首页 > 最新文献

Computers & Security最新文献

英文 中文
Usable authentication: Are we there yet? 可用的身份验证:我们做到了吗?
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-30 DOI: 10.1016/j.cose.2025.104823
Nathan Clarke , Steven Furnell
With technology increasingly embedded in everyday life, the demand for secure and usable authentication methods has never been greater. Traditional password-based systems continue to dominate, despite well-known usability and security challenges. This paper explores the evolution of user authentication technologies, from secret knowledge and tokens to biometrics and emerging approaches such as Passkeys. It critically evaluates the extent to which usability has been achieved, identifying both successes—such as biometrics integrated into smartphones—and persistent issues, including inconsistent guidance, ecosystem dependence, and accessibility barriers. Drawing on academic and commercial developments, the discussion highlights the growing burden on users who must authenticate across multiple devices and services daily. Future directions including transparent, continuous, and user-choice-driven authentication are discussed as potential solutions to mitigate this burden. Ultimately, it argues that while progress has been made, current solutions remain fragmented and often exclude key user groups. A more inclusive, consistent, and user-centred approach is essential to ensure authentication systems are both secure and truly usable in practice.
随着技术越来越多地嵌入到日常生活中,对安全和可用的身份验证方法的需求从未像现在这样大。尽管存在众所周知的可用性和安全性挑战,传统的基于密码的系统仍然占据主导地位。本文探讨了用户认证技术的演变,从秘密知识和令牌到生物识别技术和新兴方法,如Passkeys。它批判性地评估了可用性实现的程度,确定了成功的方面(如生物识别技术集成到智能手机中)和持续存在的问题(包括不一致的指导、生态系统依赖和可访问性障碍)。根据学术和商业发展,讨论强调了每天必须跨多个设备和服务进行身份验证的用户的负担日益增加。未来的发展方向包括透明、连续和用户选择驱动的身份验证,作为减轻这种负担的潜在解决方案进行了讨论。最后,报告认为,虽然取得了进展,但目前的解决方案仍然支离破碎,而且往往排除了关键用户群体。一种更具包容性、一致性和以用户为中心的方法对于确保身份验证系统在实践中既安全又真正可用至关重要。
{"title":"Usable authentication: Are we there yet?","authors":"Nathan Clarke ,&nbsp;Steven Furnell","doi":"10.1016/j.cose.2025.104823","DOIUrl":"10.1016/j.cose.2025.104823","url":null,"abstract":"<div><div>With technology increasingly embedded in everyday life, the demand for secure and usable authentication methods has never been greater. Traditional password-based systems continue to dominate, despite well-known usability and security challenges. This paper explores the evolution of user authentication technologies, from secret knowledge and tokens to biometrics and emerging approaches such as Passkeys. It critically evaluates the extent to which usability has been achieved, identifying both successes—such as biometrics integrated into smartphones—and persistent issues, including inconsistent guidance, ecosystem dependence, and accessibility barriers. Drawing on academic and commercial developments, the discussion highlights the growing burden on users who must authenticate across multiple devices and services daily. Future directions including transparent, continuous, and user-choice-driven authentication are discussed as potential solutions to mitigate this burden. Ultimately, it argues that while progress has been made, current solutions remain fragmented and often exclude key user groups. A more inclusive, consistent, and user-centred approach is essential to ensure authentication systems are both secure and truly usable in practice.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104823"},"PeriodicalIF":5.4,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memory under siege: A comprehensive survey of side-Channel attacks on memory 围攻下的内存:对内存侧通道攻击的全面调查
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-30 DOI: 10.1016/j.cose.2025.104810
Mahady Hassan , Shanto Roy , Reza Rahaeimehr
Side-channel attacks on memory (SCAM) exploit unintended data leaks from memory subsystems to infer sensitive information, posing significant threats to system security. These attacks exploit vulnerabilities in memory access patterns, cache behaviors, and other microarchitectural features to bypass traditional security measures. The purpose of this research is to examine SCAM, classify various attack techniques, and evaluate existing defense mechanisms. It guides researchers and industry professionals in improving memory security and mitigating emerging threats. We begin by identifying the major vulnerabilities in the memory system that are frequently exploited in SCAM, such as cache timing, speculative execution, Rowhammer, and other sophisticated approaches. Next, we outline a comprehensive taxonomy that systematically classifies these attacks based on their types, target systems, attack vectors, and adversarial capabilities required to execute them. In addition, we review the current landscape of mitigation strategies, emphasizing their strengths and limitations. This work aims to provide a comprehensive overview of memory-based side-channel attacks with the goal of providing significant insights for researchers and practitioners to better understand, detect, and mitigate SCAM risks.
内存侧信道攻击(SCAM)利用内存子系统的意外数据泄漏来推断敏感信息,对系统安全构成重大威胁。这些攻击利用内存访问模式、缓存行为和其他微架构特性中的漏洞来绕过传统的安全措施。本研究的目的是检查诈骗,分类各种攻击技术,并评估现有的防御机制。它指导研究人员和行业专业人士提高内存安全性和减轻新出现的威胁。我们首先确定内存系统中经常被骗局利用的主要漏洞,例如缓存定时、推测执行、Rowhammer和其他复杂的方法。接下来,我们概述了一个全面的分类法,该分类法根据攻击类型、目标系统、攻击向量和执行攻击所需的对抗能力对这些攻击进行系统分类。此外,我们回顾了缓解战略的现状,强调了它们的优势和局限性。这项工作旨在提供基于内存的侧通道攻击的全面概述,为研究人员和从业者提供重要的见解,以更好地理解、检测和减轻诈骗风险。
{"title":"Memory under siege: A comprehensive survey of side-Channel attacks on memory","authors":"Mahady Hassan ,&nbsp;Shanto Roy ,&nbsp;Reza Rahaeimehr","doi":"10.1016/j.cose.2025.104810","DOIUrl":"10.1016/j.cose.2025.104810","url":null,"abstract":"<div><div>Side-channel attacks on memory (SCAM) exploit unintended data leaks from memory subsystems to infer sensitive information, posing significant threats to system security. These attacks exploit vulnerabilities in memory access patterns, cache behaviors, and other microarchitectural features to bypass traditional security measures. The purpose of this research is to examine SCAM, classify various attack techniques, and evaluate existing defense mechanisms. It guides researchers and industry professionals in improving memory security and mitigating emerging threats. We begin by identifying the major vulnerabilities in the memory system that are frequently exploited in SCAM, such as cache timing, speculative execution, <em>Rowhammer</em>, and other sophisticated approaches. Next, we outline a comprehensive taxonomy that systematically classifies these attacks based on their types, target systems, attack vectors, and adversarial capabilities required to execute them. In addition, we review the current landscape of mitigation strategies, emphasizing their strengths and limitations. This work aims to provide a comprehensive overview of memory-based side-channel attacks with the goal of providing significant insights for researchers and practitioners to better understand, detect, and mitigate SCAM risks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104810"},"PeriodicalIF":5.4,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis GLRA:通过最小传输成本路径分析的基于图的泄漏风险评估
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-29 DOI: 10.1016/j.cose.2025.104816
Xing Hu , Yang Zhang , Sheng Liu , Xiaowen Chen , Yaohua Wang , Shaoqing Li , Zhenyu Zhao , Keqin Li
As integrated circuits are increasingly deployed in security-critical applications, assessing the risk of information leakage introduced during the design phase has become a key challenge. Logic-level structures may inadvertently enable sensitive data to propagate to externally observable points, posing serious security risks. Although anomaly-based techniques such as taint tracking and machine learning have been developed to detect or mitigate leakage threats, the absence of a unified and quantitative metric for evaluating leakage risk remains a major limitation. Without such a metric, existing methods can neither effectively identify real threats nor compare the effectiveness of protection strategies in a principled manner, leading to limited reliability and comparability in hardware security analysis.
To overcome these challenges, we propose GLRA, a graph-based methodology for leakage risk assessment via minimal transmission cost path analysis. Departing from the traditional “path existence” criterion used in anomaly label-based taint tracking, GLRA quantifies leakage risk by evaluating the difficulty of information propagation. A central premise of GLRA is that the transmission cost-defined as the effort required to propagate signals from sensitive sources to observable outputs-is inversely correlated with leakage likelihood: lower costs imply higher risks. Accordingly, we define controllability-based transmission cost metrics for basic logical units such as AND, OR, NOT, and DFF, which quantify the propagation effort imposed by each logic unit. By modeling the circuit as an edge-weighted graph where edges are annotated with the aforementioned transmission cost values, GLRA identifies the minimal path from sensitive sources to potential leakage points. In addition, to accurately quantify the risk of leakage, GLRA establishes a formulaic correlation between the transmission cost and the design’s overall risk of information leakage. Experiments on cryptographic cores, debug infrastructure, and non-cryptographic logic demonstrate that GLRA accurately quantifies maximum-risk leakage paths, achieving a 18.75% improvement in detection precision over traditional anomaly-based approaches. GLRA correctly determines the presence or absence of leakage risks across all 16 evaluated benchmarks. Furthermore, it supports comparative analysis of leakage mitigation strategies across diverse hardware designs, providing quantitative insights into the effectiveness of protection mechanisms.
随着集成电路越来越多地部署在安全关键应用中,评估设计阶段引入的信息泄漏风险已成为一个关键挑战。逻辑级结构可能会无意中使敏感数据传播到外部可观察点,从而带来严重的安全风险。尽管基于异常的技术(如污染跟踪和机器学习)已经被开发用于检测或减轻泄漏威胁,但缺乏统一的定量指标来评估泄漏风险仍然是一个主要限制。如果没有这样的度量,现有的方法既不能有效地识别真实的威胁,也不能有原则地比较保护策略的有效性,导致硬件安全分析的可靠性和可比性有限。为了克服这些挑战,我们提出了GLRA,这是一种基于图的方法,通过最小传输成本路径分析来评估泄漏风险。与传统的基于异常标签的污染跟踪的“路径存在性”准则不同,GLRA通过评估信息传播的难易程度来量化泄漏风险。GLRA的一个中心前提是传输成本(定义为将信号从敏感源传播到可观察输出所需的努力)与泄漏可能性成反比:成本越低意味着风险越高。因此,我们为基本逻辑单元(如AND、OR、NOT和DFF)定义了基于可控性的传输成本指标,这些指标量化了每个逻辑单元施加的传播努力。通过将电路建模为一个边加权图,其中边标注了上述传输成本值,GLRA确定了从敏感源到潜在泄漏点的最小路径。此外,为了准确量化泄漏风险,GLRA建立了传输成本与设计总体信息泄漏风险之间的关系式。在加密核心、调试基础设施和非加密逻辑上的实验表明,GLRA准确地量化了最大风险泄漏路径,与传统的基于异常的方法相比,检测精度提高了18.75%。GLRA在所有16个评估基准中正确确定是否存在泄漏风险。此外,它支持跨不同硬件设计的泄漏缓解策略的比较分析,为保护机制的有效性提供定量见解。
{"title":"GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis","authors":"Xing Hu ,&nbsp;Yang Zhang ,&nbsp;Sheng Liu ,&nbsp;Xiaowen Chen ,&nbsp;Yaohua Wang ,&nbsp;Shaoqing Li ,&nbsp;Zhenyu Zhao ,&nbsp;Keqin Li","doi":"10.1016/j.cose.2025.104816","DOIUrl":"10.1016/j.cose.2025.104816","url":null,"abstract":"<div><div>As integrated circuits are increasingly deployed in security-critical applications, assessing the risk of information leakage introduced during the design phase has become a key challenge. Logic-level structures may inadvertently enable sensitive data to propagate to externally observable points, posing serious security risks. Although anomaly-based techniques such as taint tracking and machine learning have been developed to detect or mitigate leakage threats, the absence of a unified and quantitative metric for evaluating leakage risk remains a major limitation. Without such a metric, existing methods can neither effectively identify real threats nor compare the effectiveness of protection strategies in a principled manner, leading to limited reliability and comparability in hardware security analysis.</div><div>To overcome these challenges, we propose GLRA, a graph-based methodology for leakage risk assessment via minimal transmission cost path analysis. Departing from the traditional “path existence” criterion used in anomaly label-based taint tracking, GLRA quantifies leakage risk by evaluating the difficulty of information propagation. A central premise of GLRA is that the transmission cost-defined as the effort required to propagate signals from sensitive sources to observable outputs-is inversely correlated with leakage likelihood: lower costs imply higher risks. Accordingly, we define controllability-based transmission cost metrics for basic logical units such as AND, OR, NOT, and DFF, which quantify the propagation effort imposed by each logic unit. By modeling the circuit as an edge-weighted graph where edges are annotated with the aforementioned transmission cost values, GLRA identifies the minimal path from sensitive sources to potential leakage points. In addition, to accurately quantify the risk of leakage, GLRA establishes a formulaic correlation between the transmission cost and the design’s overall risk of information leakage. Experiments on cryptographic cores, debug infrastructure, and non-cryptographic logic demonstrate that GLRA accurately quantifies maximum-risk leakage paths, achieving a 18.75% improvement in detection precision over traditional anomaly-based approaches. GLRA correctly determines the presence or absence of leakage risks across all 16 evaluated benchmarks. Furthermore, it supports comparative analysis of leakage mitigation strategies across diverse hardware designs, providing quantitative insights into the effectiveness of protection mechanisms.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104816"},"PeriodicalIF":5.4,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity and Cyber insurance for Small to Medium-sized Enterprises (SMEs): Perceptions, challenges and decision-making dynamics 中小企业的网络安全和网络保险:认知、挑战和决策动态
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-29 DOI: 10.1016/j.cose.2025.104818
Rodney Adriko, Jason R.C. Nurse
Cyber insurance is increasingly positioned as a complementary tool for managing cyber risk, yet Small to Medium-Sized Enterprises (SMEs) remain underrepresented in its adoption. This study investigates the perceptions, decision-making dynamics, and support needs of SMEs regarding cyber insurance, drawing on 38 semi-structured interviews with SMEs, insurers, brokers, and other relevant stakeholders. The findings reveal that many SMEs deprioritise cyber insurance; not because they dismiss its importance outright, but due to a combination of limited awareness, concerns over cost, and a perception that its value is minimal unless required by clients or regulators. This hesitation is further shaped by several key barriers: complex policy language, a lack of trust in insurers, and unclear internal ownership of cybersecurity responsibilities. Despite these challenges, the study identifies promising strategies to boost adoption. These include simplifying policy structures, fostering trust through collaborative awareness efforts, introducing financial incentives tailored to SME budgets, and offering accessible, user-friendly tools that help businesses assess their cyber risks and insurance needs. By identifying actionable strategies and addressing both cultural and structural barriers, this study contributes to efforts to enhance cybersecurity resilience in the SME sector.
网络保险越来越被定位为管理网络风险的补充工具,但中小型企业(SMEs)在采用网络保险方面的代表性仍然不足。本研究通过对中小企业、保险公司、经纪人和其他相关利益相关者的38次半结构化访谈,调查了中小企业对网络保险的看法、决策动态和支持需求。调查结果显示,许多中小企业不重视网络保险;这并不是因为他们完全忽视了它的重要性,而是由于意识有限、对成本的担忧,以及认为除非客户或监管机构要求,否则它的价值微乎其微。这种犹豫进一步受到几个关键障碍的影响:复杂的政策语言,对保险公司缺乏信任,以及网络安全责任的内部所有权不明确。尽管存在这些挑战,但该研究确定了促进采用的有希望的策略。这些措施包括简化政策结构,通过协作意识努力培养信任,引入针对中小企业预算的财务激励措施,以及提供方便、用户友好的工具,帮助企业评估其网络风险和保险需求。通过确定可操作的战略并解决文化和结构障碍,本研究有助于提高中小企业部门的网络安全弹性。
{"title":"Cybersecurity and Cyber insurance for Small to Medium-sized Enterprises (SMEs): Perceptions, challenges and decision-making dynamics","authors":"Rodney Adriko,&nbsp;Jason R.C. Nurse","doi":"10.1016/j.cose.2025.104818","DOIUrl":"10.1016/j.cose.2025.104818","url":null,"abstract":"<div><div>Cyber insurance is increasingly positioned as a complementary tool for managing cyber risk, yet Small to Medium-Sized Enterprises (SMEs) remain underrepresented in its adoption. This study investigates the perceptions, decision-making dynamics, and support needs of SMEs regarding cyber insurance, drawing on 38 semi-structured interviews with SMEs, insurers, brokers, and other relevant stakeholders. The findings reveal that many SMEs deprioritise cyber insurance; not because they dismiss its importance outright, but due to a combination of limited awareness, concerns over cost, and a perception that its value is minimal unless required by clients or regulators. This hesitation is further shaped by several key barriers: complex policy language, a lack of trust in insurers, and unclear internal ownership of cybersecurity responsibilities. Despite these challenges, the study identifies promising strategies to boost adoption. These include simplifying policy structures, fostering trust through collaborative awareness efforts, introducing financial incentives tailored to SME budgets, and offering accessible, user-friendly tools that help businesses assess their cyber risks and insurance needs. By identifying actionable strategies and addressing both cultural and structural barriers, this study contributes to efforts to enhance cybersecurity resilience in the SME sector.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104818"},"PeriodicalIF":5.4,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncovering hidden threats: A format-driven approach to dsp instruction set vulnerability discovery 揭露隐藏的威胁:dsp指令集漏洞发现的格式驱动方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-24 DOI: 10.1016/j.cose.2025.104811
Yongzhen Luo, Zhongkai Huang, Wenhui Duan, Liwei Wang, Bo Hou, Chenbing Qu, Chen Sun, Ziyang Wang
With the widespread application of Digital Signal Processors (DSPs) in critical areas, hidden instructions have become a significant threat to system security. Maliciously exploiting these instructions may lead to information leaks, data tampering, or system crashes. This paper proposed an efficient search method based on the instruction format to address the security issue of DSP hidden instructions. By establishing an instruction database, this method analyzes the instruction format, designs an efficient instruction generation strategy, and applies precise disassembly techniques, significantly reducing the instruction search space and effectively identifying hidden instructions. Experiments conducted on TI's DSP processors TMS320C6678 and TMS320F28335 have shown that this method successfully identified hidden instructions, demonstrating its effectiveness and practicality. The test results indicate that hidden instructions could lead to unexpected modifications of microprocessor registers or memory data, system resets, or even system crashes, exposing potential security risks in the DSP instruction set. The findings of this study offer an efficient search approach for hidden instructions and demonstrate the critical need for comprehensive security evaluation of DSP instruction sets in safety-critical applications.
随着数字信号处理器(dsp)在关键领域的广泛应用,隐藏指令已成为威胁系统安全的重大问题。恶意利用这些指令可能导致信息泄露、数据篡改或系统崩溃。针对DSP隐藏指令的安全性问题,提出了一种基于指令格式的高效搜索方法。该方法通过建立指令数据库,对指令格式进行分析,设计高效的指令生成策略,并采用精确的拆卸技术,显著减少指令搜索空间,有效识别隐藏指令。在TI公司的DSP处理器TMS320C6678和TMS320F28335上进行的实验表明,该方法成功地识别了隐藏指令,证明了该方法的有效性和实用性。测试结果表明,隐藏指令可能导致微处理器寄存器或内存数据的意外修改,系统复位,甚至系统崩溃,暴露出DSP指令集中潜在的安全风险。本研究的结果为隐藏指令提供了一种有效的搜索方法,并证明了在安全关键应用中对DSP指令集进行综合安全评估的迫切需要。
{"title":"Uncovering hidden threats: A format-driven approach to dsp instruction set vulnerability discovery","authors":"Yongzhen Luo,&nbsp;Zhongkai Huang,&nbsp;Wenhui Duan,&nbsp;Liwei Wang,&nbsp;Bo Hou,&nbsp;Chenbing Qu,&nbsp;Chen Sun,&nbsp;Ziyang Wang","doi":"10.1016/j.cose.2025.104811","DOIUrl":"10.1016/j.cose.2025.104811","url":null,"abstract":"<div><div>With the widespread application of Digital Signal Processors (DSPs) in critical areas, hidden instructions have become a significant threat to system security. Maliciously exploiting these instructions may lead to information leaks, data tampering, or system crashes. This paper proposed an efficient search method based on the instruction format to address the security issue of DSP hidden instructions. By establishing an instruction database, this method analyzes the instruction format, designs an efficient instruction generation strategy, and applies precise disassembly techniques, significantly reducing the instruction search space and effectively identifying hidden instructions. Experiments conducted on TI's DSP processors TMS320C6678 and TMS320F28335 have shown that this method successfully identified hidden instructions, demonstrating its effectiveness and practicality. The test results indicate that hidden instructions could lead to unexpected modifications of microprocessor registers or memory data, system resets, or even system crashes, exposing potential security risks in the DSP instruction set. The findings of this study offer an efficient search approach for hidden instructions and demonstrate the critical need for comprehensive security evaluation of DSP instruction sets in safety-critical applications.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104811"},"PeriodicalIF":5.4,"publicationDate":"2025-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bag of words model for efficient discovery of roles in access control systems 一种用于访问控制系统中角色有效发现的词包模型
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1016/j.cose.2025.104808
Carlo Blundo , Stelvio Cimato
The popularity of the Role-based Access Control (RBAC) model is determined by its flexibility and its adaptability in different contexts, easing the enforcement and the management of security policy. In some cases, different kinds of (cardinality) constraints are considered to adjust and adapt roles and their assignment to best represent the organization’s security policy.
However, the process of role mining, whether based on an organizational scenario or on existing permission assignments, is a hard task, since the problem shows NP-hard computational complexity and in case of frequent policy updates, the dynamic adaptation of the roles can be challenging. Then, the only possibility of producing an RBAC model compliant with the security policy is to resort to heuristics, which may return an approximation of the optimal solution.
In this paper, we propose an innovative approach to explore the space of the solution based on the bag of word value, which is commonly deployed in the field of document representation and knowledge extraction. We propose different heuristics and validate our approach reporting the results of the application to standard datasets, and providing an evaluation under different metrics and indicators. We show that our technique returns improved results and provides an alternative way to produce valid solutions for constrained RBAC.
基于角色的访问控制(Role-based Access Control, RBAC)模型受欢迎的原因在于其灵活性和对不同环境的适应性,简化了安全策略的实施和管理。在某些情况下,考虑不同类型的(基数)约束来调整和调整角色及其分配,以最好地表示组织的安全策略。然而,角色挖掘的过程,无论是基于组织场景还是基于现有的权限分配,都是一项艰巨的任务,因为问题显示出NP-hard计算复杂性,并且在频繁的策略更新情况下,角色的动态适应可能具有挑战性。然后,生成符合安全策略的RBAC模型的唯一可能性是求助于启发式,它可能返回最优解决方案的近似值。在本文中,我们提出了一种基于词值袋的创新方法来探索解决方案的空间,这种方法通常用于文档表示和知识提取领域。我们提出了不同的启发式方法,并验证了我们的方法,将应用程序的结果报告到标准数据集,并在不同的度量和指标下提供评估。我们表明,我们的技术返回改进的结果,并提供了一种替代方法来生成约束RBAC的有效解决方案。
{"title":"A bag of words model for efficient discovery of roles in access control systems","authors":"Carlo Blundo ,&nbsp;Stelvio Cimato","doi":"10.1016/j.cose.2025.104808","DOIUrl":"10.1016/j.cose.2025.104808","url":null,"abstract":"<div><div>The popularity of the Role-based Access Control (RBAC) model is determined by its flexibility and its adaptability in different contexts, easing the enforcement and the management of security policy. In some cases, different kinds of (cardinality) constraints are considered to adjust and adapt roles and their assignment to best represent the organization’s security policy.</div><div>However, the process of role mining, whether based on an organizational scenario or on existing permission assignments, is a hard task, since the problem shows NP-hard computational complexity and in case of frequent policy updates, the dynamic adaptation of the roles can be challenging. Then, the only possibility of producing an RBAC model compliant with the security policy is to resort to heuristics, which may return an approximation of the optimal solution.</div><div>In this paper, we propose an innovative approach to explore the space of the solution based on the bag of word value, which is commonly deployed in the field of document representation and knowledge extraction. We propose different heuristics and validate our approach reporting the results of the application to standard datasets, and providing an evaluation under different metrics and indicators. We show that our technique returns improved results and provides an alternative way to produce valid solutions for constrained RBAC.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104808"},"PeriodicalIF":5.4,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BGF-DR: bidirectional greybox fuzzing for DNS resolver vulnerability discovery BGF-DR:用于DNS解析器漏洞发现的双向灰盒模糊测试
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1016/j.cose.2025.104809
Jie Ying , Jun Li , Ruoxi Chen , Hongxin Su , Tiantian Zhu
The Domain Name System (DNS) represents a vital infrastructure component of the Internet, within which DNS resolvers constitute the core element of this system. Specifically, DNS resolvers mediate between DNS clients and DNS nameservers as the cache. However, existing tools face significant limitations in effectively identifying resolver vulnerabilities, presenting three primary challenges. First, DNS resolver implementations are complex and stateful, resulting in huge input space. Second, DNS resolver vulnerabilities typically manifest as semantic bugs leading to erroneous responses, making them difficult to detect through conventional oracle-based validation. Finally, most DNS resolver vulnerabilities only become apparent under bidirectional information sequences. This paper presents BGF-DR, a bidirectional greybox fuzzing system that addresses the aforementioned challenges to achieve efficient vulnerability discovery for DNS resolvers. First, BGF-DR leverages both branch coverage and state coverage information to explore the DNS resolver input space more rapidly and comprehensively. Second, BGF-DR employs differential testing and heuristic rules to identify test cases that trigger vulnerabilities. Finally, BGF-DR performs mutation-based case generation on both client-query and nameserver-response to enhance the efficiency of vulnerability discovery. We evaluated BGF-DR on 4 DNS resolvers and identified 6 vulnerabilities that could lead to cache poisoning, resource consumption, and crash attacks.
域名系统(DNS)代表了互联网的重要基础设施组成部分,其中DNS解析器构成了该系统的核心元素。具体来说,DNS解析器作为缓存在DNS客户端和DNS名称服务器之间进行中介。然而,现有的工具在有效地识别解析器漏洞方面面临着很大的限制,提出了三个主要挑战。首先,DNS解析器实现复杂且有状态,导致巨大的输入空间。其次,DNS解析器漏洞通常表现为导致错误响应的语义错误,这使得它们难以通过传统的基于oracle的验证来检测。最后,大多数DNS解析器漏洞只有在双向信息序列下才会显现出来。本文提出了BGF-DR,一种双向灰盒模糊测试系统,解决了上述挑战,实现了DNS解析器的有效漏洞发现。首先,BGF-DR利用分支覆盖和状态覆盖信息,更快速、更全面地探索DNS解析器输入空间。其次,BGF-DR采用差分测试和启发式规则来识别触发漏洞的测试用例。最后,BGF-DR在客户端查询和名称服务器响应上执行基于突变的案例生成,以提高漏洞发现效率。我们在4个DNS解析器上评估了BGF-DR,并确定了6个可能导致缓存中毒、资源消耗和崩溃攻击的漏洞。
{"title":"BGF-DR: bidirectional greybox fuzzing for DNS resolver vulnerability discovery","authors":"Jie Ying ,&nbsp;Jun Li ,&nbsp;Ruoxi Chen ,&nbsp;Hongxin Su ,&nbsp;Tiantian Zhu","doi":"10.1016/j.cose.2025.104809","DOIUrl":"10.1016/j.cose.2025.104809","url":null,"abstract":"<div><div>The Domain Name System (DNS) represents a vital infrastructure component of the Internet, within which DNS resolvers constitute the core element of this system. Specifically, DNS resolvers mediate between DNS clients and DNS nameservers as the cache. However, existing tools face significant limitations in effectively identifying resolver vulnerabilities, presenting three primary challenges. First, DNS resolver implementations are complex and stateful, resulting in huge input space. Second, DNS resolver vulnerabilities typically manifest as semantic bugs leading to erroneous responses, making them difficult to detect through conventional oracle-based validation. Finally, most DNS resolver vulnerabilities only become apparent under bidirectional information sequences. This paper presents <span>BGF-DR</span>, a bidirectional greybox fuzzing system that addresses the aforementioned challenges to achieve efficient vulnerability discovery for DNS resolvers. First, <span>BGF-DR</span> leverages both branch coverage and state coverage information to explore the DNS resolver input space more rapidly and comprehensively. Second, <span>BGF-DR</span> employs differential testing and heuristic rules to identify test cases that trigger vulnerabilities. Finally, <span>BGF-DR</span> performs mutation-based case generation on both client-query and nameserver-response to enhance the efficiency of vulnerability discovery. We evaluated <span>BGF-DR</span> on 4 DNS resolvers and identified 6 vulnerabilities that could lead to cache poisoning, resource consumption, and crash attacks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104809"},"PeriodicalIF":5.4,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A large-scale measurement study of region-based web access restrictions: The case of China 基于区域的网络访问限制的大规模测量研究:以中国为例
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1016/j.cose.2025.104807
Yuying Du , Jiahao Cao , Junrui Xu , YangYang Wang , Renjie Xie , Jiang Li , Changliyun Liu , Mingwei Xu
The rise of the Splinternet is reshaping the global digital landscape by fragmenting the Internet along political, commercial, and technological lines. Geoblocking, a practice where access to content is restricted based on geographic location, exemplifies this trend. Despite existing studies on geoblocking in specific contexts, such as Russia and Cuba, a systematic understanding of geoblocking policies targeting users in China has not been sufficiently explored. To bridge this gap, we present GeoWatch to conduct the first large-scale measurement study of geoblocking practices towards China. It employs advanced domain mining techniques and globally distributed vantage points to identify geoblocking websites. We test 97.78 million domains, which represents the largest domain set ever used in geoblocking research. Our comprehensive analysis reveals widespread geoblocking towards China, identifying 4.54 million geoblocking domains across 196 countries and regions. These findings highlight the real-world factors influencing geoblocking practices and offer valuable insights into its scope and impact, with a particular focus on China as a case study.
Splinternet的崛起正在重塑全球数字格局,它将互联网从政治、商业和技术等方面分割开来。地理封锁,一种基于地理位置限制访问内容的做法,就是这种趋势的例证。尽管已有针对俄罗斯和古巴等特定背景的地理封锁研究,但对针对中国用户的地理封锁政策的系统理解尚未得到充分探索。为了弥补这一差距,我们提出GeoWatch对中国的地理阻塞实践进行首次大规模测量研究。它采用先进的领域挖掘技术和全球分布的有利位置来识别地理屏蔽网站。我们测试了9778万个域,这是迄今为止用于地理阻塞研究的最大的域集。我们的综合分析揭示了针对中国的广泛地理封锁,在196个国家和地区确定了454万个地理封锁域。这些发现突出了影响地理封锁实践的现实因素,并对其范围和影响提供了有价值的见解,并特别关注中国作为案例研究。
{"title":"A large-scale measurement study of region-based web access restrictions: The case of China","authors":"Yuying Du ,&nbsp;Jiahao Cao ,&nbsp;Junrui Xu ,&nbsp;YangYang Wang ,&nbsp;Renjie Xie ,&nbsp;Jiang Li ,&nbsp;Changliyun Liu ,&nbsp;Mingwei Xu","doi":"10.1016/j.cose.2025.104807","DOIUrl":"10.1016/j.cose.2025.104807","url":null,"abstract":"<div><div>The rise of the Splinternet is reshaping the global digital landscape by fragmenting the Internet along political, commercial, and technological lines. Geoblocking, a practice where access to content is restricted based on geographic location, exemplifies this trend. Despite existing studies on geoblocking in specific contexts, such as Russia and Cuba, a systematic understanding of geoblocking policies targeting users in China has not been sufficiently explored. To bridge this gap, we present GeoWatch to conduct the first large-scale measurement study of geoblocking practices towards China. It employs advanced domain mining techniques and globally distributed vantage points to identify geoblocking websites. We test 97.78 million domains, which represents the largest domain set ever used in geoblocking research. Our comprehensive analysis reveals widespread geoblocking towards China, identifying 4.54 million geoblocking domains across 196 countries and regions. These findings highlight the real-world factors influencing geoblocking practices and offer valuable insights into its scope and impact, with a particular focus on China as a case study.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104807"},"PeriodicalIF":5.4,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing tactics, techniques, and procedures in the macOS threat landscape 描述macOS威胁环境中的战术、技术和程序
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-14 DOI: 10.1016/j.cose.2025.104806
Daniel Lastanao Miró , Javier Carrillo-Mondéjar , Ricarddo J. Rodríguez
As macOS systems increasingly become malware targets, understanding the tactics, techniques, and procedures (TTPs) used by adversaries is essential to improving defense strategies. This paper provides a systematic and detailed analysis of macOS malware using the MITRE ATT&CK framework, focusing on TTPs at key stages of the malware attack cycle. Leveraging a comprehensive dataset of 57,636 macOS malware samples collected between November 2006 and October 2024, we employ both static and dynamic analysis techniques to uncover patterns in adversary behavior. Our analysis, primarily based on static analysis techniques, offers a broad representation of macOS malware and highlights common characteristics across samples. While we only partially explore dynamic behaviors, we identify recurring patterns that align with specific TTPs in the MITRE ATT&CK framework, such as persistence and defense evasion. This mapping contributes to a more structured understanding of macOS threats and can help inform future detection and mitigation efforts.
随着macOS系统越来越多地成为恶意软件的目标,了解对手使用的战术、技术和程序(TTPs)对于改进防御策略至关重要。本文使用MITRE ATT&;CK框架对macOS恶意软件进行了系统和详细的分析,重点关注恶意软件攻击周期关键阶段的https。利用2006年11月至2024年10月收集的57,636个macOS恶意软件样本的综合数据集,我们采用静态和动态分析技术来揭示对手行为的模式。我们的分析主要基于静态分析技术,提供了macOS恶意软件的广泛代表,并突出了样本中的共同特征。虽然我们只对动态行为进行了部分探索,但我们确定了与MITRE att&ck框架中特定ttp相一致的重复模式,例如持久性和防御逃避。这种映射有助于更结构化地理解macOS威胁,并有助于为未来的检测和缓解工作提供信息。
{"title":"Characterizing tactics, techniques, and procedures in the macOS threat landscape","authors":"Daniel Lastanao Miró ,&nbsp;Javier Carrillo-Mondéjar ,&nbsp;Ricarddo J. Rodríguez","doi":"10.1016/j.cose.2025.104806","DOIUrl":"10.1016/j.cose.2025.104806","url":null,"abstract":"<div><div>As macOS systems increasingly become malware targets, understanding the tactics, techniques, and procedures (TTPs) used by adversaries is essential to improving defense strategies. This paper provides a systematic and detailed analysis of macOS malware using the MITRE ATT&amp;CK framework, focusing on TTPs at key stages of the malware attack cycle. Leveraging a comprehensive dataset of 57,636 macOS malware samples collected between November 2006 and October 2024, we employ both static and dynamic analysis techniques to uncover patterns in adversary behavior. Our analysis, primarily based on static analysis techniques, offers a broad representation of macOS malware and highlights common characteristics across samples. While we only partially explore dynamic behaviors, we identify recurring patterns that align with specific TTPs in the MITRE ATT&amp;CK framework, such as persistence and defense evasion. This mapping contributes to a more structured understanding of macOS threats and can help inform future detection and mitigation efforts.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104806"},"PeriodicalIF":5.4,"publicationDate":"2025-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A scenario-driven dynamic assessment model for data credibility 情景驱动的数据可信度动态评估模型
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-14 DOI: 10.1016/j.cose.2025.104805
Zechen Li , Guozhen Shi , Kai Chen
With the rapid development of information technology, data has become the core element driving decision-making, and the explosive growth of massive data makes data governance face new challenges. The diversity of data sources and the dynamic complexity of application scenarios lead to uneven data quality, so there is an urgent practical need to construct accurate and efficient data credibility assessment methods. Existing researches are mostly limited to a single domain, which leads to fragmentation of assessment standards and makes it difficult to adapt to the needs of multiple scenarios. To address the above problems, this study proposes a dynamic data credibility assessment paradigm with universal applicability. Specifically, firstly, we construct a four-layer data credibility assessment index system based on national standards and domain guidelines through UML modeling technology, which realizes quantifiable disassembly from the target layer to the index layer and ensures cross-scenario compatibility and scalability of the assessment framework. Second, a scenario-driven dynamic fuzzy assessment model is proposed, which consists of a scene adaptation layer, an index optimization layer, a weight dynamic allocation layer and a comprehensive assessment layer. The key assessment indexes are screened by the scene feature analysis and the improved analytical hierarchy process, and the combination of the subjective and objective weights and the modification model are combined to achieve a dynamic balance of the weights, and a fuzzy comprehensive evaluation model is introduced to deal with uncertainties in the assessment process, and finally get the comprehensive assessment grade of data credibility. Finally, this study applies the framework to a vehicle forensics scenario for case analysis and evaluates the method’s accuracy using both simulated and real-world data. The results demonstrate its effectiveness in complex scenarios.
随着信息技术的快速发展,数据已成为驱动决策的核心要素,海量数据的爆发式增长使数据治理面临新的挑战。数据源的多样性和应用场景的动态复杂性导致数据质量参差不齐,因此迫切需要构建准确高效的数据可信度评估方法。现有研究多局限于单一领域,导致评估标准碎片化,难以适应多场景的需求。针对上述问题,本研究提出了一种具有普遍适用性的动态数据可信度评估范式。具体而言,首先,基于国家标准和领域指南,通过UML建模技术构建了四层数据可信度评估指标体系,实现了从目标层到指标层的可量化分解,保证了评估框架的跨场景兼容性和可扩展性。其次,提出了场景驱动的动态模糊评价模型,该模型由场景适应层、指标优化层、权重动态分配层和综合评价层组成;通过场景特征分析和改进的层次分析法筛选关键评价指标,结合主客观权重组合和修正模型实现权重的动态平衡,并引入模糊综合评价模型处理评价过程中的不确定性,最终得到数据可信度的综合评价等级。最后,本研究将该框架应用于车辆取证场景进行案例分析,并使用模拟和真实数据评估该方法的准确性。结果证明了该方法在复杂场景下的有效性。
{"title":"A scenario-driven dynamic assessment model for data credibility","authors":"Zechen Li ,&nbsp;Guozhen Shi ,&nbsp;Kai Chen","doi":"10.1016/j.cose.2025.104805","DOIUrl":"10.1016/j.cose.2025.104805","url":null,"abstract":"<div><div>With the rapid development of information technology, data has become the core element driving decision-making, and the explosive growth of massive data makes data governance face new challenges. The diversity of data sources and the dynamic complexity of application scenarios lead to uneven data quality, so there is an urgent practical need to construct accurate and efficient data credibility assessment methods. Existing researches are mostly limited to a single domain, which leads to fragmentation of assessment standards and makes it difficult to adapt to the needs of multiple scenarios. To address the above problems, this study proposes a dynamic data credibility assessment paradigm with universal applicability. Specifically, firstly, we construct a four-layer data credibility assessment index system based on national standards and domain guidelines through UML modeling technology, which realizes quantifiable disassembly from the target layer to the index layer and ensures cross-scenario compatibility and scalability of the assessment framework. Second, a scenario-driven dynamic fuzzy assessment model is proposed, which consists of a scene adaptation layer, an index optimization layer, a weight dynamic allocation layer and a comprehensive assessment layer. The key assessment indexes are screened by the scene feature analysis and the improved analytical hierarchy process, and the combination of the subjective and objective weights and the modification model are combined to achieve a dynamic balance of the weights, and a fuzzy comprehensive evaluation model is introduced to deal with uncertainties in the assessment process, and finally get the comprehensive assessment grade of data credibility. Finally, this study applies the framework to a vehicle forensics scenario for case analysis and evaluates the method’s accuracy using both simulated and real-world data. The results demonstrate its effectiveness in complex scenarios.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104805"},"PeriodicalIF":5.4,"publicationDate":"2025-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1