首页 > 最新文献

Proceedings on Privacy Enhancing Technologies最新文献

英文 中文
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services 媒介即信息:安全信息应用程序如何向推送通知服务泄露敏感数据
Pub Date : 2024-07-15 DOI: 10.56553/popets-2024-0151
N. Samarin, Alex Sanchez, Trinity Chung, Akshay Dan Bhavish Juleemun, Conor Gilsenan, Nick Merrill, Joel Reardon, Serge Egelman
Like most modern software, secure messaging apps rely on thirdparty components to implement important app functionality. Although this practice reduces engineering costs, it also introduces the risk of inadvertent privacy breaches due to misconfiguration errors or incomplete documentation. Our research investigated secure messaging apps' usage of Google's Firebase Cloud Messaging (FCM) service to send push notifications to Android devices. We analyzed 21 popular secure messaging apps from the Google Play Store to determine what personal information these apps leak in the payload of push notifications sent via FCM. Of these apps, 11 leaked metadata, including user identifiers (10 apps), sender or recipient names (7 apps), and phone numbers (2 apps), while 4 apps leaked the actual message content. Furthermore, none of the data we observed being leaked to FCM was specifically disclosed in those apps' privacy disclosures. We also found several apps employing strategies to mitigate this privacy leakage to FCM, with varying levels of success. Of the strategies we identified, none appeared to be common, shared, or well-supported. We argue that this is fundamentally an economics problem: incentives need to be correctly aligned to motivate platforms and SDK providers to make their systems secure and private by default.
与大多数现代软件一样,安全信息应用程序依赖第三方组件来实现重要的应用程序功能。虽然这种做法降低了工程成本,但也带来了因配置错误或文档不完整而无意中泄露隐私的风险。我们的研究调查了安全消息应用程序使用谷歌的 Firebase 云消息(FCM)服务向安卓设备发送推送通知的情况。我们分析了 Google Play 商店中 21 款流行的安全信息应用程序,以确定这些应用程序在通过 FCM 发送的推送通知的有效载荷中泄露了哪些个人信息。在这些应用程序中,有 11 款泄露了元数据,包括用户标识符(10 款应用程序)、发件人或收件人姓名(7 款应用程序)和电话号码(2 款应用程序),而有 4 款应用程序泄露了实际信息内容。此外,我们观察到泄露给 FCM 的数据都没有在这些应用程序的隐私披露中明确披露。我们还发现,有几款应用程序采用了一些策略来减少向 FCM 泄露隐私的情况,但取得了不同程度的成功。在我们发现的这些策略中,没有一种似乎是通用的、共享的或得到广泛支持的。我们认为,这从根本上说是一个经济学问题:需要正确地调整激励机制,以激励平台和 SDK 提供商在默认情况下确保其系统的安全性和私密性。
{"title":"The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services","authors":"N. Samarin, Alex Sanchez, Trinity Chung, Akshay Dan Bhavish Juleemun, Conor Gilsenan, Nick Merrill, Joel Reardon, Serge Egelman","doi":"10.56553/popets-2024-0151","DOIUrl":"https://doi.org/10.56553/popets-2024-0151","url":null,"abstract":"Like most modern software, secure messaging apps rely on thirdparty components to implement important app functionality. Although this practice reduces engineering costs, it also introduces the risk of inadvertent privacy breaches due to misconfiguration errors or incomplete documentation. Our research investigated secure messaging apps' usage of Google's Firebase Cloud Messaging (FCM) service to send push notifications to Android devices. We analyzed 21 popular secure messaging apps from the Google Play Store to determine what personal information these apps leak in the payload of push notifications sent via FCM. Of these apps, 11 leaked metadata, including user identifiers (10 apps), sender or recipient names (7 apps), and phone numbers (2 apps), while 4 apps leaked the actual message content. Furthermore, none of the data we observed being leaked to FCM was specifically disclosed in those apps' privacy disclosures. We also found several apps employing strategies to mitigate this privacy leakage to FCM, with varying levels of success. Of the strategies we identified, none appeared to be common, shared, or well-supported. We argue that this is fundamentally an economics problem: incentives need to be correctly aligned to motivate platforms and SDK providers to make their systems secure and private by default.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"51 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141644702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Generation of Web Censorship Probe Lists 自动生成网络审查探测列表
Pub Date : 2024-07-11 DOI: 10.56553/popets-2024-0106
Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin
Domain probe lists---used to determine which URLs to probe for Web censorship---play a critical role in Internet censorship measurement studies. Indeed, the size and accuracy of the domain probe list limits the set of censored pages that can be detected; inaccurate lists can lead to an incomplete view of the censorship landscape or biased results. Previous efforts to generate domain probe lists have been mostly manual or crowdsourced. This approach is time-consuming, prone to errors, and does not scale well to the ever-changing censorship landscape. In this paper, we explore methods for automatically generating probe lists that are both comprehensive and up-to-date for Web censorship measurement. We start from an initial set of 139,957 unique URLs from various existing test lists consisting of pages from a variety of languages to generate new candidate pages. By analyzing content from these URLs (i.e., performing topic and keyword extraction), expanding these topics, and using them as a feed to search engines, our method produces 119,255 new URLs across 35,147 domains. We then test the new candidate pages by attempting to access each URL from servers in eleven different global locations over a span of four months to check for their connectivity and potential signs of censorship. Our measurements reveal that our method discovered over 1,400 domains---not present in the original dataset---we suspect to be blocked. In short, automatically updating probe lists is possible, and can help further automate censorship measurements at scale.
域名探查列表--用于确定对哪些 URL 进行网络审查探查--在互联网审查测量研究中起着至关重要的作用。事实上,域探针列表的大小和准确性限制了可检测到的审查网页集;不准确的列表可能导致对审查情况的不完整了解或结果的偏差。以往生成域名探针列表的方法大多是手动或众包的。这种方法耗时长、易出错,而且不能很好地适应不断变化的审查环境。在本文中,我们探讨了自动生成探测列表的方法,这些列表既全面又及时,可用于网络审查测量。我们从现有的各种测试列表中的 139,957 个唯一 URL 开始,生成新的候选页面。通过分析这些 URL 中的内容(即进行主题和关键词提取)、扩展这些主题并将其作为搜索引擎的馈送,我们的方法在 35,147 个域中生成了 119,255 个新 URL。然后,我们对新的候选网页进行测试,尝试在四个月的时间内从全球 11 个不同地点的服务器访问每个 URL,以检查它们的连接性和潜在的审查迹象。我们的测量结果表明,我们的方法发现了超过 1400 个域名--这些域名在原始数据集中并不存在--我们怀疑这些域名被屏蔽了。简而言之,自动更新探测列表是可行的,而且有助于进一步实现大规模审查测量的自动化。
{"title":"Automatic Generation of Web Censorship Probe Lists","authors":"Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin","doi":"10.56553/popets-2024-0106","DOIUrl":"https://doi.org/10.56553/popets-2024-0106","url":null,"abstract":"Domain probe lists---used to determine which URLs to probe for Web censorship---play a critical role in Internet censorship measurement studies. Indeed, the size and accuracy of the domain probe list limits the set of censored pages that can be detected; inaccurate lists can lead to an incomplete view of the censorship landscape or biased results. Previous efforts to generate domain probe lists have been mostly manual or crowdsourced. This approach is time-consuming, prone to errors, and does not scale well to the ever-changing censorship landscape. In this paper, we explore methods for automatically generating probe lists that are both comprehensive and up-to-date for Web censorship measurement. We start from an initial set of 139,957 unique URLs from various existing test lists consisting of pages from a variety of languages to generate new candidate pages. By analyzing content from these URLs (i.e., performing topic and keyword extraction), expanding these topics, and using them as a feed to search engines, our method produces 119,255 new URLs across 35,147 domains. We then test the new candidate pages by attempting to access each URL from servers in eleven different global locations over a span of four months to check for their connectivity and potential signs of censorship. Our measurements reveal that our method discovered over 1,400 domains---not present in the original dataset---we suspect to be blocked. In short, automatically updating probe lists is possible, and can help further automate censorship measurements at scale.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"55 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Design Opportunities for Family-Based Privacy Education in Informal Learning Spaces 探索非正规学习空间中基于家庭的隐私教育的设计机会
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0071
Lanjing Liu, Lan Gao, Nikita Soni, Yaxing Yao
Children face increasing privacy risks and the need to navigate complex choices, while privacy education is not sufficient due to limited education scope and family involvement. We advocate for informal learning spaces (ILS) as a pioneering channel for family-based privacy education, given their established role in holistic technology and digital literacy education, which specifically targets family groups. In this paper, we conducted an interview study with eight families to understand revealing current approaches to privacy education and engagement with ILS for family-based learning. Our findings highlight ILS’s transformative potential in family privacy education, considering existing practices and challenges. We discuss the design opportunities for family-based privacy education in ILS, covering goals, content, engagement, and experience design. These insights contribute to future research on family-based privacy education in ILS.
儿童面临越来越多的隐私风险,需要做出复杂的选择,而由于教育范围和家庭参与有限,隐私教育还不够充分。鉴于非正式学习空间(ILS)在专门针对家庭群体的整体技术和数字素养教育中的既定角色,我们主张将其作为基于家庭的隐私教育的先驱渠道。在本文中,我们对八个家庭进行了访谈研究,以了解他们目前的隐私教育方法以及参与 ILS 家庭式学习的情况。考虑到现有的实践和挑战,我们的研究结果强调了 ILS 在家庭隐私教育中的变革潜力。我们讨论了 ILS 中基于家庭的隐私教育的设计机会,包括目标、内容、参与和体验设计。这些见解有助于未来在 ILS 中开展基于家庭的隐私教育研究。
{"title":"Exploring Design Opportunities for Family-Based Privacy Education in Informal Learning Spaces","authors":"Lanjing Liu, Lan Gao, Nikita Soni, Yaxing Yao","doi":"10.56553/popets-2024-0071","DOIUrl":"https://doi.org/10.56553/popets-2024-0071","url":null,"abstract":"Children face increasing privacy risks and the need to navigate complex choices, while privacy education is not sufficient due to limited education scope and family involvement. We advocate for informal learning spaces (ILS) as a pioneering channel for family-based privacy education, given their established role in holistic technology and digital literacy education, which specifically targets family groups. In this paper, we conducted an interview study with eight families to understand revealing current approaches to privacy education and engagement with ILS for family-based learning. Our findings highlight ILS’s transformative potential in family privacy education, considering existing practices and challenges. We discuss the design opportunities for family-based privacy education in ILS, covering goals, content, engagement, and experience design. These insights contribute to future research on family-based privacy education in ILS.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"31 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning GCL-Leak:针对图对比学习的链接成员推理攻击
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0073
Xiuling Wang, Wendy Hui Wang
Graph contrastive learning (GCL) has emerged as a successful method for self-supervised graph learning. It involves generating augmented views of a graph by augmenting its edges and aims to learn node embeddings that are invariant to graph augmentation. Despite its effectiveness, the potential privacy risks associated with GCL models have not been thoroughly explored. In this paper, we delve into the privacy vulnerability of GCL models through the lens of link membership inference attacks (LMIA). Specifically, we focus on the federated setting where the adversary has white-box access to the node embeddings of all the augmented views generated by the target GCL model. Designing such white-box LMIAs against GCL models presents a significant and unique challenge due to potential variations in link memberships among node pairs in the target graph and its augmented views. This variability renders members indistinguishable from non-members when relying solely on the similarity of their node embeddings in the augmented views. To address this challenge, our in-depth analysis reveals that the key distinguishing factor lies in the similarity of node embeddings within augmented views where the node pairs share identical link memberships as those in the training graph. However, this poses a second challenge, as information about whether a node pair has identical link membership in both the training graph and augmented views is only available during the attack training phase. This demands the attack classifier to handle the additional “identical-membership" information which is available only for training and not for testing. To overcome this challenge, we propose GCL-LEAK, the first link membership inference attack against GCL models. The key component of GCL-LEAK is a new attack classifier model designed under the “Learning Using Privileged Information (LUPI)” paradigm, where the privileged information of “same-membership” is encoded as part of the attack classifier's structure. Our extensive set of experiments on four representative GCL models showcases the effectiveness of GCL-LEAK. Additionally, we develop two defense mechanisms that introduce perturbation to the node embeddings. Our empirical evaluation demonstrates that both defense mechanisms significantly reduce attack accuracy while preserving the accuracy of GCL models.
图形对比学习(GCL)是一种成功的自我监督图形学习方法。它通过增强图的边来生成图的增强视图,旨在学习对图增强不变的节点嵌入。尽管 GCL 模型非常有效,但与之相关的潜在隐私风险尚未得到深入探讨。在本文中,我们将从链接成员推断攻击(LMIA)的角度深入探讨 GCL 模型的隐私漏洞。具体来说,我们将重点放在联合设置上,即对手可以白盒方式访问目标 GCL 模型生成的所有增强视图的节点嵌入。由于目标图及其增强视图中的节点对之间的链接成员关系可能存在变化,因此针对 GCL 模型设计这种白盒 LMIA 是一项重大而独特的挑战。如果仅仅依靠增强视图中节点嵌入的相似性,这种变化会使成员与非成员无法区分。为了应对这一挑战,我们进行了深入分析,发现关键的区分因素在于增强视图中节点嵌入的相似性,即节点对与训练图中的节点对共享相同的链接成员资格。不过,这也带来了第二个挑战,因为只有在攻击训练阶段才能获得有关节点对在训练图和增强视图中是否具有相同链接成员资格的信息。这就要求攻击分类器处理额外的 "相同成员 "信息,因为这些信息只能用于训练而不能用于测试。为了克服这一挑战,我们提出了 GCL-LEAK,这是第一个针对 GCL 模型的链接成员推理攻击。GCL-LEAK 的关键部分是根据 "使用特权信息学习(LUPI)"范式设计的一个新的攻击分类器模型,其中 "相同成员 "的特权信息被编码为攻击分类器结构的一部分。我们在四个具有代表性的 GCL 模型上进行了大量实验,展示了 GCL-LEAK 的有效性。此外,我们还开发了两种对节点嵌入引入扰动的防御机制。我们的实证评估表明,这两种防御机制都能在保持 GCL 模型准确性的同时显著降低攻击准确性。
{"title":"GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning","authors":"Xiuling Wang, Wendy Hui Wang","doi":"10.56553/popets-2024-0073","DOIUrl":"https://doi.org/10.56553/popets-2024-0073","url":null,"abstract":"Graph contrastive learning (GCL) has emerged as a successful method for self-supervised graph learning. It involves generating augmented views of a graph by augmenting its edges and aims to learn node embeddings that are invariant to graph augmentation. Despite its effectiveness, the potential privacy risks associated with GCL models have not been thoroughly explored. In this paper, we delve into the privacy vulnerability of GCL models through the lens of link membership inference attacks (LMIA). Specifically, we focus on the federated setting where the adversary has white-box access to the node embeddings of all the augmented views generated by the target GCL model. Designing such white-box LMIAs against GCL models presents a significant and unique challenge due to potential variations in link memberships among node pairs in the target graph and its augmented views. This variability renders members indistinguishable from non-members when relying solely on the similarity of their node embeddings in the augmented views. To address this challenge, our in-depth analysis reveals that the key distinguishing factor lies in the similarity of node embeddings within augmented views where the node pairs share identical link memberships as those in the training graph. However, this poses a second challenge, as information about whether a node pair has identical link membership in both the training graph and augmented views is only available during the attack training phase. This demands the attack classifier to handle the additional “identical-membership\" information which is available only for training and not for testing. To overcome this challenge, we propose GCL-LEAK, the first link membership inference attack against GCL models. The key component of GCL-LEAK is a new attack classifier model designed under the “Learning Using Privileged Information (LUPI)” paradigm, where the privileged information of “same-membership” is encoded as part of the attack classifier's structure. Our extensive set of experiments on four representative GCL models showcases the effectiveness of GCL-LEAK. Additionally, we develop two defense mechanisms that introduce perturbation to the node embeddings. Our empirical evaluation demonstrates that both defense mechanisms significantly reduce attack accuracy while preserving the accuracy of GCL models.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"74 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141697701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection 请解除对我的跟踪:了解使用蓝牙跟踪器的跟踪行为并实现反跟踪保护的民主化
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0082
Alexander Heinrich, Leon Würsching, Matthias Hollick
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign purposes, such as unwanted location tracking. This study probes deeper into this issue, focusing on the widespread use of these devices for stalking. Following a dual approach, we analyzed user data from a widely used tracking detection app (over 200,000 active installations) and conducted a comprehensive online survey (N=5,253). Our data analysis reveals a significant prevalence of trackers from major brands such as Apple, Tile, and Samsung. The user data also shows that the app sends about 1,400 alarms daily for unwanted tracking. Survey insights reveal that 44.28% of stalking victims had been subjected to location tracking, with cars emerging as the most common hideout for misused trackers, followed by backpacks and purses. These findings underscore the urgency for more robust solutions. Despite ongoing efforts by manufacturers and researchers, the misuse of Bluetooth trackers remains a significant concern. We advocate for developing more effective tracking detection mechanisms integrated into smartphones by default and creating supportive measures for individuals without smartphone access.
蓝牙跟踪器虽然是为定位丢失物品而设计的,但却越来越多地被用于恶意目的,例如不受欢迎的位置跟踪。本研究深入探讨了这一问题,重点关注这些设备被广泛用于跟踪的情况。我们采用双管齐下的方法,分析了一款广泛使用的跟踪检测应用程序的用户数据(超过 200,000 个有效安装),并进行了一项全面的在线调查(N=5,253)。我们的数据分析显示,苹果、Tile 和三星等主要品牌的跟踪器非常普遍。用户数据还显示,该应用每天发出约 1,400 次不必要的跟踪警报。调查显示,44.28% 的跟踪受害者受到过定位跟踪,其中汽车是跟踪器最常见的藏身之处,其次是背包和钱包。这些调查结果表明,迫切需要更强大的解决方案。尽管制造商和研究人员一直在努力,但蓝牙跟踪器的滥用仍是一个重大问题。我们主张开发更有效的追踪检测机制,将其默认集成到智能手机中,并为无法使用智能手机的个人制定支持措施。
{"title":"Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection","authors":"Alexander Heinrich, Leon Würsching, Matthias Hollick","doi":"10.56553/popets-2024-0082","DOIUrl":"https://doi.org/10.56553/popets-2024-0082","url":null,"abstract":"While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign purposes, such as unwanted location tracking. This study probes deeper into this issue, focusing on the widespread use of these devices for stalking. Following a dual approach, we analyzed user data from a widely used tracking detection app (over 200,000 active installations) and conducted a comprehensive online survey (N=5,253). Our data analysis reveals a significant prevalence of trackers from major brands such as Apple, Tile, and Samsung. The user data also shows that the app sends about 1,400 alarms daily for unwanted tracking. Survey insights reveal that 44.28% of stalking victims had been subjected to location tracking, with cars emerging as the most common hideout for misused trackers, followed by backpacks and purses. These findings underscore the urgency for more robust solutions. Despite ongoing efforts by manufacturers and researchers, the misuse of Bluetooth trackers remains a significant concern. We advocate for developing more effective tracking detection mechanisms integrated into smartphones by default and creating supportive measures for individuals without smartphone access.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"42 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generational Differences in Understandings of Privacy Terminology 对隐私术语理解的代际差异
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0094
Charlotte Moremen, Jordan Hoogsteden, Eleanor Birrell
Prior work has consistently found that people have miscomprehensions and misunderstandings about technical terms. However, that work has exclusively studied general populations, usually recruited online. This work investigates the relationship between generational cohorts and their understandings of privacy terms, specifically cohorts of elementary school children (aged 10-11), young adults (aged 18-23), and retired adults (aged 73-92), all recruited offline. We surveyed participants about their understanding of and confidence with technical terms that commonly appear in privacy policies. We then moderated a post-survey focus group with each generational cohort in which participants discussed their reactions to the actual definitions along with their experience with technical privacy terms. We found that young adults had better understandings of technical terms than the other generations, despite all generations reporting being regular Internet users. Participants across all generational cohorts discussed themes of confusion and frustration with technical terms, and older adults particularly reported a sense of being left behind. Our results reinforce the need for improvement in the presentation of information about data use practices. Our results also demonstrate the need for more focused research and attention on the youngest and oldest members of society and their use of the Internet and technology.
以往的研究一直发现,人们对专业术语存在误解和误解。不过,这些研究只针对普通人群,通常是在网上招募的。本研究调查了代际群体与他们对隐私术语的理解之间的关系,特别是小学生(10-11 岁)、年轻成年人(18-23 岁)和退休成年人(73-92 岁)群体,这些群体都是离线招募的。我们调查了参与者对隐私政策中常见技术术语的理解和信心。然后,我们主持了一个调查后的焦点小组,每个年龄组的参与者都在小组中讨论了他们对实际定义的反应以及他们在隐私技术术语方面的经验。我们发现,尽管各代人都表示自己是互联网的常客,但年轻人对技术术语的理解要好于其他代人。各代人都讨论了对技术术语感到困惑和沮丧的主题,老年人尤其表示有一种被抛在后面的感觉。我们的调查结果表明,在介绍数据使用方法方面需要改进。我们的研究结果还表明,有必要对社会中最年轻和最年长的成员及其使用互联网和技术的情况进行更集中的研究和关注。
{"title":"Generational Differences in Understandings of Privacy Terminology","authors":"Charlotte Moremen, Jordan Hoogsteden, Eleanor Birrell","doi":"10.56553/popets-2024-0094","DOIUrl":"https://doi.org/10.56553/popets-2024-0094","url":null,"abstract":"Prior work has consistently found that people have miscomprehensions and misunderstandings about technical terms. However, that work has exclusively studied general populations, usually recruited online. This work investigates the relationship between generational cohorts and their understandings of privacy terms, specifically cohorts of elementary school children (aged 10-11), young adults (aged 18-23), and retired adults (aged 73-92), all recruited offline. We surveyed participants about their understanding of and confidence with technical terms that commonly appear in privacy policies. We then moderated a post-survey focus group with each generational cohort in which participants discussed their reactions to the actual definitions along with their experience with technical privacy terms. We found that young adults had better understandings of technical terms than the other generations, despite all generations reporting being regular Internet users. Participants across all generational cohorts discussed themes of confusion and frustration with technical terms, and older adults particularly reported a sense of being left behind. Our results reinforce the need for improvement in the presentation of information about data use practices. Our results also demonstrate the need for more focused research and attention on the youngest and oldest members of society and their use of the Internet and technology.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"45 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup FlashSwift:可配置、更高效、设置透明的测距仪
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0067
Nan Wang, Dongxi Liu
Bit-decomposition-based zero-knowledge range proofs in the discrete logarithm (DLOG) setting with a transparent setup, e.g., Bulletproof (IEEE S&P 18), Flashproof (ASIACRYPT 22), and SwiftRange (IEEE S&P 24), have garnered widespread popularity across various privacy-enhancing applications. These proofs aim to prove that a committed value falls within the non-negative range [0, 2^N-1] without revealing it, where N represents the bit length of the range. Despite their prevalence, the current implementations still suffer from suboptimal performance. Some exhibit reduced communication costs at the expense of increased computational costs while others experience the opposite. Presently, users are compelled to utilize these proofs in scenarios demanding stringent requirements for both communication and computation efficiency.In this paper, we introduce, FlashSwift, a stronger DLOG-based logarithmic-sized alternative. It stands out for its greater shortness and significantly enhanced computational efficiency compared with the cutting-edge logarithmic-sized ones for the most common ranges where N is no more than 64. It is developed by integrating the techniques from Flashproof and SwiftRange without using a trusted setup. The substantial efficiency gains stem from our dedicated efforts in overcoming the inherent incompatibility barrier between the two techniques. Specifically, when N=64, our proof achieves the same size as Bulletproof and exhibits 1.1 times communication efficiency of SwiftRange. More importantly, compared with the two, it achieves 2.3 times and 1.65 times proving efficiency, and 3.2 times and 1.7 times verification efficiency, respectively. At the time of writing, our proof also creates two new records of the smallest proof sizes, 289 bytes and 417 bytes, for 8-bit and 16-bit ranges among all the bit-decomposition-based ones without requiring trusted setups. Moreover, to the best of our knowledge, it is the first configurable range proof that is adaptable to various scenarios with different specifications, where the configurability allows to trade off communication efficiency for computational efficiency. In addition, we offer a bonus feature: FlashSwift supports the aggregation of multiple single proofs for efficiency improvement. Finally, we provide comprehensive performance benchmarks against the state-of-the-art ones to demonstrate its practicality.
在离散对数(DLOG)设置中,基于比特分解的零知识范围证明具有透明的设置,例如 Bulletproof(IEEE S&P 18)、Flashproof(ASIACRYPT 22)和 SwiftRange(IEEE S&P 24),在各种隐私增强应用中获得了广泛的普及。这些证明旨在证明承诺值在非负范围[0, 2^N-1]内而不会泄露,其中 N 代表范围的比特长度。尽管这种方法非常普遍,但目前的实现方法仍然存在性能不理想的问题。有些实现方式降低了通信成本,但却增加了计算成本,而另一些实现方式则恰恰相反。目前,用户不得不在对通信和计算效率都有严格要求的场景中使用这些证明。在本文中,我们介绍了 FlashSwift,一种更强大的基于 DLOG 的对数大小替代方案。在 N 不超过 64 的最常见范围内,与最先进的对数大小算法相比,它具有更短的时间和更高的计算效率。它是通过整合 Flashproof 和 SwiftRange 的技术而开发的,无需使用可信设置。效率的大幅提升源于我们为克服这两种技术之间固有的不兼容障碍所做的不懈努力。具体来说,当 N=64 时,我们的证明大小与 Bulletproof 相同,通信效率是 SwiftRange 的 1.1 倍。更重要的是,两者相比,我们的证明效率分别提高了 2.3 倍和 1.65 倍,验证效率分别提高了 3.2 倍和 1.7 倍。在撰写本文时,我们的证明还创造了两项新纪录:在所有基于比特分解的证明中,8 位和 16 位范围的证明大小最小,分别为 289 字节和 417 字节,且无需可信设置。此外,据我们所知,这是第一个可配置的范围证明,可适应不同规格的各种场景,可配置性允许在通信效率和计算效率之间进行权衡。此外,我们还提供了一项额外功能:FlashSwift 支持多个单一证明的聚合,以提高效率。最后,我们提供了全面的性能基准,与最先进的基准进行对比,以证明其实用性。
{"title":"FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup","authors":"Nan Wang, Dongxi Liu","doi":"10.56553/popets-2024-0067","DOIUrl":"https://doi.org/10.56553/popets-2024-0067","url":null,"abstract":"Bit-decomposition-based zero-knowledge range proofs in the discrete logarithm (DLOG) setting with a transparent setup, e.g., Bulletproof (IEEE S&P 18), Flashproof (ASIACRYPT 22), and SwiftRange (IEEE S&P 24), have garnered widespread popularity across various privacy-enhancing applications. These proofs aim to prove that a committed value falls within the non-negative range [0, 2^N-1] without revealing it, where N represents the bit length of the range. Despite their prevalence, the current implementations still suffer from suboptimal performance. Some exhibit reduced communication costs at the expense of increased computational costs while others experience the opposite. Presently, users are compelled to utilize these proofs in scenarios demanding stringent requirements for both communication and computation efficiency.\u0000\u0000In this paper, we introduce, FlashSwift, a stronger DLOG-based logarithmic-sized alternative. It stands out for its greater shortness and significantly enhanced computational efficiency compared with the cutting-edge logarithmic-sized ones for the most common ranges where N is no more than 64. It is developed by integrating the techniques from Flashproof and SwiftRange without using a trusted setup. The substantial efficiency gains stem from our dedicated efforts in overcoming the inherent incompatibility barrier between the two techniques. Specifically, when N=64, our proof achieves the same size as Bulletproof and exhibits 1.1 times communication efficiency of SwiftRange. More importantly, compared with the two, it achieves 2.3 times and 1.65 times proving efficiency, and 3.2 times and 1.7 times verification efficiency, respectively. At the time of writing, our proof also creates two new records of the smallest proof sizes, 289 bytes and 417 bytes, for 8-bit and 16-bit ranges among all the bit-decomposition-based ones without requiring trusted setups. Moreover, to the best of our knowledge, it is the first configurable range proof that is adaptable to various scenarios with different specifications, where the configurability allows to trade off communication efficiency for computational efficiency. In addition, we offer a bonus feature: FlashSwift supports the aggregation of multiple single proofs for efficiency improvement. Finally, we provide comprehensive performance benchmarks against the state-of-the-art ones to demonstrate its practicality.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"81 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141701583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking Connection Tracking Frameworks as used by Virtual Private Networks 攻击虚拟专用网络使用的连接跟踪框架
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0070
Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall
VPNs (Virtual Private Networks) have become an essential privacy-enhancing technology, particularly for at-risk users like dissidents, journalists, NGOs, and others vulnerable to targeted threats. While previous research investigating VPN security has focused on cryptographic strength or traffic leakages, there remains a gap in understanding how lower-level primitives fundamental to VPN operations, like connection tracking, might undermine the security and privacy that VPNs are intended to provide.In this paper, we examine the connection tracking frameworks used in common operating systems, identifying a novel exploit primitive that we refer to as the port shadow. We use the port shadow to build four attacks against VPNs that allow an attacker to intercept and redirect encrypted traffic, de-anonymize a VPN peer, or even portscan a VPN peer behind the VPN server. We build a formal model of modern connection tracking frameworks and identify that the root cause of the port shadow lies in five shared, limited resources. Through bounded model checking, we propose and verify six mitigations in terms of enforcing process isolation. We hope our work leads to more attention on the security aspects of lower-level systems and the implications of integrating them into security-critical applications.
VPN(虚拟专用网络)已成为一项重要的隐私增强技术,特别是对于持不同政见者、记者、非政府组织等高危用户以及其他易受定向威胁的用户而言。虽然以前对 VPN 安全性的研究主要集中在加密强度或流量泄漏方面,但在了解 VPN 运行的基本低级基元(如连接跟踪)如何破坏 VPN 所要提供的安全性和隐私性方面仍存在差距。我们利用端口阴影构建了四种针对 VPN 的攻击,允许攻击者拦截和重定向加密流量、对 VPN 对等网络进行去匿名化,甚至对 VPN 服务器背后的 VPN 对等网络进行端口扫描。我们建立了现代连接跟踪框架的正式模型,并发现端口阴影的根源在于五个共享的有限资源。通过有界模型检查,我们提出并验证了在执行进程隔离方面的六种缓解措施。我们希望我们的工作能让更多人关注底层系统的安全问题,以及将它们集成到安全关键型应用中的影响。
{"title":"Attacking Connection Tracking Frameworks as used by Virtual Private Networks","authors":"Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall","doi":"10.56553/popets-2024-0070","DOIUrl":"https://doi.org/10.56553/popets-2024-0070","url":null,"abstract":"VPNs (Virtual Private Networks) have become an essential privacy-enhancing technology, particularly for at-risk users like dissidents, journalists, NGOs, and others vulnerable to targeted threats. While previous research investigating VPN security has focused on cryptographic strength or traffic leakages, there remains a gap in understanding how lower-level primitives fundamental to VPN operations, like connection tracking, might undermine the security and privacy that VPNs are intended to provide.\u0000In this paper, we examine the connection tracking frameworks used in common operating systems, identifying a novel exploit primitive that we refer to as the port shadow. We use the port shadow to build four attacks against VPNs that allow an attacker to intercept and redirect encrypted traffic, de-anonymize a VPN peer, or even portscan a VPN peer behind the VPN server. We build a formal model of modern connection tracking frameworks and identify that the root cause of the port shadow lies in five shared, limited resources. Through bounded model checking, we propose and verify six mitigations in terms of enforcing process isolation. We hope our work leads to more attention on the security aspects of lower-level systems and the implications of integrating them into security-critical applications.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"18 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation 匿名化:医疗数据捐赠的分散式双层匿名性
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0069
Sarah Abdelwahab Gaballah, Lamya Abdullah, Mina Alishahi, Thanh Hoang Long Nguyen, Ephraim Zimmer, Max Mühlhäuser, Karola Marky
Medical data donation involves voluntarily sharing medical data with research institutions, which is crucial for advancing healthcare research. However, the sensitive nature of medical data poses privacy and security challenges. The primary concern is the risk of de-anonymization, where users can be linked to their donated data through background knowledge or communication metadata. In this paper, we introduce Anonify, a decentralized anonymity protocol offering strong user protection during data donation without reliance on a single entity. It achieves dual-level anonymity protection, covering both communication and data aspects by leveraging Distributed Point Functions, and incorporating k-anonymity and stratified sampling within a secret-sharing-based setting. Anonify ensures that the donated data is in a form that affords flexibility for researchers in their analyses. Our evaluation demonstrates the efficiency of Anonify in preserving privacy and optimizing data utility. Furthermore, the performance of machine learning algorithms on the anonymized datasets generated by the protocol shows high accuracy and precision.
医疗数据捐赠涉及自愿与研究机构共享医疗数据,这对推进医疗保健研究至关重要。然而,医疗数据的敏感性带来了隐私和安全方面的挑战。最主要的问题是去匿名化的风险,即用户可以通过背景知识或通信元数据与其捐赠的数据联系起来。在本文中,我们介绍了 Anonify,这是一种去中心化的匿名协议,可在数据捐赠期间提供强大的用户保护,而无需依赖单一实体。它利用分布式点函数实现了双层匿名保护,涵盖通信和数据两个方面,并在基于秘密共享的设置中纳入了 k 匿名性和分层抽样。Anonify 可确保捐赠数据的形式为研究人员的分析提供灵活性。我们的评估证明了 Anonify 在保护隐私和优化数据效用方面的效率。此外,该协议生成的匿名数据集上的机器学习算法的性能也显示出很高的准确性和精确度。
{"title":"Anonify: Decentralized Dual-level Anonymity for Medical Data Donation","authors":"Sarah Abdelwahab Gaballah, Lamya Abdullah, Mina Alishahi, Thanh Hoang Long Nguyen, Ephraim Zimmer, Max Mühlhäuser, Karola Marky","doi":"10.56553/popets-2024-0069","DOIUrl":"https://doi.org/10.56553/popets-2024-0069","url":null,"abstract":"Medical data donation involves voluntarily sharing medical data with research institutions, which is crucial for advancing healthcare research. However, the sensitive nature of medical data poses privacy and security challenges. The primary concern is the risk of de-anonymization, where users can be linked to their donated data through background knowledge or communication metadata. In this paper, we introduce Anonify, a decentralized anonymity protocol offering strong user protection during data donation without reliance on a single entity. It achieves dual-level anonymity protection, covering both communication and data aspects by leveraging Distributed Point Functions, and incorporating k-anonymity and stratified sampling within a secret-sharing-based setting. Anonify ensures that the donated data is in a form that affords flexibility for researchers in their analyses. Our evaluation demonstrates the efficiency of Anonify in preserving privacy and optimizing data utility. Furthermore, the performance of machine learning algorithms on the anonymized datasets generated by the protocol shows high accuracy and precision.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact Issuer-Hiding Authentication, Application to Anonymous Credential 紧凑型发行者隐藏验证,应用于匿名凭证
Pub Date : 2024-07-01 DOI: 10.56553/popets-2024-0097
Olivier Sanders, Jacques Traoré
Anonymous credentials are cryptographic mechanisms enabling users to authenticate themselves with a fine-grained control on the information they leak in the process. They have been the topic of countless papers which have improved the performance of such mechanisms or proposed new schemes able to prove ever-more complex statements about the attributes certified by those credentials. However, although these papers have studied in depth the problem of the information leaked by the credential and/or the attributes, almost all of them have surprisingly overlooked the information one may infer from the knowledge of the credential issuer. In this paper we address this problem by showing how one can efficiently hide the actual issuer of a credential within a set of potential issuers. The novelty of our work is that we do not resort to zero-knowledge proofs but instead we show how one can tweak Pointcheval-Sanders signatures to achieve this issuer-hiding property in a compact way. This results in an efficient anonymous credential system that indeed provides a complete control of the information leaked in the authentication process. Our construction is moreover modular and can then fit a wide spectrum of applications, notably for Self-Sovereign Identity (SSI) systems.
匿名凭证是一种加密机制,它使用户能够对自己进行身份验证,并对在此过程中泄露的信息进行精细控制。无数论文以匿名凭据为主题,改进了这类机制的性能,或提出了新的方案,能够证明这些凭据所认证的属性的更复杂的声明。然而,尽管这些论文深入研究了证书和/或属性泄露信息的问题,但几乎所有论文都出人意料地忽略了人们可能从证书颁发者的知识中推断出的信息。在本文中,我们通过展示如何在一组潜在签发人中有效地隐藏证书的实际签发人,来解决这个问题。我们工作的新颖之处在于,我们没有采用零知识证明,而是展示了如何调整 Pointcheval-Sanders 签名,以紧凑的方式实现这种发行人隐藏属性。这就产生了一个高效的匿名证书系统,它确实能完全控制认证过程中泄露的信息。此外,我们的结构是模块化的,可以适应广泛的应用,特别是主权身份(SSI)系统。
{"title":"Compact Issuer-Hiding Authentication, Application to Anonymous Credential","authors":"Olivier Sanders, Jacques Traoré","doi":"10.56553/popets-2024-0097","DOIUrl":"https://doi.org/10.56553/popets-2024-0097","url":null,"abstract":"Anonymous credentials are cryptographic mechanisms enabling users to authenticate themselves with a fine-grained control on the information they leak in the process. They have been the topic of countless papers which have improved the performance of such mechanisms or proposed new schemes able to prove ever-more complex statements about the attributes certified by those credentials. However, although these papers have studied in depth the problem of the information leaked by the credential and/or the attributes, almost all of them have surprisingly overlooked the information one may infer from the knowledge of the credential issuer. In this paper we address this problem by showing how one can efficiently hide the actual issuer of a credential within a set of potential issuers. The novelty of our work is that we do not resort to zero-knowledge proofs but instead we show how one can tweak Pointcheval-Sanders signatures to achieve this issuer-hiding property in a compact way. This results in an efficient anonymous credential system that indeed provides a complete control of the information leaked in the authentication process. Our construction is moreover modular and can then fit a wide spectrum of applications, notably for Self-Sovereign Identity (SSI) systems.","PeriodicalId":519525,"journal":{"name":"Proceedings on Privacy Enhancing Technologies","volume":"45 192","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141696491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings on Privacy Enhancing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1