首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Adaptive context-aware access control for IoT environments leveraging fog computing 利用雾计算为物联网环境提供自适应情境感知访问控制
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10207-024-00866-4
Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, Eric Pardede, Ahmad Salehi Shahraki

The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in terms of communication overhead, high latency, and complete reliance. In this paper, we propose a Fog-Based Adaptive Context-Aware Access Control (FB-ACAAC) framework for IoT devices, dynamically adjusting access policies based on contextual information to prevent unauthorised resource access. The main purpose of FB-ACAAC is to provide adaptability to changing access behaviors and context by bringing decision-making and information about policies closer to the end nodes of the network. FB-ACAAC improves the availability of resources and reduces the amount of time for information to be processed. FB-ACAAC extends the widely used eXtensible Access Control Markup Language (XACML) to manage access control decisions. Traditional XACML-based methods do not take into account changing environments, different contexts, and changing access behaviors and are vulnerable to certain types of attacks. To address these issues, FB-ACAAC proposes an adaptive context-aware XACML scheme for heterogeneous distributed IoT environments using fog computing and is designed to be context-aware, adaptable, and secure in the face of unauthorised access. The effectiveness of this new scheme is verified through experiments, and it has a low processing time overhead while providing extra features and improved security.

物联网(IoT)的使用日益广泛,推动了对增强型稳健访问控制方法的需求,以保护资源免遭未经授权的访问。基于云的访问控制方法在通信开销、高延迟和完全依赖性方面带来了巨大挑战。在本文中,我们为物联网设备提出了一种基于雾的自适应上下文感知访问控制(FB-ACAAC)框架,可根据上下文信息动态调整访问策略,防止未经授权的资源访问。FB-ACAAC 的主要目的是通过使决策和政策信息更接近网络终端节点,提供对不断变化的访问行为和上下文的适应性。FB-ACAAC 提高了资源的可用性,减少了信息处理的时间。FB-ACAAC 扩展了广泛使用的可扩展访问控制标记语言(XACML),以管理访问控制决策。传统的基于 XACML 的方法没有考虑到不断变化的环境、不同的上下文和不断变化的访问行为,而且容易受到某些类型的攻击。为解决这些问题,FB-ACAAC 为使用雾计算的异构分布式物联网环境提出了一种自适应上下文感知 XACML 方案,该方案设计为上下文感知、自适应和安全,可应对未经授权的访问。通过实验验证了这种新方案的有效性,它的处理时间开销较低,同时还提供了额外的功能并提高了安全性。
{"title":"Adaptive context-aware access control for IoT environments leveraging fog computing","authors":"Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, Eric Pardede, Ahmad Salehi Shahraki","doi":"10.1007/s10207-024-00866-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00866-4","url":null,"abstract":"<p>The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in terms of communication overhead, high latency, and complete reliance. In this paper, we propose a Fog-Based Adaptive Context-Aware Access Control (FB-ACAAC) framework for IoT devices, dynamically adjusting access policies based on contextual information to prevent unauthorised resource access. The main purpose of FB-ACAAC is to provide adaptability to changing access behaviors and context by bringing decision-making and information about policies closer to the end nodes of the network. FB-ACAAC improves the availability of resources and reduces the amount of time for information to be processed. FB-ACAAC extends the widely used eXtensible Access Control Markup Language (XACML) to manage access control decisions. Traditional XACML-based methods do not take into account changing environments, different contexts, and changing access behaviors and are vulnerable to certain types of attacks. To address these issues, FB-ACAAC proposes an adaptive context-aware XACML scheme for heterogeneous distributed IoT environments using fog computing and is designed to be context-aware, adaptable, and secure in the face of unauthorised access. The effectiveness of this new scheme is verified through experiments, and it has a low processing time overhead while providing extra features and improved security.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"9 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141572063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust management in the internet of vehicles: a systematic literature review of blockchain integration 车联网中的信任管理:区块链集成的系统文献综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s10207-024-00878-0
Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani

The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and privacy concerns. Limited computational power, diverse network technologies, and many sensors and vehicles challenge data integrity and trust in data exchange. Existing solutions, often dependent on specific environments and protocols, struggle to address these issues across the entire IoV ecosystem. This paper explores the potential of blockchain technology to address these challenges. We argue that blockchain’s immutability and decentralization offer a unique solution for trust management in various IoV environments. We review existing blockchain-based algorithms and models proposed for IoV integration and propose a novel taxonomy to categorize these approaches. This taxonomy will help us analyze effective parameters, implementation methods, and evaluation metrics in the reviewed literature. According to our research, the most critical evaluation parameter for blockchain-based methods is time, including system-level service-related time parameters and solution implementation time, and 38% of existing papers simulated the approach using Hyperledger. Additionally, we will identify key challenges from integrating blockchain into the IoV landscape. By providing a comprehensive review and analysis of blockchain-based trust management solutions for IoV, this paper aims to contribute to the ongoing development of secure and reliable intelligent transportation systems.

车联网(IoV)有望彻底改变智能城市的交通状况,但其互联性引发了严重的安全和隐私问题。有限的计算能力、多样化的网络技术以及众多的传感器和车辆对数据交换中的数据完整性和信任度提出了挑战。现有的解决方案通常依赖于特定的环境和协议,难以在整个物联网生态系统中解决这些问题。本文探讨了区块链技术应对这些挑战的潜力。我们认为,区块链的不变性和去中心化为各种物联网环境中的信任管理提供了独特的解决方案。我们回顾了现有的基于区块链的物联网集成算法和模型,并提出了一种新的分类法来对这些方法进行分类。该分类法将帮助我们分析所查阅文献中的有效参数、实施方法和评估指标。根据我们的研究,基于区块链的方法最关键的评估参数是时间,包括系统级服务相关的时间参数和解决方案的实施时间,38%的现有论文模拟了使用超级账本的方法。此外,我们还将确定将区块链整合到物联网领域所面临的主要挑战。通过全面回顾和分析基于区块链的物联网信任管理解决方案,本文旨在为安全可靠的智能交通系统的持续发展做出贡献。
{"title":"Trust management in the internet of vehicles: a systematic literature review of blockchain integration","authors":"Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani","doi":"10.1007/s10207-024-00878-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00878-0","url":null,"abstract":"<p>The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and privacy concerns. Limited computational power, diverse network technologies, and many sensors and vehicles challenge data integrity and trust in data exchange. Existing solutions, often dependent on specific environments and protocols, struggle to address these issues across the entire IoV ecosystem. This paper explores the potential of blockchain technology to address these challenges. We argue that blockchain’s immutability and decentralization offer a unique solution for trust management in various IoV environments. We review existing blockchain-based algorithms and models proposed for IoV integration and propose a novel taxonomy to categorize these approaches. This taxonomy will help us analyze effective parameters, implementation methods, and evaluation metrics in the reviewed literature. According to our research, the most critical evaluation parameter for blockchain-based methods is time, including system-level service-related time parameters and solution implementation time, and 38% of existing papers simulated the approach using Hyperledger. Additionally, we will identify key challenges from integrating blockchain into the IoV landscape. By providing a comprehensive review and analysis of blockchain-based trust management solutions for IoV, this paper aims to contribute to the ongoing development of secure and reliable intelligent transportation systems.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"9 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expediting the design and development of secure cloud-based mobile apps 加快设计和开发基于云的安全移动应用程序
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1007/s10207-024-00880-6
Francisco T. Chimuco, Joāo B. F. Sequeiros, Tiago M. C. Simōes, Mário M. Freire, Pedro R. M. Inácio

The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications that can aid solving different problems and provide access to services in a wide range of domains or categories, namely healthcare, education, e-commerce or entertainment. While these applications use and benefit from the combination of a wide panoply of technologies from the Internet of Things, fog and cloud computing, data security and privacy are typically not fully taken into account before the creation of many mobile applications or during the software development phases. This paper presents an in-depth approach to modeling attacks on the specific cloud and mobile ecosystem, given its importance in the process of secure application development. Moreover, aiming at bridging the knowledge gap between developers and security experts, this paper presents an alpha version of the security by design for cloud and mobile ecosystem (secD4CloudMobile) framework. secD4CloudMobile is a set of tools that covers cloud and mobile security requirement elicitation (CMSRE), cloud and mobile security best practices guidelines (CMSBPG), cloud mobile attack modeling elicitation (CMAME), and cloud mobile security test specification and tools (CM2ST). The purpose of the framework is to provide cloud and mobile application developers useful readily applicable information and guidelines, striving to bring security engineering and software engineering closer, in a more accessible and automated manner, aiming at the incorporation of security by construction. Finally, the paper presents some preliminary results and discussion.

终端用户采用和普及移动设备的部分原因是移动应用程序的开发和可用性不断提高,这些应用程序可以帮助解决不同的问题,并提供对医疗保健、教育、电子商务或娱乐等广泛领域或类别服务的访问。虽然这些应用使用了物联网、雾技术和云计算等多种技术,并从中受益,但在创建许多移动应用之前或软件开发阶段,数据安全和隐私通常没有得到充分考虑。鉴于特定云计算和移动生态系统在安全应用程序开发过程中的重要性,本文提出了一种深入的方法来模拟针对特定云计算和移动生态系统的攻击。此外,为了缩小开发人员与安全专家之间的知识差距,本文介绍了云和移动生态系统安全设计(secD4CloudMobile)框架的alpha版本。secD4CloudMobile是一套工具,涵盖云和移动安全需求征询(CMSRE)、云和移动安全最佳实践指南(CMSBPG)、云移动攻击建模征询(CMAME)以及云移动安全测试规范和工具(CM2ST)。该框架的目的是为云和移动应用开发人员提供有用的、随时可用的信息和指南,努力以更易用和自动化的方式拉近安全工程和软件工程的距离,旨在通过构建实现安全。最后,本文介绍了一些初步结果和讨论。
{"title":"Expediting the design and development of secure cloud-based mobile apps","authors":"Francisco T. Chimuco, Joāo B. F. Sequeiros, Tiago M. C. Simōes, Mário M. Freire, Pedro R. M. Inácio","doi":"10.1007/s10207-024-00880-6","DOIUrl":"https://doi.org/10.1007/s10207-024-00880-6","url":null,"abstract":"<p>The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications that can aid solving different problems and provide access to services in a wide range of domains or categories, namely healthcare, education, e-commerce or entertainment. While these applications use and benefit from the combination of a wide panoply of technologies from the Internet of Things, fog and cloud computing, data security and privacy are typically not fully taken into account before the creation of many mobile applications or during the software development phases. This paper presents an in-depth approach to modeling attacks on the specific <i>cloud and mobile ecosystem</i>, given its importance in the process of secure application development. Moreover, aiming at bridging the knowledge gap between developers and security experts, this paper presents an alpha version of the security by design for cloud and mobile ecosystem (<span>secD4CloudMobile</span>) framework. <span>secD4CloudMobile</span> is a set of tools that covers <i>cloud and mobile security requirement elicitation</i> (CMSRE), <i>cloud and mobile security best practices guidelines</i> (CMSBPG), <i>cloud mobile attack modeling elicitation</i> (CMAME), and <i>cloud mobile security test specification and tools</i> (CM2ST). The purpose of the framework is to provide cloud and mobile application developers useful readily applicable information and guidelines, striving to bring security engineering and software engineering closer, in a more accessible and automated manner, aiming at the incorporation of security by construction. Finally, the paper presents some preliminary results and discussion.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"23 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-party codebook distribution strategy based on secret sharing 基于秘密共享的多方密码本分配策略
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1007/s10207-024-00873-5
Wei She, Haige Feng, Zhao Tian, Xinpeng Rong, Tianxiang Ma, Wei Liu

The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert communication. We propose a codebook distribution technique based on secret sharing. Secret sharing is a method of dividing and storing secrets that can withstand certain levels of external intrusion and internal deception. In this technique, the sender encrypts the codebook using a private key and uploads it to the IPNS. Each recipient can then obtain the public key for downloading the codebook through a mechanism based on password-protected secret sharing. Based on experimental results and security analysis, the scheme exhibits high time efficiency and stable memory usage. Furthermore, it can withstand various attacks, ensuring the security of codebook transmission.

本文探讨了信息安全领域,尤其是隐蔽通信领域的密码本安全分发问题。我们提出了一种基于秘密共享的密码本分发技术。秘密共享是一种划分和存储秘密的方法,可以抵御一定程度的外部入侵和内部欺骗。在这种技术中,发送方使用私钥加密密码本,并将其上传到 IPNS。然后,每个接收者都可以通过一种基于密码保护的秘密共享机制获得用于下载密码本的公钥。根据实验结果和安全性分析,该方案具有较高的时间效率和稳定的内存使用率。此外,它还能抵御各种攻击,确保密码本传输的安全性。
{"title":"Multi-party codebook distribution strategy based on secret sharing","authors":"Wei She, Haige Feng, Zhao Tian, Xinpeng Rong, Tianxiang Ma, Wei Liu","doi":"10.1007/s10207-024-00873-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00873-5","url":null,"abstract":"<p>The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert communication. We propose a codebook distribution technique based on secret sharing. Secret sharing is a method of dividing and storing secrets that can withstand certain levels of external intrusion and internal deception. In this technique, the sender encrypts the codebook using a private key and uploads it to the IPNS. Each recipient can then obtain the public key for downloading the codebook through a mechanism based on password-protected secret sharing. Based on experimental results and security analysis, the scheme exhibits high time efficiency and stable memory usage. Furthermore, it can withstand various attacks, ensuring the security of codebook transmission.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"185 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaming the system: tetromino-based covert channel and its impact on mobile security 博弈系统:基于四色棋的隐蔽通道及其对移动安全的影响
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1007/s10207-024-00875-3
Efstratios Vasilellis, Vasileios Botsos, Argiro Anagnostopoulou, Dimitris Gritzalis

Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection approaches focus on identifying payloads upon execution or intercepting malicious downloads from compromised sources. Despite efforts to harden network defenses against such droppers, malicious threat actors keep exploring unconventional infiltration approaches. This study expands on covert channel attacks, proposing the use of gaming platforms, like the classic Tetris arcade game, as a novel vector for malicious payload delivery. Our methodology diverges from conventional network-based attacks by embedding malicious payloads within the game’s Tetromino pieces. Through a custom-made application that masquerades as a benign Tetris variant, we deliver and execute malicious payloads on target devices within 3 to 7 min. This is achieved by combining the Shikata-Ga-Nai polymorphic encoder, an autosuggestion algorithm, and mapping Tetromino blocks to a Meterpreter payload to innovatively deliver malicious payloads via gameplay suggestions. Our work provides a novel covert channel attack which merges gamification with malicious payload delivery. To the best of our knowledge, this is the first study that introduces gamification and autosuggestion mechanisms for payload delivery. We present an in-depth analysis of the proposed attack, along with a number of countermeasures to mitigate such threats, emphasizing the importance of enhanced user awareness and human oversight during dynamic malware analysis.

木马程序一直是具有挑战性的恶意软件威胁,尤其是在安卓生态系统中。传统的恶意软件检测方法侧重于在执行时识别有效载荷或拦截来自受攻击源的恶意下载。尽管人们在努力加强网络防御以抵御此类下载程序,但恶意威胁行为者仍在不断探索非常规的渗透方法。本研究扩展了隐蔽渠道攻击,提出利用游戏平台(如经典的俄罗斯方块街机游戏)作为恶意有效载荷传输的新载体。我们的方法不同于传统的网络攻击,而是在游戏的俄罗斯方块中嵌入恶意有效载荷。通过一个伪装成良性俄罗斯方块变体的定制应用程序,我们可以在 3 到 7 分钟内在目标设备上传输和执行恶意有效载荷。我们将 Shikata-Ga-Nai 多态编码器、自动建议算法和俄罗斯方块映射到 Meterpreter 有效载荷相结合,通过游戏建议创新性地发送恶意有效载荷。我们的工作提供了一种新颖的隐蔽信道攻击,它将游戏化与恶意有效载荷传输融为一体。据我们所知,这是首次将游戏化和自动建议机制引入有效载荷传输的研究。我们对所提出的攻击进行了深入分析,并提出了一系列缓解此类威胁的对策,强调了在动态恶意软件分析过程中增强用户意识和人工监督的重要性。
{"title":"Gaming the system: tetromino-based covert channel and its impact on mobile security","authors":"Efstratios Vasilellis, Vasileios Botsos, Argiro Anagnostopoulou, Dimitris Gritzalis","doi":"10.1007/s10207-024-00875-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00875-3","url":null,"abstract":"<p>Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection approaches focus on identifying payloads upon execution or intercepting malicious downloads from compromised sources. Despite efforts to harden network defenses against such droppers, malicious threat actors keep exploring unconventional infiltration approaches. This study expands on covert channel attacks, proposing the use of gaming platforms, like the classic Tetris arcade game, as a novel vector for malicious payload delivery. Our methodology diverges from conventional network-based attacks by embedding malicious payloads within the game’s Tetromino pieces. Through a custom-made application that masquerades as a benign Tetris variant, we deliver and execute malicious payloads on target devices within 3 to 7 min. This is achieved by combining the Shikata-Ga-Nai polymorphic encoder, an autosuggestion algorithm, and mapping Tetromino blocks to a Meterpreter payload to innovatively deliver malicious payloads via gameplay suggestions. Our work provides a novel covert channel attack which merges gamification with malicious payload delivery. To the best of our knowledge, this is the first study that introduces gamification and autosuggestion mechanisms for payload delivery. We present an in-depth analysis of the proposed attack, along with a number of countermeasures to mitigate such threats, emphasizing the importance of enhanced user awareness and human oversight during dynamic malware analysis.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"73 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acnn: arbitrary trace attacks based on leakage area detection Acnn:基于泄漏区域检测的任意轨迹攻击
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1007/s10207-024-00874-4
Chong Xiao, Ming Tang

Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA primarily rely on publicly available datasets, which typically consist of well-organized and well-aligned training and attack sets. However, this disregards the challenges faced in real-world attacks, where the attack traces are not well-aligned with the training traces as attackers have different levels of control over profiling and attack devices. A network that is capable of identifying areas of leakage and subsequently predicting the leaked values can bypass such difficulty. Therefore, we proposed Arbitrary Trace Attacks, which are placed under the flexible scenario that provides training traces and attack traces with arbitrary sizes. To implement such attacks, we present the Arbitrary Convolutional Neural Network (ACNN), which scans the input trace of arbitrary sizes for leakage area identification and leakage value prediction using a sliding window. Experimental evaluation is conducted on two datasets DPAv4.2 and ASCAD to verify the effectiveness of our approach on unprotected and masked implementation respectively. As a result, the target leakage areas are detected with a significant frequency and the key recovery performance is on par with state-of-the-art. Moreover, the trained model shows the potential for detecting leakage in a general context, that is, detecting leakage of key bytes other than the target one.

基于深度学习的侧信道分析(DL-SCA)已成为侧信道分析领域的一种强大方法。目前有关 DL-SCA 的研究主要依赖于公开可用的数据集,这些数据集通常由组织良好、排列整齐的训练集和攻击集组成。然而,这忽略了真实世界攻击中所面临的挑战,在真实世界中,由于攻击者对剖析和攻击设备的控制程度不同,攻击轨迹与训练轨迹并不完全一致。能够识别泄漏区域并随后预测泄漏值的网络可以绕过这些困难。因此,我们提出了 "任意轨迹攻击"(Arbitrary Trace Attacks),将其置于灵活的场景下,提供任意大小的训练轨迹和攻击轨迹。为了实现这种攻击,我们提出了任意卷积神经网络(ACNN),它可以扫描任意大小的输入轨迹,使用滑动窗口进行泄漏区域识别和泄漏值预测。我们在两个数据集 DPAv4.2 和 ASCAD 上进行了实验评估,分别验证了我们的方法对无保护和屏蔽实施的有效性。结果显示,目标泄漏区域被检测到的频率很高,密钥恢复性能与最先进的方法相当。此外,训练有素的模型还显示了在一般情况下检测泄漏的潜力,即检测目标字节以外的密钥字节的泄漏。
{"title":"Acnn: arbitrary trace attacks based on leakage area detection","authors":"Chong Xiao, Ming Tang","doi":"10.1007/s10207-024-00874-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00874-4","url":null,"abstract":"<p>Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA primarily rely on publicly available datasets, which typically consist of well-organized and well-aligned training and attack sets. However, this disregards the challenges faced in real-world attacks, where the attack traces are not well-aligned with the training traces as attackers have different levels of control over profiling and attack devices. A network that is capable of identifying areas of leakage and subsequently predicting the leaked values can bypass such difficulty. Therefore, we proposed Arbitrary Trace Attacks, which are placed under the flexible scenario that provides training traces and attack traces with arbitrary sizes. To implement such attacks, we present the Arbitrary Convolutional Neural Network (ACNN), which scans the input trace of arbitrary sizes for leakage area identification and leakage value prediction using a sliding window. Experimental evaluation is conducted on two datasets DPAv4.2 and ASCAD to verify the effectiveness of our approach on unprotected and masked implementation respectively. As a result, the target leakage areas are detected with a significant frequency and the key recovery performance is on par with state-of-the-art. Moreover, the trained model shows the potential for detecting leakage in a general context, that is, detecting leakage of key bytes other than the target one.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"47 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm-intelligence for the modern ICT ecosystems 现代信息和通信技术生态系统的蜂群智能
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1007/s10207-024-00869-1
George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer

Digitalization is continuing facilitating our daily lives. The world is interconnected as never before, bringing close people, businesses, or other organizations. However, hackers are also coming close. New business and operational models require the collection and processing of massive amounts of data in real-time, involving utilization of complex information systems, large supply-chains, personal devices, etc. These impose several advantages for adversaries on the one hand (e.g., poorly protected or monitored elements, slow fashion of security updates/upgrades in components that gain little attention, etc.), and many difficulties for defenders on the other hand (e.g., administrate large and complex systems with high dynamicity) in this cyber-security interplay. Impactful attacks on ICT systems, critical infrastructures, and supply networks, as well as cyber-warfare are deriving the necessity for more effective defensives. This paper presents a swarm-intelligence solution for incident handling and response. Cyber Threat Intelligence (CTI) is continuously integrated in the system (i.e., MISP, CVEs, STIX, etc.), and Artificial Intelligence (AI)/Machine Learning (ML) are incorporated in the risk assessment and event evaluation processes. Several incident handling and response sub-procedures are automated, improving effectiveness and decreasing response time. Information concerning identified malicious activity is circulated back to the community (i.e., via the MISP information sharing platform) in an open loop. The proposal is applied in the supply-chain of healthcare organizations in Europe (considering also EU data protection regulations). Nevertheless, it is a generic solution that can be applied in any domain.

数字化正在不断促进我们的日常生活。世界前所未有地相互连接,使人们、企业或其他组织紧密相连。然而,黑客也在靠近。新的业务和运营模式要求实时收集和处理海量数据,涉及利用复杂的信息系统、大型供应链、个人设备等。在这一网络安全相互作用的过程中,一方面,对手可以利用这些优势(例如,保护或监控薄弱的元件、安全更新/升级缓慢且很少受到关注的元件等),另一方面,防御者也会面临许多困难(例如,管理具有高度动态性的大型复杂系统)。对信息和通信技术系统、关键基础设施和供应网络的严重攻击以及网络战争,都要求采取更有效的防御措施。本文介绍了一种用于事件处理和响应的蜂群智能解决方案。网络威胁情报(CTI)被持续集成到系统中(如 MISP、CVE、STIX 等),人工智能(AI)/机器学习(ML)被集成到风险评估和事件评价流程中。若干事件处理和响应子程序已实现自动化,从而提高了效率并缩短了响应时间。有关已识别恶意活动的信息以开放式循环的方式(即通过 MISP 信息共享平台)反馈给社区。该建议适用于欧洲医疗机构的供应链(同时考虑到欧盟数据保护法规)。不过,这是一个通用解决方案,可应用于任何领域。
{"title":"Swarm-intelligence for the modern ICT ecosystems","authors":"George Hatzivasilis, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Spyros Papastergiou, Stylianos Karagiannis, Andreas Alexopoulos, Dimitry Amelin, Stephan Kiefer","doi":"10.1007/s10207-024-00869-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00869-1","url":null,"abstract":"<p>Digitalization is continuing facilitating our daily lives. The world is interconnected as never before, bringing close people, businesses, or other organizations. However, hackers are also coming close. New business and operational models require the collection and processing of massive amounts of data in real-time, involving utilization of complex information systems, large supply-chains, personal devices, etc. These impose several advantages for adversaries on the one hand (e.g., poorly protected or monitored elements, slow fashion of security updates/upgrades in components that gain little attention, etc.), and many difficulties for defenders on the other hand (e.g., administrate large and complex systems with high dynamicity) in this cyber-security interplay. Impactful attacks on ICT systems, critical infrastructures, and supply networks, as well as cyber-warfare are deriving the necessity for more effective defensives. This paper presents a swarm-intelligence solution for incident handling and response. Cyber Threat Intelligence (CTI) is continuously integrated in the system (i.e., MISP, CVEs, STIX, etc.), and Artificial Intelligence (AI)/Machine Learning (ML) are incorporated in the risk assessment and event evaluation processes. Several incident handling and response sub-procedures are automated, improving effectiveness and decreasing response time. Information concerning identified malicious activity is circulated back to the community (i.e., via the MISP information sharing platform) in an open loop. The proposal is applied in the supply-chain of healthcare organizations in Europe (considering also EU data protection regulations). Nevertheless, it is a generic solution that can be applied in any domain.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"24 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic C-V2X anonymous authentication and group key agreement protocol 动态 C-V2X 匿名认证和群组密钥协议协议
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1007/s10207-024-00876-2
Beibei Cui, Wei He, Yan Cui

At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named V2X-GKA (Dynamic Group Authentication and Key Agreement Protocol based on C-V2X). V2X-GKA utilizes cryptographic techniques such as ECDLP and DBDH to effectively mitigate risks associated with certificate forgery and key theft. Through the integration of authentication and group key agreement mechanisms, the protocol facilitates dynamic member management and secure key updates without necessitating complete protocol re-execution. This approach not only ensures both forward and backward security but also optimizes algorithmic processes, rendering it highly suitable for real-time, high-speed mobile environments. Through necessary security analysis, it is confirmed that the V2X-GKA scheme in this paper meets the existing security objectives. Compared with other similar schemes, it exhibits a certain degree of completeness and superiority, particularly in open-channel scenarios.

目前,为应对 5G 时代车载 Ad-Hoc 网络(VANET)的安全挑战,本文设计了一种新协议,名为 V2X-GKA(基于 C-V2X 的动态群组认证和密钥协议)。V2X-GKA 利用 ECDLP 和 DBDH 等加密技术有效降低了与证书伪造和密钥盗窃相关的风险。通过整合认证和群组密钥协议机制,该协议有利于动态成员管理和安全密钥更新,而无需重新执行完整的协议。这种方法不仅能确保前向和后向安全性,还能优化算法流程,因此非常适合实时、高速移动环境。通过必要的安全分析,可以确认本文中的 V2X-GKA 方案符合现有的安全目标。与其他类似方案相比,它表现出一定程度的完整性和优越性,尤其是在开放信道场景中。
{"title":"A dynamic C-V2X anonymous authentication and group key agreement protocol","authors":"Beibei Cui, Wei He, Yan Cui","doi":"10.1007/s10207-024-00876-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00876-2","url":null,"abstract":"<p>At present, in addressing security challenges within 5 G-era Vehicular Ad-Hoc Networks (VANET), a new protocol has been designed in this paper, named V2X-GKA (Dynamic Group Authentication and Key Agreement Protocol based on C-V2X). V2X-GKA utilizes cryptographic techniques such as ECDLP and DBDH to effectively mitigate risks associated with certificate forgery and key theft. Through the integration of authentication and group key agreement mechanisms, the protocol facilitates dynamic member management and secure key updates without necessitating complete protocol re-execution. This approach not only ensures both forward and backward security but also optimizes algorithmic processes, rendering it highly suitable for real-time, high-speed mobile environments. Through necessary security analysis, it is confirmed that the V2X-GKA scheme in this paper meets the existing security objectives. Compared with other similar schemes, it exhibits a certain degree of completeness and superiority, particularly in open-channel scenarios.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"47 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141530294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications 关于利用人工智能进行开源情报(OSINT)应用研究的系统性综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1007/s10207-024-00868-2
Thomas Oakley Browne, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury

This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently, there is a lack of compilation of these approaches in the research domain and similar systematic reviews do not include research that post dates the year 2019. This systematic review attempts to fill this gap by identifying recent research. The review used the preferred reporting items for systematic reviews and meta-analyses and identified 163 research articles focusing on OSINT applications leveraging AI algorithms. This systematic review outlines several research questions concerning meta-analysis of the included research and seeks to identify research limitations and future directions in this area. The review identifies that research gaps exist in the following areas: Incorporation of pre-existing OSINT tools with AI, the creation of AI-based OSINT models that apply to penetration testing, underutilisation of alternate data sources and the incorporation of dissemination functionality. The review additionally identifies future research directions in AI-based OSINT research in the following areas: Multi-lingual support, incorporation of additional data sources, improved model robustness against data poisoning, integration with live applications, real-world use, the addition of alert generation for dissemination purposes and incorporation of algorithms for use in planning.

本文介绍了一项系统性综述,旨在确定将人工智能(AI)算法与开源情报(OSINT)应用和实践相结合的研究。目前,研究领域缺乏对这些方法的汇编,类似的系统综述也不包括2019年以后的研究。本系统综述试图通过确定最新研究来填补这一空白。该综述使用了系统综述和荟萃分析的首选报告项目,并确定了 163 篇研究文章,重点关注利用人工智能算法的 OSINT 应用。本系统综述概述了有关对所纳入研究进行荟萃分析的几个研究问题,并试图确定该领域的研究局限性和未来方向。综述发现以下领域存在研究空白:将已有的 OSINT 工具与人工智能相结合、创建适用于渗透测试的基于人工智能的 OSINT 模型、未充分利用替代数据源以及整合传播功能。此外,审查还确定了基于人工智能的 OSINT 研究在以下领域的未来研究方向:多语言支持、纳入更多数据源、提高模型对数据中毒的稳健性、与实时应用集成、实际应用、为传播目的添加警报生成功能以及纳入用于规划的算法。
{"title":"A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications","authors":"Thomas Oakley Browne, Mohammad Abedin, Mohammad Jabed Morshed Chowdhury","doi":"10.1007/s10207-024-00868-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00868-2","url":null,"abstract":"<p>This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently, there is a lack of compilation of these approaches in the research domain and similar systematic reviews do not include research that post dates the year 2019. This systematic review attempts to fill this gap by identifying recent research. The review used the preferred reporting items for systematic reviews and meta-analyses and identified 163 research articles focusing on OSINT applications leveraging AI algorithms. This systematic review outlines several research questions concerning meta-analysis of the included research and seeks to identify research limitations and future directions in this area. The review identifies that research gaps exist in the following areas: Incorporation of pre-existing OSINT tools with AI, the creation of AI-based OSINT models that apply to penetration testing, underutilisation of alternate data sources and the incorporation of dissemination functionality. The review additionally identifies future research directions in AI-based OSINT research in the following areas: Multi-lingual support, incorporation of additional data sources, improved model robustness against data poisoning, integration with live applications, real-world use, the addition of alert generation for dissemination purposes and incorporation of algorithms for use in planning.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"71 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141257688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compliance-based ranking of certificate authorities using probabilistic approaches 使用概率方法对证书颁发机构进行基于合规性的排名
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-29 DOI: 10.1007/s10207-024-00867-3
Kashif Junaid, Muhammad Umar Janjua, Junaid Qadir

The security of the global Certification Authority (CA) system has recently been compromised as a result of attacks on the Public Key Infrastructure (PKI). Although the CA/Browser (CA/B) Forum publishes compliance requirements for CAs, there are no guarantees that even a commercially successful CA is complying with these recommendations. In this paper, we propose the first systematic CA ranking mechanism that ranks CAs in terms of their adherence to the CA/B Forum and X.509 certificate standards. Unfortunately, there is no consolidated and widely accepted parameter to rank the CAs so we have proposed formula-based rating models and introduced different ranking techniques like Direct, Bayesian, and MarkovChain Ranking. These rankings are applied to a comprehensive dataset of X.509 trust chains gathered during the time period of 2020 to 2023. Our proposed ranking scheme can serve as a criterion for both consumers and enterprises for selecting and prioritizing CAs based on performance as well as adherence to the certificate standards.

由于公钥基础设施(PKI)受到攻击,全球认证机构(CA)系统的安全性最近受到了威胁。尽管 CA/B 浏览器(CA/B)论坛公布了对 CA 的合规要求,但即使是商业上成功的 CA 也不能保证一定遵守了这些建议。在本文中,我们提出了第一个系统的 CA 排名机制,根据 CA/B 论坛和 X.509 证书标准的遵守情况对 CA 进行排名。遗憾的是,目前还没有一个综合的、被广泛接受的参数来对 CA 进行排名,因此我们提出了基于公式的评级模型,并引入了不同的排名技术,如直接排名、贝叶斯排名和 MarkovChain 排名。这些排名适用于 2020 年至 2023 年期间收集的 X.509 信任链综合数据集。我们提出的排名方案可作为消费者和企业根据性能和证书标准的遵守情况选择和优先考虑 CA 的标准。
{"title":"A compliance-based ranking of certificate authorities using probabilistic approaches","authors":"Kashif Junaid, Muhammad Umar Janjua, Junaid Qadir","doi":"10.1007/s10207-024-00867-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00867-3","url":null,"abstract":"<p>The security of the global Certification Authority (CA) system has recently been compromised as a result of attacks on the Public Key Infrastructure (PKI). Although the CA/Browser (CA/B) Forum publishes compliance requirements for CAs, there are no guarantees that even a commercially successful CA is complying with these recommendations. In this paper, we propose the first systematic CA ranking mechanism that ranks CAs in terms of their adherence to the CA/B Forum and X.509 certificate standards. Unfortunately, there is no consolidated and widely accepted parameter to rank the CAs so we have proposed formula-based rating models and introduced different ranking techniques like Direct, Bayesian, and MarkovChain Ranking. These rankings are applied to a comprehensive dataset of X.509 trust chains gathered during the time period of 2020 to 2023. Our proposed ranking scheme can serve as a criterion for both consumers and enterprises for selecting and prioritizing CAs based on performance as well as adherence to the certificate standards. </p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"243 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141173285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1