract":"<p>Privacy by Design (PbD) is a well-known concept that aims to provide a high level of protection for privacy throughout the entire life cycle of systems development. Despite the considerable attention from stakeholders such as researchers, government agencies, and system suppliers, the widespread adoption of PbD faces obstacles due to a lack of knowledge, insufficient awareness of PbD benefits, and the absence of specific implementation guidelines. In this study, stakeholders are identified primarily as diverse participants from government agencies and system suppliers engaged in National Identification Systems (NIDS). Specifically, government agencies representing regulatory bodies and administrators of NIDS, setting the legal framework that governs the NIDS’s privacy aspects. The NIDS system suppliers includes private companies playing a crucial role in the development and implementation of NIDS with a focus on privacy considerations. Through the perspectives of NIDS stakeholders, this study aimed to examine the Knowledge, Attitudes and Practices (KAP) of PbD principles and its integration in NIDS. A survey involving 203 participants from government agencies and NIDS system suppliers engaged in NIDS development was conducted. Subsequently, a focus group discussion was held with 11 members to provide qualitative insights into the KAP of PbD. The survey results revealed a significant correlation between attitudes and practices but a weak correlation between knowledge and attitudes or practices. The focus group discussion assured these findings, emphasizing the role of positive attitudes in facilitating PbD practices and highlighting knowledge-practice gaps. In conclusion, this study offers tailored recommendations for improving the integration of PbD in NIDS development. The recommendations includes strategies such as developing training programs, establishing clear guidelines and standards and creating awareness campaigns.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"57 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption 基于 CP-ABE 加密技术的用于保护医疗物联网 (IoMT) 的增强型可验证轻量级身份验证协议
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s10207-024-00906-z
Jihane Jebrane, Saiida Lazaar

The integration of the Internet of Things into patient monitoring devices has garnered significant attention, especially in response to the COVID-19 pandemic’s increased focus on telecare services. However, Internet of Medical Things (IoMT) devices are constrained by computational power, memory, and bandwidth, making them vulnerable to security risks associated with data transmissions over public networks. Effective authentication is essential for safeguarding patient data and preventing unauthorized control of medical sensors. Existing IoMT authentication protocols frequently fall short, exposing critical vulnerabilities such as replay and impersonation attacks. This paper extends our prior work on the Improved Lightweight Authentication Protocol (ILAPU-Q), which is based on elliptic curves and the U-Quark hash function. We enhance the ILAPU-Q scheme and present a more secure authentication protocol for embedded medical devices. This enhancement relies on Ciphertext Policy-Attribute Based Encryption (CP-ABE), enabling data sources to protect information by cryptographically enforcing access policies. Implementing CP-ABE within the Telemedicine Information System framework eliminates the need for secure data transmission or storage at a dedicated location. Comprehensive security evaluations, conducted using AVISPA and Burrows-Abadi-Needham logic (BAN Logic), confirm the protocol’s resilience against a broad spectrum of attacks. Moreover, performance assessments reveal significant advancements in computational efficiency, communication overhead, and storage requirements. Notably, our protocol demonstrates an efficiency improvement of approximately 95–98% over other protocols. This substantial improvement in security and performance underscores the practical value and potential of our protocol in advancing IoMT security standards.

将物联网集成到病人监护设备中已引起了广泛关注,尤其是 COVID-19 大流行对远程护理服务的日益重视。然而,医疗物联网(IoMT)设备受到计算能力、内存和带宽的限制,很容易受到与公共网络数据传输相关的安全风险的影响。有效的身份验证对于保护患者数据和防止未经授权控制医疗传感器至关重要。现有的 IoMT 身份验证协议往往存在不足,暴露出重放和冒充攻击等关键漏洞。本文扩展了我们之前在改进型轻量级身份验证协议(ILAPU-Q)方面的工作,该协议基于椭圆曲线和 U-Quark 哈希函数。我们改进了 ILAPU-Q 方案,为嵌入式医疗设备提出了一个更安全的身份验证协议。这一改进依赖于基于密文策略属性的加密(CP-ABE),使数据源能够通过加密执行访问策略来保护信息。在远程医疗信息系统框架内实施 CP-ABE,就无需在专用地点进行安全数据传输或存储。使用 AVISPA 和 Burrows-Abadi-Needham 逻辑(BAN 逻辑)进行的全面安全评估证实,该协议可抵御各种攻击。此外,性能评估还显示了在计算效率、通信开销和存储要求方面的显著进步。值得注意的是,我们的协议比其他协议的效率提高了约 95-98%。安全性和性能的大幅提升凸显了我们的协议在推进 IoMT 安全标准方面的实用价值和潜力。
{"title":"An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption","authors":"Jihane Jebrane, Saiida Lazaar","doi":"10.1007/s10207-024-00906-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00906-z","url":null,"abstract":"<p>The integration of the Internet of Things into patient monitoring devices has garnered significant attention, especially in response to the COVID-19 pandemic’s increased focus on telecare services. However, Internet of Medical Things (IoMT) devices are constrained by computational power, memory, and bandwidth, making them vulnerable to security risks associated with data transmissions over public networks. Effective authentication is essential for safeguarding patient data and preventing unauthorized control of medical sensors. Existing IoMT authentication protocols frequently fall short, exposing critical vulnerabilities such as replay and impersonation attacks. This paper extends our prior work on the Improved Lightweight Authentication Protocol (ILAPU-Q), which is based on elliptic curves and the U-Quark hash function. We enhance the ILAPU-Q scheme and present a more secure authentication protocol for embedded medical devices. This enhancement relies on Ciphertext Policy-Attribute Based Encryption (CP-ABE), enabling data sources to protect information by cryptographically enforcing access policies. Implementing CP-ABE within the Telemedicine Information System framework eliminates the need for secure data transmission or storage at a dedicated location. Comprehensive security evaluations, conducted using AVISPA and Burrows-Abadi-Needham logic (BAN Logic), confirm the protocol’s resilience against a broad spectrum of attacks. Moreover, performance assessments reveal significant advancements in computational efficiency, communication overhead, and storage requirements. Notably, our protocol demonstrates an efficiency improvement of approximately 95–98% over other protocols. This substantial improvement in security and performance underscores the practical value and potential of our protocol in advancing IoMT security standards.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"46 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multi-party computation with legally-enforceable fairness 具有可依法执行的公平性的安全多方计算
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s10207-024-00898-w
Takeshi Nakai, Kazumasa Shinagawa

Fairness is a security notion of secure computation and cannot always be achieved if an adversary corrupts a majority of parties in standard settings. Lindell (CT-RSA 2008) showed that imposing a monetary penalty on an adversary can circumvent the impossibility. He formalized such a security notion as “legally enforceable fairness" for the two-party setting based on the ideal trusted bank functionality and showed a protocol achieving the requirements. Based on the same framework, we introduce secure multi-party computation with legally enforceable fairness that is applicable for an arbitrary number of parties. Further, we propose two protocols that realize our introduced functionality. The first one achieves O(n) rounds and (O(n alpha )) fees, where n is the number of parties, and (alpha ) is a parameter for the penalty amount. The fee refers to the balance amount in the bank required at the beginning of the protocol, which evaluates the difficulty of participating in the protocol in a financial sense. The second one achieves O(1) rounds and (O(n^2 alpha )) fees.

公平性是安全计算的一个安全概念,在标准设置中,如果对手破坏了大多数计算方,公平性就不一定能实现。Lindell(CT-RSA,2008 年)表明,对对手施加金钱惩罚可以规避这种不可能性。他将这种安全概念正式表述为基于理想可信银行功能的 "法律上可强制执行的公平性",并展示了一种可满足要求的协议。基于同样的框架,我们介绍了具有可依法强制执行的公平性的安全多方计算,它适用于任意数量的计算方。此外,我们还提出了两个协议来实现我们介绍的功能。第一个协议实现了 O(n) 轮和 (O(n alpha )) 费用,其中 n 是当事人的数量,而 (alpha ) 是惩罚金额的参数。费用指的是协议开始时所需的银行存款余额,它从财务意义上评估了参与协议的难度。第二种实现了 O(1) 轮和 (O(n^2 alpha )) 费用。
{"title":"Secure multi-party computation with legally-enforceable fairness","authors":"Takeshi Nakai, Kazumasa Shinagawa","doi":"10.1007/s10207-024-00898-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00898-w","url":null,"abstract":"<p>Fairness is a security notion of secure computation and cannot always be achieved if an adversary corrupts a majority of parties in standard settings. Lindell (CT-RSA 2008) showed that imposing a monetary penalty on an adversary can circumvent the impossibility. He formalized such a security notion as “legally enforceable fairness\" for the <i>two-party</i> setting based on the ideal trusted bank functionality and showed a protocol achieving the requirements. Based on the same framework, we introduce secure <i>multi-party</i> computation with legally enforceable fairness that is applicable for an arbitrary number of parties. Further, we propose two protocols that realize our introduced functionality. The first one achieves <i>O</i>(<i>n</i>) rounds and <span>(O(n alpha ))</span> fees, where <i>n</i> is the number of parties, and <span>(alpha )</span> is a parameter for the penalty amount. The fee refers to the balance amount in the bank required at the beginning of the protocol, which evaluates the difficulty of participating in the protocol in a financial sense. The second one achieves <i>O</i>(1) rounds and <span>(O(n^2 alpha ))</span> fees.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"5 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher 确保物联网生态系统的安全:基于 ASIC 硬件实现 Ascon 轻量级密码
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s10207-024-00904-1
Safiullah Khan, Kashif Inayat, Fahad Bin Muslim, Yasir Ali Shah, Muhammad Atif Ur Rehman, Ayesha Khalid, Malik Imran, Akmalbek Abdusalomov

The Internet of Things (IoT) nodes consist of sensors that collect environmental data and then perform data exchange with surrounding nodes and gateways. Cybersecurity attacks pose a threat to the data security that is being transmitted in any IoT network. Cryptographic primitives are widely adopted to address these threats; however, the substantial computation demands limit their applicability in the IoT ecosystem. In addition, each IoT node varies with respect to the area and throughput (TP) requirements, thus demanding flexible implementation for encryption/decryption processes. To solve these issues, this work implements the NIST lightweight cryptography standard, Ascon, on a SAED 32 nm process design kit (PDK) library by employing loop folded, loop unrolled and fully unrolled architectures. The fully unrolled architecture can achieve the highest TP but at the cost of higher area utilisation. Unrolling by a lower factor results in lower area implementations, enabling the exploration of design space to tackle the trade-off between area and TP performance of the design. The implementation results show that, for loop folded architecture, Ascon-128 and Ascon-128a require 36.7k (upmu textrm{m}^{2}) and 38.5k (upmu textrm{m}^{2}) chip area, respectively compared to 277.1k (upmu textrm{m}^{2}) and 306.6k (upmu textrm{m}^{2}) required by their fully unrolled implementations. The proposed implementation strategies can adjust the number of rounds to accommodate the varied requirements of IoT ecosystems. An implementation with an open-source 45 nm PDK library is also undertaken for enhanced generalization and reproducibility of the results.

物联网(IoT)节点由传感器组成,传感器收集环境数据,然后与周围的节点和网关进行数据交换。网络安全攻击对物联网网络中传输的数据安全构成威胁。加密原语被广泛采用来应对这些威胁;然而,大量的计算需求限制了它们在物联网生态系统中的适用性。此外,每个物联网节点对面积和吞吐量(TP)的要求各不相同,因此需要灵活地实现加密/解密过程。为解决这些问题,本研究通过采用折叠环、开卷环和完全开卷架构,在 SAED 32 纳米工艺设计套件(PDK)库上实现了 NIST 轻量级加密标准 Ascon。完全解卷架构可实现最高 TP,但代价是更高的面积利用率。以较低的系数解卷可实现较低的面积,从而能够探索设计空间,解决设计的面积和 TP 性能之间的权衡问题。实现结果表明,对于循环折叠架构,Ascon-128 和 Ascon-128a 分别需要 36.7k (upmu textrm{m}^{2} )和 38.相比之下,完全展开实现所需的芯片面积分别为 277.1k (upmu textrm{m}^{2})和 306.6k(upmu textrm{m}^{2})。所提出的实现策略可以调整轮数,以适应物联网生态系统的不同要求。为了增强结果的通用性和可重复性,我们还利用开源的 45 纳米 PDK 库进行了实施。
{"title":"Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher","authors":"Safiullah Khan, Kashif Inayat, Fahad Bin Muslim, Yasir Ali Shah, Muhammad Atif Ur Rehman, Ayesha Khalid, Malik Imran, Akmalbek Abdusalomov","doi":"10.1007/s10207-024-00904-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00904-1","url":null,"abstract":"<p>The Internet of Things (IoT) nodes consist of sensors that collect environmental data and then perform data exchange with surrounding nodes and gateways. Cybersecurity attacks pose a threat to the data security that is being transmitted in any IoT network. Cryptographic primitives are widely adopted to address these threats; however, the substantial computation demands limit their applicability in the IoT ecosystem. In addition, each IoT node varies with respect to the area and throughput (TP) requirements, thus demanding flexible implementation for encryption/decryption processes. To solve these issues, this work implements the NIST lightweight cryptography standard, Ascon, on a SAED 32 nm process design kit (PDK) library by employing loop folded, loop unrolled and fully unrolled architectures. The fully unrolled architecture can achieve the highest TP but at the cost of higher area utilisation. Unrolling by a lower factor results in lower area implementations, enabling the exploration of design space to tackle the trade-off between area and TP performance of the design. The implementation results show that, for loop folded architecture, Ascon-128 and Ascon-128a require 36.7k <span>(upmu textrm{m}^{2})</span> and 38.5k <span>(upmu textrm{m}^{2})</span> chip area, respectively compared to 277.1k <span>(upmu textrm{m}^{2})</span> and 306.6k <span>(upmu textrm{m}^{2})</span> required by their fully unrolled implementations. The proposed implementation strategies can adjust the number of rounds to accommodate the varied requirements of IoT ecosystems. An implementation with an open-source 45 nm PDK library is also undertaken for enhanced generalization and reproducibility of the results.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"10 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial robustness of deep reinforcement learning-based intrusion detection 基于深度强化学习的入侵检测的对抗鲁棒性
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s10207-024-00903-2
Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens

Machine learning techniques, including Deep Reinforcement Learning (DRL), enhance intrusion detection systems by adapting to new threats. However, DRL’s reliance on vulnerable deep neural networks leads to susceptibility to adversarial examples-perturbations designed to evade detection. While adversarial examples are well-studied in deep learning, their impact on DRL-based intrusion detection remains underexplored, particularly in critical domains. This article conducts a thorough analysis of DRL-based intrusion detection’s vulnerability to adversarial examples. It systematically evaluates key hyperparameters such as DRL algorithms, neural network depth, and width, impacting agents’ robustness. The study extends to black-box attacks, demonstrating adversarial transferability across DRL algorithms. Findings emphasize neural network architecture’s critical role in DRL agent robustness, addressing underfitting and overfitting challenges. Practical implications include insights for optimizing DRL-based intrusion detection agents to enhance performance and resilience. Experiments encompass multiple DRL algorithms tested on three datasets: NSL-KDD, UNSW-NB15, and CICIoV2024, against gradient-based adversarial attacks, with publicly available implementation code.

包括深度强化学习(DRL)在内的机器学习技术通过适应新威胁来增强入侵检测系统。然而,DRL 对脆弱的深度神经网络的依赖导致其容易受到对抗性示例的影响--对抗性示例是为了逃避检测而设计的扰动。虽然对抗示例在深度学习中得到了充分研究,但它们对基于 DRL 的入侵检测的影响仍未得到充分探索,尤其是在关键领域。本文对基于 DRL 的入侵检测易受对抗示例影响的问题进行了深入分析。它系统地评估了影响代理鲁棒性的关键超参数,如 DRL 算法、神经网络深度和宽度。研究扩展到黑盒攻击,证明了对抗性在 DRL 算法中的可转移性。研究结果强调了神经网络架构在 DRL 代理鲁棒性中的关键作用,解决了欠拟合和过拟合难题。实际影响包括对优化基于 DRL 的入侵检测代理以提高性能和复原力的启示。实验包括在三个数据集上测试的多种 DRL 算法:NSL-KDD、UNSW-NB15 和 CICIoV2024,对抗基于梯度的对抗性攻击,并公开了实现代码。
{"title":"Adversarial robustness of deep reinforcement learning-based intrusion detection","authors":"Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens","doi":"10.1007/s10207-024-00903-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00903-2","url":null,"abstract":"<p>Machine learning techniques, including Deep Reinforcement Learning (DRL), enhance intrusion detection systems by adapting to new threats. However, DRL’s reliance on vulnerable deep neural networks leads to susceptibility to adversarial examples-perturbations designed to evade detection. While adversarial examples are well-studied in deep learning, their impact on DRL-based intrusion detection remains underexplored, particularly in critical domains. This article conducts a thorough analysis of DRL-based intrusion detection’s vulnerability to adversarial examples. It systematically evaluates key hyperparameters such as DRL algorithms, neural network depth, and width, impacting agents’ robustness. The study extends to black-box attacks, demonstrating adversarial transferability across DRL algorithms. Findings emphasize neural network architecture’s critical role in DRL agent robustness, addressing underfitting and overfitting challenges. Practical implications include insights for optimizing DRL-based intrusion detection agents to enhance performance and resilience. Experiments encompass multiple DRL algorithms tested on three datasets: NSL-KDD, UNSW-NB15, and CICIoV2024, against gradient-based adversarial attacks, with publicly available implementation code.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"19 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guiding the implementation of data privacy with microservices 用微服务指导数据隐私的实施
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1007/s10207-024-00907-y
Pedro Antunes, Nuno Guimarães

Privacy by design is nowadays recognized as essential in bringing data privacy into software systems. However, developers still face many challenges in reconciling privacy and software requirements and implementing privacy protections in software systems. One emerging trend is the adoption of microservices architectures—they bring in some qualities that can benefit privacy by design. The main goal of this study is to adapt privacy by design to the qualities brought by microservices. The main focus is at the architectural level, where the main structural decisions are made. A systematic literature review is adopted to identify a set of privacy models that underscore significant differences in software systems’ protection using microservices. From the literature review, a decision framework is developed. The decision framework provides guidance and supports design decisions in implementing data privacy using microservices. The framework helps select and integrate different privacy models. An illustration of using the framework, which considers the design of an electronic voting system, is provided. This study contributes to closing the gap between regulation and implementation through design, where decisions related to data privacy are integrated with decisions on architecting systems using microservices.

通过设计保护隐私已被公认为是将数据隐私带入软件系统的关键。然而,开发人员在协调隐私和软件需求以及在软件系统中实施隐私保护方面仍面临许多挑战。一个新兴趋势是微服务架构的采用--它们带来了一些有利于隐私设计的特质。本研究的主要目标是让隐私设计适应微服务带来的特质。研究的重点是架构层面,因为主要的结构决策都是在架构层面做出的。通过系统的文献综述,确定了一系列隐私模型,这些模型强调了使用微服务保护软件系统的显著差异。根据文献综述,制定了一个决策框架。该决策框架为使用微服务实施数据隐私保护的设计决策提供指导和支持。该框架有助于选择和整合不同的隐私模型。本研究以电子投票系统的设计为例,说明了如何使用该框架。本研究有助于通过设计缩小法规与实施之间的差距,在设计中,数据隐私相关决策与使用微服务构建系统的决策相结合。
{"title":"Guiding the implementation of data privacy with microservices","authors":"Pedro Antunes, Nuno Guimarães","doi":"10.1007/s10207-024-00907-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00907-y","url":null,"abstract":"<p>Privacy by design is nowadays recognized as essential in bringing data privacy into software systems. However, developers still face many challenges in reconciling privacy and software requirements and implementing privacy protections in software systems. One emerging trend is the adoption of microservices architectures—they bring in some qualities that can benefit privacy by design. The main goal of this study is to adapt privacy by design to the qualities brought by microservices. The main focus is at the architectural level, where the main structural decisions are made. A systematic literature review is adopted to identify a set of privacy models that underscore significant differences in software systems’ protection using microservices. From the literature review, a decision framework is developed. The decision framework provides guidance and supports design decisions in implementing data privacy using microservices. The framework helps select and integrate different privacy models. An illustration of using the framework, which considers the design of an electronic voting system, is provided. This study contributes to closing the gap between regulation and implementation through design, where decisions related to data privacy are integrated with decisions on architecting systems using microservices.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"15 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security 确保 5G 虚拟网络安全:对 SDN、NFV 和网络切片安全性的批判性分析
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1007/s10207-024-00900-5
Abdulrahman K. Alnaim

5G, the current generation of communication networks is based on the standards defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define virtual networks supported by three basic technologies, SDN, NFV, and Network Slicing. Virtual networks are primarily built using software and have clear advantages that appear to be reduced because of the corresponding loss in security due to the larger attack surface of this type of network. On the other hand, virtual networks can be made even more secure than hardware-based networks by leveraging the flexibility and adaptability of virtual functions and numerous articles have studied different aspects of their security. Current work goes from proposals for specific mechanisms to general studies of threats and defenses. Some of these are systematic literature reviews considering everything published on a specific theme. We prefer to analyze carefully selected papers considered significant and produce from them an overview of the status of the security of the network technologies used by 5G. After this analysis, we have found that although there are many studies of threats, they are not systematic and have confusions about concepts that may mislead implementers; we also found that the large variety of defenses can be confusing to designers. We have therefore conducted a critical analysis of threats and defenses to provide a clear perspective of how to secure these networks. Based on this perspective, we propose directions for research to improve or extend current defenses. We note that although virtual networks have special characteristics, they are examples of systems and much of the theory of systems security applies to them.

5G 是新一代通信网络,以 3GPP 和其他组织(ETSI、ENISA、NGMN)定义的标准为基础。这些标准定义了由三种基本技术(SDN、NFV 和网络切片)支持的虚拟网络。虚拟网络主要使用软件构建,具有明显的优势,但由于这类网络的攻击面较大,相应的安全性也会降低。另一方面,通过利用虚拟功能的灵活性和适应性,虚拟网络甚至可以比基于硬件的网络更加安全。目前的工作包括从具体机制建议到威胁和防御的一般性研究。其中一些是系统性的文献综述,考虑了就特定主题发表的所有文章。我们更倾向于分析精心挑选的重要文献,并从中总结出 5G 所用网络技术的安全现状。经过分析,我们发现虽然有很多关于威胁的研究,但它们并不系统,而且概念混淆,可能会误导实施者;我们还发现,防御措施种类繁多,可能会让设计者感到困惑。因此,我们对威胁和防御进行了批判性分析,为如何确保这些网络的安全提供了一个清晰的视角。基于这一观点,我们提出了改进或扩展现有防御措施的研究方向。我们注意到,虽然虚拟网络有其特殊性,但它们也是系统的例子,系统安全的许多理论也适用于它们。
{"title":"Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security","authors":"Abdulrahman K. Alnaim","doi":"10.1007/s10207-024-00900-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00900-5","url":null,"abstract":"<p>5G, the current generation of communication networks is based on the standards defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define virtual networks supported by three basic technologies, SDN, NFV, and Network Slicing. Virtual networks are primarily built using software and have clear advantages that appear to be reduced because of the corresponding loss in security due to the larger attack surface of this type of network. On the other hand, virtual networks can be made even more secure than hardware-based networks by leveraging the flexibility and adaptability of virtual functions and numerous articles have studied different aspects of their security. Current work goes from proposals for specific mechanisms to general studies of threats and defenses. Some of these are systematic literature reviews considering everything published on a specific theme. We prefer to analyze carefully selected papers considered significant and produce from them an overview of the status of the security of the network technologies used by 5G. After this analysis, we have found that although there are many studies of threats, they are not systematic and have confusions about concepts that may mislead implementers; we also found that the large variety of defenses can be confusing to designers. We have therefore conducted a critical analysis of threats and defenses to provide a clear perspective of how to secure these networks. Based on this perspective, we propose directions for research to improve or extend current defenses. We note that although virtual networks have special characteristics, they are examples of systems and much of the theory of systems security applies to them.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"7 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech 普通和私密健康物联网设备及应用程序的蓝牙安全分析:FemTech 案例
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1007/s10207-024-00883-3
Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini

The number of digital health products is increasing faster than ever. These technologies (e.g. mobile apps and connected devices) collect massive amounts of data about their users, including health, medical, sex life, and other intimate data. In this paper, we study a set of 21 Internet of Things (IoT) devices advertised for general and intimate health purposes of female bodies (aka female-oriented technologies or FemTech). We focus on the security of the Bluetooth connection and communications between the IoT device and the mobile app. Our results highlight serious security issues in the current off-the-shelf FemTech devices. These include unencrypted Bluetooth traffic, unknown Bluetooth services and insecure Bluetooth authentication when connecting to the app. We implement Bluetooth attacks on the communication between these devices and apps, resulting in malfunctioning of the device and app. We discuss our results and provide recommendations for different stakeholders to improve the security practices of Bluetooth-enabled IoT devices in such a sensitive and intimate domain.

数字健康产品的数量正以前所未有的速度增长。这些技术(如移动应用程序和联网设备)收集了用户的大量数据,包括健康、医疗、性生活和其他私密数据。在本文中,我们研究了一组 21 个物联网(IoT)设备,这些设备主要用于女性身体的一般和私密健康用途(又称女性导向技术或 FemTech)。我们重点关注物联网设备与移动应用程序之间的蓝牙连接和通信的安全性。我们的研究结果凸显了当前现成的 FemTech 设备存在的严重安全问题。这些问题包括未加密的蓝牙流量、未知的蓝牙服务以及连接到应用程序时不安全的蓝牙验证。我们对这些设备和应用程序之间的通信实施了蓝牙攻击,导致设备和应用程序出现故障。我们将讨论我们的研究结果,并为不同的利益相关者提供建议,以改进在如此敏感和私密的领域中启用蓝牙的物联网设备的安全实践。
{"title":"Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech","authors":"Stephen Cook, Maryam Mehrnezhad, Ehsan Toreini","doi":"10.1007/s10207-024-00883-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00883-3","url":null,"abstract":"<p>The number of digital health products is increasing faster than ever. These technologies (e.g. mobile apps and connected devices) collect massive amounts of data about their users, including health, medical, sex life, and other intimate data. In this paper, we study a set of 21 Internet of Things (IoT) devices advertised for general and intimate health purposes of female bodies (aka female-oriented technologies or FemTech). We focus on the security of the Bluetooth connection and communications between the IoT device and the mobile app. Our results highlight serious security issues in the current off-the-shelf FemTech devices. These include unencrypted Bluetooth traffic, unknown Bluetooth services and insecure Bluetooth authentication when connecting to the app. We implement Bluetooth attacks on the communication between these devices and apps, resulting in malfunctioning of the device and app. We discuss our results and provide recommendations for different stakeholders to improve the security practices of Bluetooth-enabled IoT devices in such a sensitive and intimate domain.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"6 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142207472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1