首页 > 最新文献

IET Information Security最新文献

英文 中文
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security 前向和后向安全加密数据的动态模式匹配
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-10 DOI: 10.1049/ise2/5523834
Xiaolu Chu, Ke Cheng, Anxiao Song, Jiaxuan Fu

Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of analyzed data and analyzed patterns can significantly complicate the process. Due to the privacy security issues of data and patterns, researchers begin to explore pattern matching on encrypted data. However, existing solutions are typically built on static pattern matching methods, lacking dynamism, namely, the inability to perform addition or deletion operations on the analyzed data. This lack of flexibility might hinder the adaptability and effectiveness of pattern matching on encrypted data in the real-world scenarios. In this paper, we design a dynamic pattern matching scheme on encrypted data with forward and backward security, which introduces much-needed dynamism. Our scheme is able to implement the addition operation and the deletion operation on the encrypted data without affecting the security of the original pattern matching scheme. Specifically, we design secure addition and deletion algorithms based on fragmentation data structures, which are compatible with the static pattern matching scheme. Moreover, we make significant improvements to the key generation algorithm, the encryption algorithm, and the match algorithm of the static scheme to ensure forward and backward security. Theoretical analysis proves that our scheme satisfies forward and backward security while ensuring the nonfalsifiability of encrypted data. The experimental results show that our scheme has a slight increase in time cost compared to the static pattern matching scheme, demonstrating its practicality and effectiveness in dynamic scenarios.

模式匹配在基因组数据查询分析、网络入侵检测、深度包检测(DPI)等领域有着广泛的应用。对明文数据执行模式匹配很简单,但是需要保护已分析数据和已分析模式的安全性,这可能会使过程变得非常复杂。由于数据和模式的隐私安全问题,研究人员开始探索加密数据上的模式匹配。然而,现有的解决方案通常是基于静态模式匹配方法构建的,缺乏动态性,即无法对分析的数据执行添加或删除操作。这种灵活性的缺乏可能会妨碍在实际场景中对加密数据进行模式匹配的适应性和有效性。本文设计了一种具有前向和后向安全性的加密数据动态模式匹配方案,引入了加密数据的动态特性。我们的方案能够在不影响原模式匹配方案安全性的前提下,对加密数据进行添加操作和删除操作。具体来说,我们基于碎片数据结构设计了与静态模式匹配方案兼容的安全增删算法。此外,我们还对静态方案的密钥生成算法、加密算法和匹配算法进行了重大改进,以保证向前和向后的安全性。理论分析证明,该方案在保证加密数据不可证伪性的同时满足正向和后向安全性。实验结果表明,与静态模式匹配方案相比,该方案的时间成本略有增加,证明了其在动态场景下的实用性和有效性。
{"title":"Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security","authors":"Xiaolu Chu,&nbsp;Ke Cheng,&nbsp;Anxiao Song,&nbsp;Jiaxuan Fu","doi":"10.1049/ise2/5523834","DOIUrl":"10.1049/ise2/5523834","url":null,"abstract":"<p>Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of analyzed data and analyzed patterns can significantly complicate the process. Due to the privacy security issues of data and patterns, researchers begin to explore pattern matching on encrypted data. However, existing solutions are typically built on static pattern matching methods, lacking dynamism, namely, the inability to perform addition or deletion operations on the analyzed data. This lack of flexibility might hinder the adaptability and effectiveness of pattern matching on encrypted data in the real-world scenarios. In this paper, we design a dynamic pattern matching scheme on encrypted data with forward and backward security, which introduces much-needed dynamism. Our scheme is able to implement the addition operation and the deletion operation on the encrypted data without affecting the security of the original pattern matching scheme. Specifically, we design secure addition and deletion algorithms based on fragmentation data structures, which are compatible with the static pattern matching scheme. Moreover, we make significant improvements to the key generation algorithm, the encryption algorithm, and the match algorithm of the static scheme to ensure forward and backward security. Theoretical analysis proves that our scheme satisfies forward and backward security while ensuring the nonfalsifiability of encrypted data. The experimental results show that our scheme has a slight increase in time cost compared to the static pattern matching scheme, demonstrating its practicality and effectiveness in dynamic scenarios.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5523834","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143594923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BF-ACS—Intelligent and Immutable Face Recognition Access Control System 智能不可变人脸识别门禁系统
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-03 DOI: 10.1049/ise2/6755170
Wen-Bin Hsieh

Biometric authentication is adopted in many access control scenarios in recent years. It is very convenient and secure since it compares the user’s own biometrics with those stored in the database to confirm their identification. Since then, with the vigorous development of machine learning, the performance and accuracy of biometric authentication have been greatly improved. Face recognition technology combined with convolutional neural network (CNN) is extremely efficient and has become the mainstream of access control systems (ACSs). However, identity information and access logs stored in traditional databases can be tampered by malicious insiders. Therefore, we propose a face recognition ACS that is resistant to data forgery. In this paper, a deep convolutional network is utilized to learn Euclidean embedding (based on FaceNet) of each image and achieve face recognition and verification. Quorum, which is built on the Ethereum blockchain, is used to store facial feature vectors and login information. Smart contracts are made to automatically put data into blocks on the chain. One is used to store feature vectors, and the other to record the arrival and departure times of employees. By combining these cutting-edge technologies, an intelligent and immutable ACS that can withstand distributed denial-of-service (DDoS) and other internal and external attacks is created. Finally, an experiment is conducted to assess the effectiveness of the proposed system to demonstrate its practicality.

近年来,许多门禁场景都采用了生物特征认证。它将用户自己的生物特征与存储在数据库中的生物特征进行比较,以确认用户的身份,因此非常方便和安全。此后,随着机器学习的蓬勃发展,生物特征认证的性能和准确性得到了极大的提高。结合卷积神经网络(CNN)的人脸识别技术效率极高,已成为门禁系统的主流。然而,存储在传统数据库中的身份信息和访问日志可能被恶意的内部人员篡改。因此,我们提出了一种抗数据伪造的人脸识别ACS。本文利用深度卷积网络学习每个图像的欧几里得嵌入(基于FaceNet),实现人脸识别与验证。Quorum建立在以太坊区块链上,用于存储面部特征向量和登录信息。智能合约是为了自动将数据放入链上的块中。一个用于存储特征向量,另一个用于记录员工的到达和离开时间。通过结合这些尖端技术,可以创建一个智能且不可变的ACS,可以抵御分布式拒绝服务(DDoS)和其他内部和外部攻击。最后,通过实验验证了系统的有效性,验证了系统的实用性。
{"title":"BF-ACS—Intelligent and Immutable Face Recognition Access Control System","authors":"Wen-Bin Hsieh","doi":"10.1049/ise2/6755170","DOIUrl":"10.1049/ise2/6755170","url":null,"abstract":"<p>Biometric authentication is adopted in many access control scenarios in recent years. It is very convenient and secure since it compares the user’s own biometrics with those stored in the database to confirm their identification. Since then, with the vigorous development of machine learning, the performance and accuracy of biometric authentication have been greatly improved. Face recognition technology combined with convolutional neural network (CNN) is extremely efficient and has become the mainstream of access control systems (ACSs). However, identity information and access logs stored in traditional databases can be tampered by malicious insiders. Therefore, we propose a face recognition ACS that is resistant to data forgery. In this paper, a deep convolutional network is utilized to learn Euclidean embedding (based on FaceNet) of each image and achieve face recognition and verification. Quorum, which is built on the Ethereum blockchain, is used to store facial feature vectors and login information. Smart contracts are made to automatically put data into blocks on the chain. One is used to store feature vectors, and the other to record the arrival and departure times of employees. By combining these cutting-edge technologies, an intelligent and immutable ACS that can withstand distributed denial-of-service (DDoS) and other internal and external attacks is created. Finally, an experiment is conducted to assess the effectiveness of the proposed system to demonstrate its practicality.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6755170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143533566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles 利用同态代理再加密增强基于联邦学习的智能网联车辆的安全性和隐私性
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-03 DOI: 10.1049/ise2/4632786
Yang Bai, Yutang Rao, Hongyan Wu, Juan Wang, Wentao Yang, Gaojie Xing, Jiawei Yang, Xiaoshu Yuan

Intelligent connected vehicles (ICVs) are one of the fast-growing directions that plays a significant role in the area of autonomous driving. To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model (FedLLM) as a promising distributed approach has been used to support various collaborative application computations in ICVs scenarios, for example, analyzing vehicle driving information to realize trajectory prediction, voice-activated controls, conversational AI assistants. Unfortunately, recent research reveals that FL systems are still faced with privacy challenges from honest-but-curious server, honest-but-curious distributed participants, or the collusion between participants and the server. These threats can lead to the leakage of sensitive private data, such as location information and driving conditions. Homomorphic encryption (HE) is one of the typical mitigation that has few effects on the model accuracy and has been studied before. However, single-key HE cannot resist collusion between participants and the server, multikey HE is not suitable for ICVs scenarios. In this work, we proposed a novel approach that combines FL with homomorphic proxy re-encryption (PRE) which is based on participants’ ID information. By doing so, the FL-based ICVs can be able to successfully defend against privacy threats. In addition, we analyze the security and performance of our method, and the theoretical analysis and the experiment results show that our defense framework with ID-based homomorphic PRE can achieve a high-security level and efficient computation. We anticipate that our approach can serve as a fundamental point to support the extensive research on FedLLMs privacy-preserving.

智能网联汽车(icv)是一个快速发展的方向,在自动驾驶领域发挥着重要作用。为了实现icv之间的协同计算,联邦学习(FL)或基于联邦的大语言模型(FedLLM)作为一种很有前途的分布式方法,已被用于支持icv场景中的各种协同应用计算,例如分析车辆驾驶信息以实现轨迹预测、语音激活控制、会话AI助手。不幸的是,最近的研究表明,FL系统仍然面临着来自诚实但好奇的服务器、诚实但好奇的分布式参与者或参与者与服务器之间的勾结的隐私挑战。这些威胁可能导致敏感的私人数据泄露,例如位置信息和驾驶条件。同态加密(HE)是一种典型的对模型精度影响较小的缓解方法,前人已经对其进行了研究。但是,单密钥HE不能抵抗参与者与服务器之间的合谋,多密钥HE不适合icv场景。在这项工作中,我们提出了一种将FL与基于参与者ID信息的同态代理重加密(PRE)相结合的新方法。通过这样做,基于fl的icv可以成功地抵御隐私威胁。理论分析和实验结果表明,基于id同态PRE的防御框架能够达到较高的安全级别和高效的计算。我们期望我们的方法可以作为一个基本点来支持对联邦法学硕士隐私保护的广泛研究。
{"title":"Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles","authors":"Yang Bai,&nbsp;Yutang Rao,&nbsp;Hongyan Wu,&nbsp;Juan Wang,&nbsp;Wentao Yang,&nbsp;Gaojie Xing,&nbsp;Jiawei Yang,&nbsp;Xiaoshu Yuan","doi":"10.1049/ise2/4632786","DOIUrl":"10.1049/ise2/4632786","url":null,"abstract":"<p>Intelligent connected vehicles (ICVs) are one of the fast-growing directions that plays a significant role in the area of autonomous driving. To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model (FedLLM) as a promising distributed approach has been used to support various collaborative application computations in ICVs scenarios, for example, analyzing vehicle driving information to realize trajectory prediction, voice-activated controls, conversational AI assistants. Unfortunately, recent research reveals that FL systems are still faced with privacy challenges from honest-but-curious server, honest-but-curious distributed participants, or the collusion between participants and the server. These threats can lead to the leakage of sensitive private data, such as location information and driving conditions. Homomorphic encryption (HE) is one of the typical mitigation that has few effects on the model accuracy and has been studied before. However, single-key HE cannot resist collusion between participants and the server, multikey HE is not suitable for ICVs scenarios. In this work, we proposed a novel approach that combines FL with homomorphic proxy re-encryption (PRE) which is based on participants’ ID information. By doing so, the FL-based ICVs can be able to successfully defend against privacy threats. In addition, we analyze the security and performance of our method, and the theoretical analysis and the experiment results show that our defense framework with ID-based homomorphic PRE can achieve a high-security level and efficient computation. We anticipate that our approach can serve as a fundamental point to support the extensive research on FedLLMs privacy-preserving.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/4632786","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143533565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things 基于特征选择的工业物联网两阶段僵尸网络检测方法
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-13 DOI: 10.1049/ise2/9984635
Jian Shu, Jiazhong Lu

Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor-based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and associated equipment. The landscape of botnets is characterized by its diverse array and intricate attack methodologies, spanning a broad spectrum. In recent years, the domain of industrial control has witnessed the emergence of botnets, further accentuating the need for robust security measures. Addressing the challenge of categorizing and detecting the diverse botnet attacks, this paper proposes a two-stage feature selection–based method for botnet detection. In the first stage, a spatiotemporal convolutional recurrent network is employed to construct a hybrid network capable of classifying benign traffic and identifying traffic originating from distinct botnet families. Subsequently, in the second stage, core features specific to the traffic of each botnet family are meticulously screened using the F-test. The identified features are then utilized to categorize the respective attack types through the application of extreme gradient boosting (XGBOOST). To evaluate the efficacy of the proposed method, we conducted experiments using the N-BaIoT dataset under 10 different attack scenarios from the Gafgyt and Mirai botnet families. The results demonstrate that our method achieves a classification accuracy and F1-score exceeding 99%, establishing it as the highest-performing model for botnet detection within this dataset.

工业控制系统(ics)越来越多地利用工业物联网(iiot)实现基于传感器的自动化,提高运营效率。然而,工业物联网的快速扩张带来了对网络入侵潜在威胁的固有敏感性,这对网络基础设施和相关设备都构成了风险。僵尸网络的特点是其多样化的阵列和复杂的攻击方法,跨越广泛的范围。近年来,工业控制领域见证了僵尸网络的出现,进一步强调了对强大安全措施的需求。针对对各种僵尸网络攻击进行分类和检测的挑战,提出了一种基于两阶段特征选择的僵尸网络检测方法。在第一阶段,利用一个时空卷积循环网络构建一个混合网络,能够对良性流量进行分类,并识别来自不同僵尸网络家族的流量。随后,在第二阶段,使用f检验仔细筛选每个僵尸网络家族流量的核心特征。然后,通过应用极端梯度增强(XGBOOST),利用识别出的特征对各自的攻击类型进行分类。为了评估所提出方法的有效性,我们使用N-BaIoT数据集在来自Gafgyt和Mirai僵尸网络家族的10种不同攻击场景下进行了实验。结果表明,该方法的分类准确率和f1得分均超过99%,是该数据集中性能最高的僵尸网络检测模型。
{"title":"Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things","authors":"Jian Shu,&nbsp;Jiazhong Lu","doi":"10.1049/ise2/9984635","DOIUrl":"10.1049/ise2/9984635","url":null,"abstract":"<p>Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor-based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and associated equipment. The landscape of botnets is characterized by its diverse array and intricate attack methodologies, spanning a broad spectrum. In recent years, the domain of industrial control has witnessed the emergence of botnets, further accentuating the need for robust security measures. Addressing the challenge of categorizing and detecting the diverse botnet attacks, this paper proposes a two-stage feature selection–based method for botnet detection. In the first stage, a spatiotemporal convolutional recurrent network is employed to construct a hybrid network capable of classifying benign traffic and identifying traffic originating from distinct botnet families. Subsequently, in the second stage, core features specific to the traffic of each botnet family are meticulously screened using the <i>F</i>-test. The identified features are then utilized to categorize the respective attack types through the application of extreme gradient boosting (XGBOOST). To evaluate the efficacy of the proposed method, we conducted experiments using the N-BaIoT dataset under 10 different attack scenarios from the Gafgyt and Mirai botnet families. The results demonstrate that our method achieves a classification accuracy and F1-score exceeding 99%, establishing it as the highest-performing model for botnet detection within this dataset.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/9984635","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143396842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server 针对恶意服务器的可搜索公钥加密方案中关键字机密性的密码分析
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-05 DOI: 10.1049/ise2/2464518
Nan Zhang, Baodong Qin, Dong Zheng

Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated-server PAEKS (dPAEKS) scheme was proposed to withstand KGAs. The scheme was claimed to satisfy both multi-ciphertext indistinguishability (MCI) and multi-trapdoor privacy (MTP). However, our cryptanalysis demonstrates that it is insecure against KGAs, where a malicious server (inside attacker) can obtain the information of the keywords embedded in the ciphertext and the trapdoor. As a result, both the MCI and MTP of the scheme are broken. In addition, the paper also shows that it is possible to break the security of MTP, even for an outside attacker. Finally, we also provide a method to fix these security flaws.

使用关键字搜索的公钥认证加密(PAEKS)是一种新的加密原语,用于抵御关键字猜测攻击(KGAs)并保护密文和陷阱门中关键字的隐私。最近,为了抵御KGAs,提出了一种指定服务器PAEKS (dPAEKS)方案。该方案同时满足多密文不可分辨性(MCI)和多陷阱门隐私性(MTP)。然而,我们的密码分析表明,它对KGAs是不安全的,恶意服务器(内部攻击者)可以获得嵌入在密文和陷阱门中的关键字信息。结果,该方案的MCI和MTP都被破坏了。此外,本文还表明,即使是外部攻击者也有可能破坏MTP的安全性。最后,我们还提供了一种修复这些安全漏洞的方法。
{"title":"Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server","authors":"Nan Zhang,&nbsp;Baodong Qin,&nbsp;Dong Zheng","doi":"10.1049/ise2/2464518","DOIUrl":"10.1049/ise2/2464518","url":null,"abstract":"<p>Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated-server PAEKS (dPAEKS) scheme was proposed to withstand KGAs. The scheme was claimed to satisfy both multi-ciphertext indistinguishability (MCI) and multi-trapdoor privacy (MTP). However, our cryptanalysis demonstrates that it is insecure against KGAs, where a malicious server (inside attacker) can obtain the information of the keywords embedded in the ciphertext and the trapdoor. As a result, both the MCI and MTP of the scheme are broken. In addition, the paper also shows that it is possible to break the security of MTP, even for an outside attacker. Finally, we also provide a method to fix these security flaws.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/2464518","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143186336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability 分析2021 Kaseya勒索软件攻击:通过SonicWall SSLVPN漏洞组合鱼叉式网络钓鱼
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-31 DOI: 10.1049/ise2/1655307
Suman Bhunia, Matthew Blackert, Henry Deal, Andrew DePero, Amar Patra

In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved. The attack was conducted through specially crafted hypertext transfer protocol (HTTP) requests to circumvent authentication and allow hackers to upload malicious payloads through Kaseya’s virtual system administrator (VSA). The attack led to the emergency shutdown of many VSA servers and a federal investigation. REvil has had a tremendous impact performing ransomware operations, including worsening international relations between Russia and world leaders and costing considerable infrastructure damage and millions of dollars in ransom payments. We present an overview of Kaseya’s defense strategy involving customer interaction, a PowerShell script to detect compromised clients, and a cure-all decryption key that unlocks all locked files.

2021年7月,IT管理软件公司Kaseya成为勒索软件网络攻击的受害者。这次攻击的肇事者是勒索软件邪恶(REvil),据称是一个总部位于俄罗斯的勒索软件威胁组织。本文讨论了事件的一般事件和所涉及的组成部分所执行的行动。攻击是通过特制的超文本传输协议(HTTP)请求进行的,以绕过身份验证,并允许黑客通过Kaseya的虚拟系统管理员(VSA)上传恶意有效载荷。这次攻击导致许多VSA服务器紧急关闭,并引发联邦调查。REvil实施的勒索软件造成了巨大的影响,包括恶化俄罗斯与世界各国领导人之间的国际关系,造成相当大的基础设施破坏和数百万美元的赎金支付。我们概述了Kaseya的防御策略,包括客户交互,用于检测受感染客户端的PowerShell脚本,以及解锁所有锁定文件的万灵药解密密钥。
{"title":"Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability","authors":"Suman Bhunia,&nbsp;Matthew Blackert,&nbsp;Henry Deal,&nbsp;Andrew DePero,&nbsp;Amar Patra","doi":"10.1049/ise2/1655307","DOIUrl":"10.1049/ise2/1655307","url":null,"abstract":"<p>In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian-based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved. The attack was conducted through specially crafted hypertext transfer protocol (HTTP) requests to circumvent authentication and allow hackers to upload malicious payloads through Kaseya’s virtual system administrator (VSA). The attack led to the emergency shutdown of many VSA servers and a federal investigation. REvil has had a tremendous impact performing ransomware operations, including worsening international relations between Russia and world leaders and costing considerable infrastructure damage and millions of dollars in ransom payments. We present an overview of Kaseya’s defense strategy involving customer interaction, a PowerShell script to detect compromised clients, and a cure-all decryption key that unlocks all locked files.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/1655307","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws 隐私权导航:数据保护法律的全球比较分析
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-24 DOI: 10.1049/ise2/5536763
Sungjin Lim, Junhyoung Oh

The increasing reliance on big data and artificial intelligence (AI) in the Fourth Industrial Revolution has raised significant concerns about individual privacy protection. This has led various countries to enact or amend privacy protection acts to address these concerns. However, there is a lack of comprehensive research comparing these laws across multiple countries, especially considering recent legislative developments. This study fills this gap by conducting a comparative analysis of privacy information protection acts in five major regions: the European Union (EU), the United States (focusing on California), China, Japan, and South Korea. The analysis explores the diverse approaches to privacy protection adopted by each region, influenced by their unique historical, political, and cultural contexts. For instance, the EU’s General Data Protection Regulation (GDPR) emphasizes individual rights influenced by historical abuses of personal information. At the same time, the California Consumer Privacy Act (CCPA) prioritizes consumer rights within a self-regulatory framework, reflecting the state’s technology-driven economy. The study also examines China’s Personal Information Protection Law (PIPL), which prioritizes national security; Japan’s Act on the Protection of Personal Information (APPI), which navigates the tension between individual privacy and societal norms; and South Korea’s Personal Information Protection Act (PIPA), which balances individual autonomy with a sense of community, reflecting Confucian values. By identifying specific limitations and areas for improvement in each region’s data protection laws, this study contributes to the ongoing discourse on international data privacy regulation. It offers valuable insights for policymakers and stakeholders seeking to navigate the complexities of the data economy while ensuring robust safeguards for individual privacy.

在第四次工业革命中,对大数据和人工智能(AI)的日益依赖引发了对个人隐私保护的重大担忧。这导致许多国家颁布或修改隐私保护法来解决这些问题。然而,缺乏对多个国家的这些法律进行比较的全面研究,特别是考虑到最近的立法发展。本研究通过对欧盟(EU)、美国(以加州为重点)、中国、日本和韩国这五个主要地区的隐私信息保护法进行比较分析,填补了这一空白。该分析探讨了受其独特的历史、政治和文化背景影响,每个地区采用的不同隐私保护方法。例如,欧盟的《通用数据保护条例》(GDPR)强调个人权利受到个人信息滥用历史的影响。与此同时,加州消费者隐私法案(CCPA)在自我监管框架内优先考虑消费者的权利,反映了该州的技术驱动型经济。该研究还考察了中国的《个人信息保护法》(PIPL),该法将国家安全放在首位;日本的《个人信息保护法》(APPI),解决了个人隐私与社会规范之间的紧张关系;以及韩国的《个人信息保护法》(PIPA),该法平衡了个人自主权和社区意识,反映了儒家价值观。通过确定每个地区数据保护法律的具体限制和需要改进的领域,本研究有助于正在进行的关于国际数据隐私监管的讨论。它为决策者和利益相关者提供了宝贵的见解,帮助他们在应对数据经济的复杂性的同时,确保对个人隐私的有力保护。
{"title":"Navigating Privacy: A Global Comparative Analysis of Data Protection Laws","authors":"Sungjin Lim,&nbsp;Junhyoung Oh","doi":"10.1049/ise2/5536763","DOIUrl":"10.1049/ise2/5536763","url":null,"abstract":"<p>The increasing reliance on big data and artificial intelligence (AI) in the Fourth Industrial Revolution has raised significant concerns about individual privacy protection. This has led various countries to enact or amend privacy protection acts to address these concerns. However, there is a lack of comprehensive research comparing these laws across multiple countries, especially considering recent legislative developments. This study fills this gap by conducting a comparative analysis of privacy information protection acts in five major regions: the European Union (EU), the United States (focusing on California), China, Japan, and South Korea. The analysis explores the diverse approaches to privacy protection adopted by each region, influenced by their unique historical, political, and cultural contexts. For instance, the EU’s General Data Protection Regulation (GDPR) emphasizes individual rights influenced by historical abuses of personal information. At the same time, the California Consumer Privacy Act (CCPA) prioritizes consumer rights within a self-regulatory framework, reflecting the state’s technology-driven economy. The study also examines China’s Personal Information Protection Law (PIPL), which prioritizes national security; Japan’s Act on the Protection of Personal Information (APPI), which navigates the tension between individual privacy and societal norms; and South Korea’s Personal Information Protection Act (PIPA), which balances individual autonomy with a sense of community, reflecting Confucian values. By identifying specific limitations and areas for improvement in each region’s data protection laws, this study contributes to the ongoing discourse on international data privacy regulation. It offers valuable insights for policymakers and stakeholders seeking to navigate the complexities of the data economy while ensuring robust safeguards for individual privacy.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5536763","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes 轻量级s盒3-共享二阶掩码格式的快速搜索方法
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-21 DOI: 10.1049/ise2/9155041
Yanhong Fan, Chaoran Wang, Lixuan Wu, Meiqin Wang

Masking schemes are widely adopted strategies for countering side-channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the algebraic degree of the target function. For instance, implementing a second-order TI scheme for quadratic nonlinear functions requires at least five shares to ensure security, leading to substantially high implementation costs for higher order TI schemes. To address this issue, Shahmirzadi et al. proposed a method in CHES 2021 for constructing a 3-share second-order masking scheme. Despite its advancements, their search method is complex and time consuming. Our study presents a more efficient search method for a 3-share second-order masking scheme, ensuring both uniformity and second-order probing security. Our approach can find a valid second-order scheme in under a minute, making it tens to over a 1000 times faster than the method described in CHES 2021. Utilizing our methodology, we have effectively constructed second-order secure implementations for several cryptographic primitives (e.g., Keccak, SKINNY, Midori, PRESENT, PRINCE, GIFT, and RECTANGLE) and evaluated their implementation costs and security.

掩蔽方案是广泛采用的对抗侧信道分析(SCA)攻击的策略。初始的硬件屏蔽策略,阈值实现(TI),提供了针对硬件平台故障的健壮安全性。TI方案所需的最小共享数不仅取决于期望的安全顺序,还取决于目标函数的代数度。例如,实现二次非线性函数的二阶TI方案至少需要五个共享来确保安全性,这导致高阶TI方案的实现成本非常高。为了解决这个问题,Shahmirzadi等人在CHES 2021中提出了一种构建3共享二阶掩蔽方案的方法。尽管有了进步,但它们的搜索方法复杂且耗时。我们的研究提出了一种更有效的3共享二阶掩码搜索方法,保证了一致性和二阶探测的安全性。我们的方法可以在一分钟内找到一个有效的二阶方案,使其比CHES 2021中描述的方法快几十到1000倍。利用我们的方法,我们有效地构建了几种加密原语(例如Keccak、SKINNY、Midori、PRESENT、PRINCE、GIFT和RECTANGLE)的二阶安全实现,并评估了它们的实现成本和安全性。
{"title":"A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes","authors":"Yanhong Fan,&nbsp;Chaoran Wang,&nbsp;Lixuan Wu,&nbsp;Meiqin Wang","doi":"10.1049/ise2/9155041","DOIUrl":"10.1049/ise2/9155041","url":null,"abstract":"<p>Masking schemes are widely adopted strategies for countering side-channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the algebraic degree of the target function. For instance, implementing a second-order TI scheme for quadratic nonlinear functions requires at least five shares to ensure security, leading to substantially high implementation costs for higher order TI schemes. To address this issue, Shahmirzadi et al. proposed a method in CHES 2021 for constructing a 3-share second-order masking scheme. Despite its advancements, their search method is complex and time consuming. Our study presents a more efficient search method for a 3-share second-order masking scheme, ensuring both uniformity and second-order probing security. Our approach can find a valid second-order scheme in under a minute, making it tens to over a 1000 times faster than the method described in CHES 2021. Utilizing our methodology, we have effectively constructed second-order secure implementations for several cryptographic primitives (e.g., Keccak, SKINNY, Midori, PRESENT, PRINCE, GIFT, and RECTANGLE) and evaluated their implementation costs and security.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/9155041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143117659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges 高der渗透智能电网的网络物理社会安全:威胁、对策和挑战
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-09 DOI: 10.1049/ise2/2654550
Qiuyu Lu, Jun’e Li, Zhao Peng, Ming Ni

With the trend of large-scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs). However, the deep coupling of cyber, physical, and social spaces leads the SGs to be more complex and openness, and thus, a higher risk of exposure to various threats. To study the threats, countermeasures, and challenges of the high-DER-penetrated SGs from a cyber–physical–social perspective, the key features of the SGs on devices, networks, and applications are first analyzed. On this basis, the threats faced by the SGs due to the widespread deployment of terminal devices, open network environments, and the increasing importance of social behaviors are analyzed. Subsequently, the limitations of the deployed security measures in current power systems are discussed, and an overview of the state-of-art countermeasures for the SGs security faced by the threats is organized in three stages: prevention, detection, and mitigation. Finally, the research challenges, key gaps, and future directions for security enhancement of the SGs are also discussed.

随着大规模可再生分布式能源向智能电网渗透的趋势,智能电网对信息通信技术的依赖程度越来越高,社会行为对系统运行和管理的影响也越来越大。SGs可以被视为网络-物理-社会系统(cpss)。然而,网络空间、物理空间和社会空间的深度耦合使得网络安全更加复杂和开放,因此面临各种威胁的风险更高。从网络-物理-社会的角度研究高der渗透SGs的威胁、对策和挑战,首先分析了高der渗透SGs在设备、网络和应用方面的主要特征。在此基础上,分析了终端设备的广泛部署、开放的网络环境以及社会行为的日益重要所带来的网络安全威胁。随后,讨论了当前电力系统中已部署的安全措施的局限性,并概述了当前面临威胁的SGs安全对策,分为三个阶段:预防、检测和缓解。最后,讨论了研究的挑战、关键差距和未来的发展方向。
{"title":"Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges","authors":"Qiuyu Lu,&nbsp;Jun’e Li,&nbsp;Zhao Peng,&nbsp;Ming Ni","doi":"10.1049/ise2/2654550","DOIUrl":"10.1049/ise2/2654550","url":null,"abstract":"<p>With the trend of large-scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs). However, the deep coupling of cyber, physical, and social spaces leads the SGs to be more complex and openness, and thus, a higher risk of exposure to various threats. To study the threats, countermeasures, and challenges of the high-DER-penetrated SGs from a cyber–physical–social perspective, the key features of the SGs on devices, networks, and applications are first analyzed. On this basis, the threats faced by the SGs due to the widespread deployment of terminal devices, open network environments, and the increasing importance of social behaviors are analyzed. Subsequently, the limitations of the deployed security measures in current power systems are discussed, and an overview of the state-of-art countermeasures for the SGs security faced by the threats is organized in three stages: prevention, detection, and mitigation. Finally, the research challenges, key gaps, and future directions for security enhancement of the SGs are also discussed.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/2654550","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143113399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Message Authentication Codes With Message and Function Privacy 具有消息和功能隐私的功能消息认证码
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-19 DOI: 10.1049/ise2/1969519
Pu Li, Muhua Liu, Youlin Shang

Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function f, which can be used to authenticate any messages belonged to the range of f. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability.

函数签名允许任何拥有密钥skf的人对函数f范围内的任何消息进行签名。但是,现有的结构不能满足消息和函数的隐私性。本文提出了一个新的概念,即功能消息认证码(MACs)。在一个功能MAC方案中,有两种类型的密钥。一个是主秘钥,可用于为任何消息生成有效标记。另一种是对函数f的密钥进行认证,该密钥可用于对f范围内的任何消息进行认证。除了不可伪造性外,我们还要求所提出的功能MAC满足函数和消息的隐私性,这表明认证过程只显示函数值和相应的标签。在具有功能隐私的功能加密方案、完全绑定承诺方案、标准签名方案和具有语义安全的对称加密方案的基础上,给出了一个功能MAC结构。然后,我们展示了功能MAC在构建可验证外包计算中的应用,该计算确保客户端不会以压倒性的概率接受来自服务器的错误评估。
{"title":"Functional Message Authentication Codes With Message and Function Privacy","authors":"Pu Li,&nbsp;Muhua Liu,&nbsp;Youlin Shang","doi":"10.1049/ise2/1969519","DOIUrl":"10.1049/ise2/1969519","url":null,"abstract":"<p>Functional signatures were allowed anyone to sign any messages in the range of function <i>f</i>, who possesses the secret key <i>s</i><i>k</i><sub><i>f</i></sub>. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs). In a functional MAC scheme, there are two types of secret keys. One is a master secret key which can be used to generate a valid tag for any messages. The other is authenticating keys for a function <i>f</i>, which can be used to authenticate any messages belonged to the range of <i>f</i>. Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. We give a functional MAC construction based on a functional encryption (FE) scheme with function privacy, a perfectly binding commitment scheme, a standard signature scheme, and a symmetric encryption scheme with semantic security. Then, we show an application of functional MAC to constructing verifiable outsourcing computation, which ensures that the client does not accept an incorrect evaluation from the server with overwhelming probability.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/1969519","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142861779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1