首页 > 最新文献

ACM Transactions on Privacy and Security最新文献

英文 中文
ZPredict: ML-Based IPID Side-channel Measurements ZPredict:基于 ML 的 IPID 侧信道测量
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-20 DOI: 10.1145/3672560
Haya Schulmann, Shujie Zhao

Network reconnaissance and measurements play a central role in improving Internet security and are important for understanding the current deployments and trends. Such measurements often require coordination with the measured target. This limits the scalability and the coverage of the existing proposals. IP Identification (IPID) provides a side channel for remote measurements without requiring the targets to install agents or visit the measurement infrastructure. However, current IPID-based techniques have technical limitations due to their reliance on the idealistic assumption of stable IPID changes or prior knowledge, making them challenging to adopt for practical measurements.

In this work, we aim to tackle the limitations of existing techniques by introducing a novel approach: predictive analysis of IPID counter behavior. This involves utilizing a machine learning (ML) model to understand the historical patterns of IPID counter changes and predict future IPID values. To validate our approach, we implement six ML models and evaluate them on realistic IPID data collected from 4,698 Internet sources. Our evaluations demonstrate that among the six models, the GP (Gaussian Process) model has superior accuracy in tracking and predicting IPID values.

Using the GP-based predictive analysis, we implement a tool, called ZPredict, to infer various favorable information about target networks or servers. Our evaluation on a large dataset of public servers demonstrates its effectiveness in idle port scanning, measuring Russian censorship, and inferring Source Address Validation (SAV).

Our study methodology is ethical and was developed to mitigate any potential harm, taking into account the concerns associated with measurements.

网络侦察和测量在提高互联网安全方面发挥着核心作用,对于了解当前的部署和趋势也非常重要。此类测量通常需要与被测目标进行协调。这限制了现有建议的可扩展性和覆盖范围。IP 识别(IPID)为远程测量提供了一个侧通道,而不需要目标安装代理或访问测量基础设施。然而,目前基于 IPID 的技术存在技术局限性,因为它们依赖于稳定的 IPID 变化或先验知识的理想化假设,这使它们在实际测量中的应用面临挑战。在这项工作中,我们旨在通过引入一种新方法来解决现有技术的局限性:对 IPID 计数器行为进行预测分析。这包括利用机器学习(ML)模型来理解 IPID 计数器变化的历史模式,并预测未来的 IPID 值。为了验证我们的方法,我们实施了六个 ML 模型,并在从 4,698 个互联网来源收集的实际 IPID 数据上对它们进行了评估。评估结果表明,在六个模型中,GP(高斯过程)模型在跟踪和预测 IPID 值方面具有更高的准确性。利用基于 GP 的预测分析,我们开发了一款名为 ZPredict 的工具,用于推断目标网络或服务器的各种有利信息。我们在一个大型公共服务器数据集上进行的评估证明了它在空闲端口扫描、衡量俄罗斯审查制度和推断源地址验证(SAV)方面的有效性。我们的研究方法符合道德规范,在开发过程中考虑到了与测量相关的问题,以减少任何潜在危害。
{"title":"ZPredict: ML-Based IPID Side-channel Measurements","authors":"Haya Schulmann, Shujie Zhao","doi":"10.1145/3672560","DOIUrl":"https://doi.org/10.1145/3672560","url":null,"abstract":"<p>Network reconnaissance and measurements play a central role in improving Internet security and are important for understanding the current deployments and trends. Such measurements often require coordination with the measured target. This limits the scalability and the coverage of the existing proposals. IP Identification (IPID) provides a side channel for remote measurements without requiring the targets to install agents or visit the measurement infrastructure. However, current IPID-based techniques have technical limitations due to their reliance on the idealistic assumption of stable IPID changes or prior knowledge, making them challenging to adopt for practical measurements. </p><p>In this work, we aim to tackle the limitations of existing techniques by introducing a novel approach: predictive analysis of IPID counter behavior. This involves utilizing a machine learning (ML) model to understand the historical patterns of IPID counter changes and predict future IPID values. To validate our approach, we implement six ML models and evaluate them on realistic IPID data collected from 4,698 Internet sources. Our evaluations demonstrate that among the six models, the GP (Gaussian Process) model has superior accuracy in tracking and predicting IPID values. </p><p>Using the GP-based predictive analysis, we implement a tool, called ZPredict, to infer various favorable information about target networks or servers. Our evaluation on a large dataset of public servers demonstrates its effectiveness in idle port scanning, measuring Russian censorship, and inferring Source Address Validation (SAV). </p><p>Our study methodology is ethical and was developed to mitigate any potential harm, taking into account the concerns associated with measurements.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"170 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model ZTA-IoT:物联网系统零信任的新型架构及随之而来的使用控制模型
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-17 DOI: 10.1145/3671147
Safwa Ameer, Lopamudra Praharaj, Ravi Sandhu, Smriti Bhatt, Maanak Gupta

Recently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastructure (physical and virtual) and operational policies in place for IoT as a product of a ZT architecture plan. This paper proposes a novel Zero Trust architecture for IoT systems called ZTA-IoT. Additionally, based on different types of interactions between various layers and components in this architecture, we present ZTA-IoT-ACF, an access control framework that recognizes different interactions that need to be controlled in IoT systems. Within this framework, the paper then refines its focus to object-level interactions, i.e., interactions where the target resource is a device (equivalently a thing) or an information file generated or stored by a device. Building on the recently proposed Zero Trust score-based authorization framework (ZT-SAF) we develop the object-level Zero Trust score-based authorization framework for IoT systems, denoted as ZTA-IoT-OL-SAF, to govern access requests in this context. With this machinery in place, we finally develop a novel usage control model for users-to-objects and devices-to-objects interactions, denoted as UCONIoT. We give formal definitions, illustrative use cases, and a proof-of-concept implementation of UCONIoT. This paper is a first step toward establishing a rigorous formally-defined score-based access control framework for Zero Trust IoT systems.

最近,一些研究人员提出,在设计和实施物联网身份验证和授权系统时,需要整合零信任(ZT)原则。一个集成的零信任物联网系统包括网络基础设施(物理和虚拟)以及作为 ZT 架构计划产物的物联网操作策略。本文为物联网系统提出了一种名为 ZTA-IoT 的新型零信任架构。此外,基于该架构中各层和组件之间不同类型的交互,我们提出了 ZTA-IoT-ACF 这一访问控制框架,该框架可识别物联网系统中需要控制的不同交互。在此框架内,本文将重点细化为对象级交互,即目标资源是设备(等同于事物)或设备生成或存储的信息文件的交互。在最近提出的基于零信任分值的授权框架(ZT-SAF)基础上,我们为物联网系统开发了对象级基于零信任分值的授权框架,称为 ZTA-IoT-OL-SAF,用于管理这种情况下的访问请求。有了这个机制,我们最终为用户到对象和设备到对象的交互开发了一种新的使用控制模型,称为 UCONIoT。我们给出了 UCONIoT 的正式定义、说明性用例和概念验证实现。本文是为零信任物联网系统建立严格的正式定义的基于分数的访问控制框架迈出的第一步。
{"title":"ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model","authors":"Safwa Ameer, Lopamudra Praharaj, Ravi Sandhu, Smriti Bhatt, Maanak Gupta","doi":"10.1145/3671147","DOIUrl":"https://doi.org/10.1145/3671147","url":null,"abstract":"<p>Recently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastructure (physical and virtual) and operational policies in place for IoT as a product of a ZT architecture plan. This paper proposes a novel Zero Trust architecture for IoT systems called ZTA-IoT. Additionally, based on different types of interactions between various layers and components in this architecture, we present ZTA-IoT-ACF, an access control framework that recognizes different interactions that need to be controlled in IoT systems. Within this framework, the paper then refines its focus to object-level interactions, i.e., interactions where the target resource is a device (equivalently a thing) or an information file generated or stored by a device. Building on the recently proposed Zero Trust score-based authorization framework (ZT-SAF) we develop the object-level Zero Trust score-based authorization framework for IoT systems, denoted as ZTA-IoT-OL-SAF, to govern access requests in this context. With this machinery in place, we finally develop a novel usage control model for users-to-objects and devices-to-objects interactions, denoted as UCON<sub><i>IoT</i></sub>. We give formal definitions, illustrative use cases, and a proof-of-concept implementation of UCON<sub><i>IoT</i></sub>. This paper is a first step toward establishing a rigorous formally-defined score-based access control framework for Zero Trust IoT systems.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"17 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of the Consumer Remote SIM Provisioning Protocol 消费者远程 SIM 卡供应协议的安全分析
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1145/3663761
Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura

Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this paper, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, future versions of the specification, and mobile operator processes to increase the robustness of eSIM security.

消费类设备的远程 SIM 卡供应(RSP)是 GSM 协会指定的协议,用于将 SIM 卡配置文件下载到移动设备的安全元件中。这一过程通常被称为 eSIM,有望取代可移动 SIM 卡。该协议的安全性至关重要,因为配置文件包括移动设备验证移动网络的凭证。在本文中,我们对消费者 RSP 协议进行了正式的安全分析。我们用应用 pi 微积分为多方协议建模,定义了形式安全目标,并用 ProVerif 验证了这些目标。分析表明,当所有预期参与者都是诚实的时候,消费者 RSP 协议可以抵御网络对手。不过,我们也在现实的部分妥协场景中对该协议进行了建模,在这种场景中,对手控制了一个合法参与者或通信通道。部分妥协场景中的安全失效揭示了协议设计中的弱点。最重要的一点是,RSP 的安全性不必要地依赖于封装在 TLS 隧道中。而且,由于缺乏预先确定的标识符,世界上任何地方的被入侵下载服务器或被入侵的安全元件都可能被用来攻击诚实参与者之间的 RSP。此外,缺乏验证用户意图的可靠方法也会导致严重的安全故障。根据研究结果,我们建议对 RSP 实现、未来版本的规范和移动运营商流程进行实际改进,以提高 eSIM 安全的稳健性。
{"title":"Security Analysis of the Consumer Remote SIM Provisioning Protocol","authors":"Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura","doi":"10.1145/3663761","DOIUrl":"https://doi.org/10.1145/3663761","url":null,"abstract":"<p>Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this paper, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, future versions of the specification, and mobile operator processes to increase the robustness of eSIM security.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"51 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140884538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting X-squatter:人工智能多语种生成跨语言 "呷呷 "声
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1145/3663569
Rodolfo Vieira Valentim, Idilio Drago, Marco Mellia, Federico Cerutti

Sound-squatting is a squatting technique that exploits similarities in word pronunciation to trick users into accessing malicious resources. It is an understudied threat that has gained traction with the popularity of smart speakers and audio-only content, such as podcasts. The picture gets even more complex when multiple languages are involved. We here introduce X-squatter, a multi- and cross-language AI-based system that relies on a Transformer Neural Network for generating high-quality sound-squatting candidates. We illustrate the use of X-squatter by searching for domain name squatting abuse across hundreds of millions of issued TLS certificates, alongside other squatting types. Key findings unveil that approximately 15% of generated sound-squatting candidates have associated TLS certificates, well above the prevalence of other squatting types (7%). Furthermore, we employ X-squatter to assess the potential for abuse in PyPI packages, revealing the existence of hundreds of candidates within a three-year package history. Notably, our results suggest that the current platform checks cannot handle sound-squatting attacks, calling for better countermeasures. We believe X-squatter uncovers the usage of multilingual sound-squatting phenomenon on the Internet and it is a crucial asset for proactive protection against the threat.

声音蹲守是一种利用单词发音相似性诱骗用户访问恶意资源的蹲守技术。这是一种未被充分研究的威胁,随着智能扬声器和纯音频内容(如播客)的普及,这种威胁的影响力越来越大。如果涉及多种语言,情况就会变得更加复杂。我们在此介绍 X-squatter,它是一种基于多语言和跨语言的人工智能系统,依靠变形神经网络生成高质量的声音侵扰候选者。我们通过在数以亿计的已签发 TLS 证书中搜索域名抢注滥用以及其他抢注类型来说明 X-squatter 的用途。主要研究结果表明,在生成的恶意抢注候选域名中,约有 15%具有相关的 TLS 证书,远高于其他抢注类型的发生率(7%)。此外,我们还利用 X-squatter 评估了 PyPI 软件包的滥用潜力,发现在三年的软件包历史中存在数百个候选软件。值得注意的是,我们的结果表明,当前的平台检查无法处理声音剽窃攻击,因此需要更好的应对措施。我们认为,X-squatter 发现了互联网上多语言声音抢注现象的使用情况,是主动防范这种威胁的重要资产。
{"title":"X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting","authors":"Rodolfo Vieira Valentim, Idilio Drago, Marco Mellia, Federico Cerutti","doi":"10.1145/3663569","DOIUrl":"https://doi.org/10.1145/3663569","url":null,"abstract":"<p>Sound-squatting is a squatting technique that exploits similarities in word pronunciation to trick users into accessing malicious resources. It is an understudied threat that has gained traction with the popularity of smart speakers and audio-only content, such as podcasts. The picture gets even more complex when multiple languages are involved. We here introduce X-squatter, a multi- and cross-language AI-based system that relies on a Transformer Neural Network for generating high-quality sound-squatting candidates. We illustrate the use of X-squatter by searching for domain name squatting abuse across hundreds of millions of issued TLS certificates, alongside other squatting types. Key findings unveil that approximately 15% of generated sound-squatting candidates have associated TLS certificates, well above the prevalence of other squatting types (7%). Furthermore, we employ X-squatter to assess the potential for abuse in PyPI packages, revealing the existence of hundreds of candidates within a three-year package history. Notably, our results suggest that the current platform checks cannot handle sound-squatting attacks, calling for better countermeasures. We believe X-squatter uncovers the usage of multilingual sound-squatting phenomenon on the Internet and it is a crucial asset for proactive protection against the threat.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"47 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140884684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit 利用激动 Logit 实现针对音频对抗性示例的鲁棒 ASR 系统
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-26 DOI: 10.1145/3661822
Namgyu Park, Jong Kim

Automatic speech recognition (ASR) systems are vulnerable to audio adversarial examples, which aim to deceive ASR systems by adding perturbations to benign speech signals. These audio adversarial examples appear indistinguishable from benign audio waves, but the ASR system decodes them as intentional malicious commands. Previous studies have demonstrated the feasibility of such attacks in simulated environments (over-line) and have further showcased the creation of robust physical audio adversarial examples (over-air). Various defense techniques have been proposed to counter these attacks. However, most of them have either failed to handle various types of attacks effectively or have resulted in significant time overhead.

In this paper, we propose a novel method for detecting audio adversarial examples. Our approach involves feeding both smoothed audio and original audio inputs into the ASR system. Subsequently, we introduce noise to the logits before providing them to the decoder of the ASR. We demonstrate that carefully selected noise can considerably influence the transcription results of audio adversarial examples while having minimal impact on the transcription of benign audio waves. Leveraging this characteristic, we detect audio adversarial examples by comparing the altered transcription, resulting from logit noising, with the original transcription. The proposed method can be easily applied to ASR systems without requiring any structural modifications or additional training. Experimental results indicate that the proposed method exhibits robustness against both over-line and over-air audio adversarial examples, outperforming state-of-the-art detection methods.

自动语音识别(ASR)系统容易受到音频对抗范例的影响,这些范例旨在通过在良性语音信号中添加扰动来欺骗 ASR 系统。这些音频对抗范例看起来与良性音频波无异,但 ASR 系统却能将其解码为故意的恶意指令。以前的研究已经证明了在模拟环境中进行此类攻击的可行性(在线),并进一步展示了创建鲁棒物理音频对抗示例的过程(空中)。为应对这些攻击,人们提出了各种防御技术。然而,其中大多数技术要么无法有效处理各种类型的攻击,要么导致大量时间开销。在本文中,我们提出了一种检测音频对抗示例的新方法。我们的方法是将平滑音频和原始音频输入 ASR 系统。随后,我们将噪声引入对数,然后再将其提供给 ASR 解码器。我们证明,经过精心挑选的噪声可以极大地影响对抗性音频示例的转录结果,而对良性音频波的转录影响却微乎其微。利用这一特点,我们通过比较因 logit 噪声而改变的转录结果和原始转录结果,来检测音频对抗示例。所提出的方法可轻松应用于 ASR 系统,无需进行任何结构修改或额外训练。实验结果表明,所提出的方法对过线和过空音频对抗示例都具有鲁棒性,优于最先进的检测方法。
{"title":"Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit","authors":"Namgyu Park, Jong Kim","doi":"10.1145/3661822","DOIUrl":"https://doi.org/10.1145/3661822","url":null,"abstract":"<p>Automatic speech recognition (ASR) systems are vulnerable to audio adversarial examples, which aim to deceive ASR systems by adding perturbations to benign speech signals. These audio adversarial examples appear indistinguishable from benign audio waves, but the ASR system decodes them as intentional malicious commands. Previous studies have demonstrated the feasibility of such attacks in simulated environments (over-line) and have further showcased the creation of robust physical audio adversarial examples (over-air). Various defense techniques have been proposed to counter these attacks. However, most of them have either failed to handle various types of attacks effectively or have resulted in significant time overhead. </p><p>In this paper, we propose a novel method for detecting audio adversarial examples. Our approach involves feeding both smoothed audio and original audio inputs into the ASR system. Subsequently, we introduce noise to the logits before providing them to the decoder of the ASR. We demonstrate that carefully selected noise can considerably influence the transcription results of audio adversarial examples while having minimal impact on the transcription of benign audio waves. Leveraging this characteristic, we detect audio adversarial examples by comparing the altered transcription, resulting from logit noising, with the original transcription. The proposed method can be easily applied to ASR systems without requiring any structural modifications or additional training. Experimental results indicate that the proposed method exhibits robustness against both over-line and over-air audio adversarial examples, outperforming state-of-the-art detection methods.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"120 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140800483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation 使用区块链和安全多方计算的去中心化私人数据市场
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-16 DOI: 10.1145/3652162
Julen Bernabé-Rodríguez, Albert Garreta, Oscar Lage

Big data has proven to be a very useful tool for companies and users, but companies with larger datasets have ended being more competitive than the others thanks to machine learning or artificial inteligence. Secure multi-party computation (SMPC) allows the smaller companies to jointly train arbitrary models on their private data while assuring privacy, and thus gives data owners the ability to perform what are currently known as federated learning algorithms. Besides, with a blockchain it is possible to coordinate and audit those computations in a decentralized way. In this document, we consider a private data marketplace as a space where researchers and data owners meet to agree the use of private data for statistics or more complex model trainings. This document presents a candidate architecure for a private data marketplace by combining SMPC and a public, general-purpose blockchain. Such a marketplace is proposed as a smart contract deployed in the blockchain, while the privacy preserving computation is held by SMPC.

大数据已被证明是对公司和用户非常有用的工具,但由于机器学习或人工智能,拥有较大数据集的公司最终比其他公司更具竞争力。安全多方计算(SMPC)允许规模较小的公司在确保隐私的前提下,在其私有数据上联合训练任意模型,从而使数据所有者有能力执行目前所谓的联合学习算法。此外,有了区块链,就有可能以去中心化的方式协调和审计这些计算。在本文中,我们将私人数据市场视为一个空间,研究人员和数据所有者可以在此会面,就使用私人数据进行统计或更复杂的模型训练达成一致。本文通过将 SMPC 与公共通用区块链相结合,提出了私有数据市场的候选架构。这种市场是作为部署在区块链中的智能合约提出的,而隐私保护计算则由 SMPC 负责。
{"title":"A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation","authors":"Julen Bernabé-Rodríguez, Albert Garreta, Oscar Lage","doi":"10.1145/3652162","DOIUrl":"https://doi.org/10.1145/3652162","url":null,"abstract":"<p>Big data has proven to be a very useful tool for companies and users, but companies with larger datasets have ended being more competitive than the others thanks to machine learning or artificial inteligence. Secure multi-party computation (SMPC) allows the smaller companies to jointly train arbitrary models on their private data while assuring privacy, and thus gives data owners the ability to perform what are currently known as federated learning algorithms. Besides, with a blockchain it is possible to coordinate and audit those computations in a decentralized way. In this document, we consider a private data marketplace as a space where researchers and data owners meet to agree the use of private data for statistics or more complex model trainings. This document presents a candidate architecure for a private data marketplace by combining SMPC and a public, general-purpose blockchain. Such a marketplace is proposed as a smart contract deployed in the blockchain, while the privacy preserving computation is held by SMPC.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"53 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain CySecBERT:网络安全领域的领域适应语言模型
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1145/3652594
Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter

The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

网络安全领域发展迅速。安全专业人员需要获得有关过去、当前和未来威胁的情报,因为攻击正变得越来越先进,而且越来越多地针对更大、更复杂的系统。由于人工无法处理和分析如此大量的信息,网络安全专家只能依靠机器学习技术。在文本领域,像 BERT 这样的预训练语言模型已被证明很有帮助,因为它们为进一步微调提供了良好的基准。但是,由于网络安全领域的知识和许多专业术语,一般的语言模型可能会忽略文本信息的要点。为此,我们创建了一个高质量的数据集,并提出了一个专门针对网络安全领域的语言模型,该模型可作为网络安全系统的基本构件。我们在 15 项任务中对该模型进行了比较:与领域相关的外在任务用于测量特定问题的性能,内在任务用于测量模型内部表征的性能,以及来自 SuperGLUE 基准的一般任务。内在任务的结果表明,与其他模型相比,我们的模型改进了领域词的内部表示空间。由序列标记和分类组成的依赖于领域的外部任务表明,该模型在网络安全场景中表现最佳。此外,我们还特别注意超参数的选择,以防止灾难性遗忘,因为预训练模型在进一步训练过程中往往会遗忘原有知识。
{"title":"CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain","authors":"Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter","doi":"10.1145/3652594","DOIUrl":"https://doi.org/10.1145/3652594","url":null,"abstract":"<p>The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"15 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRAAC: A Multi-Stage Risk-Aware Adaptive Authentication and Access Control Framework for Android MRAAC:面向安卓的多阶段风险感知自适应身份验证和访问控制框架
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-15 DOI: 10.1145/3648372
Jiayi Chen, Urs Hengartner, Hassan Khan

Adaptive authentication enables smartphones and enterprise apps to decide when and how to authenticate users based on contextual and behavioral factors. In practice, a system may employ multiple policies to adapt its authentication mechanisms and access controls to various scenarios. However, existing approaches suffer from contradictory or insecure adaptations, which may enable attackers to bypass the authentication system. Besides, most existing approaches are inflexible and do not provide desirable access controls. We design and build a multi-stage risk-aware adaptive authentication and access control framework (MRAAC), which provides the following novel contributions: Multi-stage:MRAAC organizes adaptation policies in multiple stages to handle different risk types and progressively adapts authentication mechanisms based on context, resource sensitivity, and user authenticity. Appropriate access control:MRAAC provides libraries to enable sensitive apps to manage the availability of their in-app resources based on MRAAC’s risk awareness. Extensible:While existing proposals are tailored to cater to a single use case, MRAAC supports a variety of use cases with custom risk models. We exemplify these advantages of MRAAC by deploying it for three use cases: an enhanced version of Android Smart Lock, guest-aware continuous authentication, and corporate app for BYOD. We conduct experiments to quantify the CPU, memory, latency, and battery performance of MRAAC. Our evaluation shows that MRAAC enables various stakeholders (device manufacturers, enterprise and secure app developers) to provide complex adaptive authentication workflows on COTS Android with low processing and battery overhead.

自适应身份验证使智能手机和企业应用程序能够根据上下文和行为因素决定何时以及如何对用户进行身份验证。在实践中,系统可能会采用多种策略,使其身份验证机制和访问控制适应各种场景。然而,现有方法存在自相矛盾或不安全的适应性问题,这可能会使攻击者绕过身份验证系统。此外,大多数现有方法缺乏灵活性,无法提供理想的访问控制。我们设计并建立了一个多阶段风险感知自适应身份验证和访问控制框架(MRAAC),它具有以下新贡献:多阶段:MRAAC在多个阶段组织适应策略,以处理不同的风险类型,并根据上下文、资源敏感性和用户真实性逐步调整认证机制。适当的访问控制:MRAAC提供库,使敏感应用程序能够根据MRAAC的风险意识管理其应用程序内资源的可用性。可扩展性:现有的建议都是针对单一用例量身定制的,而MRAAC支持各种用例,并可自定义风险模型。我们通过在三种用例中部署MRAAC来体现MRAAC的这些优势:增强版安卓智能锁、访客感知持续身份验证和用于BYOD的企业应用。我们通过实验来量化 MRAAC 的 CPU、内存、延迟和电池性能。我们的评估结果表明,MRAAC 能让各利益相关方(设备制造商、企业和安全应用开发商)在 COTS Android 上提供复杂的自适应身份验证工作流,同时降低处理和电池开销。
{"title":"MRAAC: A Multi-Stage Risk-Aware Adaptive Authentication and Access Control Framework for Android","authors":"Jiayi Chen, Urs Hengartner, Hassan Khan","doi":"10.1145/3648372","DOIUrl":"https://doi.org/10.1145/3648372","url":null,"abstract":"<p>Adaptive authentication enables smartphones and enterprise apps to decide when and how to authenticate users based on contextual and behavioral factors. In practice, a system may employ multiple policies to adapt its authentication mechanisms and access controls to various scenarios. However, existing approaches suffer from contradictory or insecure adaptations, which may enable attackers to bypass the authentication system. Besides, most existing approaches are inflexible and do not provide desirable access controls. We design and build a multi-stage risk-aware adaptive authentication and access control framework (MRAAC), which provides the following novel contributions: <b>Multi-stage:</b>\u0000MRAAC organizes adaptation policies in multiple stages to handle different risk types and progressively adapts authentication mechanisms based on context, resource sensitivity, and user authenticity. <b>Appropriate access control:</b>\u0000MRAAC provides libraries to enable sensitive apps to manage the availability of their in-app resources based on MRAAC’s risk awareness. <b>Extensible:</b>\u0000While existing proposals are tailored to cater to a single use case, MRAAC supports a variety of use cases with custom risk models. We exemplify these advantages of MRAAC by deploying it for three use cases: an enhanced version of Android Smart Lock, guest-aware continuous authentication, and corporate app for BYOD. We conduct experiments to quantify the CPU, memory, latency, and battery performance of MRAAC. Our evaluation shows that MRAAC enables various stakeholders (device manufacturers, enterprise and secure app developers) to provide complex adaptive authentication workflows on COTS Android with low processing and battery overhead.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"93 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139765963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats 结合网络安全情报完善汽车网络威胁
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-05 DOI: 10.1145/3644075
Florian Sommer, Mona Gierl, Reiner Kriesten, Frank Kargl, Eric Sax

Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this paper, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumerations and Classifications (CAPEC™), and Common Weakness Enumeration (CWE™). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.

现代汽车越来越依赖电子、软件和通信技术(网络空间)来执行驾驶任务。空中(OTA)连接通过创建远程访问入口进一步扩展了网络空间。因此,车辆面临着可能影响道路安全的安全攻击。要保护汽车免受网络威胁,就必须深入了解安全攻击、漏洞和缓解措施。尽管联合国 R155 等文件中对汽车威胁的描述仍很抽象,但这造成了潜在漏洞被忽视的风险,从而无法保护车辆免受威胁。迄今为止,人们对汽车攻击、其利用的具体漏洞以及保护系统免受这些攻击的安全机制之间的关系还没有形成共识。在本文中,我们旨在通过创建联合国 R155、微软 STRIDE 分类、常见攻击模式枚举和分类 (CAPEC™) 以及常见弱点枚举 (CWE™) 之间的映射来缩小这一差距。通过这种方式,现有的攻击、漏洞和缓解措施方面的详细知识被整合起来,并与汽车领域相关联。在实践中,这完善了联合国 R155 威胁清单,从而支持汽车制造商、供应商和审批机构满足和评估汽车开发在网络安全方面的要求。总体而言,我们在联合国威胁、STRIDE、CAPEC 攻击模式和 CWE 弱点之间创建了 204 个映射。我们通过应用汽车攻击数据库(AAD)验证了这些映射,该数据库由 361 次针对汽车的真实攻击组成。此外,我们还根据汽车相关攻击定义了另外 25 种攻击模式。
{"title":"Combining Cyber Security Intelligence to Refine Automotive Cyber Threats","authors":"Florian Sommer, Mona Gierl, Reiner Kriesten, Frank Kargl, Eric Sax","doi":"10.1145/3644075","DOIUrl":"https://doi.org/10.1145/3644075","url":null,"abstract":"<p>Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this paper, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumerations and Classifications (CAPEC™), and Common Weakness Enumeration (CWE™). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"10 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139689872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks AdverSPAM:在线社交网络中的对抗性垃圾邮件账户操纵
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-26 DOI: 10.1145/3643563
Federico Concone, Salvatore Gaglio, Andrea Giammanco, Giuseppe Lo Re, Marco Morana

In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the adversary mechanisms through which an attacker could induce a classification algorithm to provide the desired output. Such strategies, known as Adversarial Machine Learning (AML), have a twofold purpose: to calculate a perturbation to be applied to the classifier’s input such that the outcome is subverted, while maintaining the underlying intent of the original data. Although any manipulation that accomplishes these goals is theoretically acceptable, in real scenarios perturbations must correspond to a set of permissible manipulations of the input, which is rarely considered in the literature. In this paper, we present AdverSPAM, an AML technique designed to fool the spam account detection system of an Online Social Network (OSN). The proposed black-box evasion attack is formulated as an optimization problem that computes the adversarial sample while maintaining two important properties of the feature space, namely statistical correlation and semantic dependency. Although being demonstrated in an OSN security scenario, such an approach might be applied in other context where the aim is to perturb data described by mutually related features. Experiments conducted on a public dataset show the effectiveness of AdverSPAM compared to five state-of-the-art competitors, even in the presence of adversarial defense mechanisms.

近年来,机器学习(ML)被广泛应用于复杂的 IT 系统核心,这促使研究人员开始研究 ML 技术的安全性和可靠性。一种非常特殊的威胁涉及对抗机制,攻击者可以通过这种机制诱导分类算法提供所需的输出。此类策略被称为对抗式机器学习(AML),具有双重目的:计算出应用于分类器输入的扰动,从而颠覆结果,同时保持原始数据的基本意图。虽然从理论上讲,任何能实现这些目标的操作都是可以接受的,但在实际场景中,扰动必须与一组允许的输入操作相对应,而这在文献中很少被考虑到。在本文中,我们提出了一种反洗钱技术 AdverSPAM,旨在骗过在线社交网络(OSN)的垃圾邮件账户检测系统。所提出的黑盒规避攻击被表述为一个优化问题,在计算对抗样本的同时保持特征空间的两个重要属性,即统计相关性和语义依赖性。虽然这种方法是在 OSN 安全场景下演示的,但也可应用于其他旨在扰乱由相互关联的特征描述的数据的场景。在公共数据集上进行的实验表明,AdverSPAM 与五种最先进的竞争对手相比非常有效,即使在存在对抗性防御机制的情况下也是如此。
{"title":"AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks","authors":"Federico Concone, Salvatore Gaglio, Andrea Giammanco, Giuseppe Lo Re, Marco Morana","doi":"10.1145/3643563","DOIUrl":"https://doi.org/10.1145/3643563","url":null,"abstract":"<p>In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the <i>adversary</i> mechanisms through which an attacker could induce a classification algorithm to provide the desired output. Such strategies, known as Adversarial Machine Learning (AML), have a twofold purpose: to calculate a perturbation to be applied to the classifier’s input such that the outcome is subverted, while maintaining the underlying intent of the original data. Although any manipulation that accomplishes these goals is theoretically acceptable, in real scenarios perturbations must correspond to a set of permissible manipulations of the input, which is rarely considered in the literature. In this paper, we present <i>AdverSPAM</i>, an AML technique designed to fool the spam account detection system of an Online Social Network (OSN). The proposed black-box evasion attack is formulated as an optimization problem that computes the adversarial sample while maintaining two important properties of the feature space, namely <i>statistical correlation</i> and <i>semantic dependency</i>. Although being demonstrated in an OSN security scenario, such an approach might be applied in other context where the aim is to perturb data described by mutually related features. Experiments conducted on a public dataset show the effectiveness of <i>AdverSPAM</i> compared to five state-of-the-art competitors, even in the presence of adversarial defense mechanisms.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"26 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1