首页 > 最新文献

ACM Transactions on Privacy and Security最新文献

英文 中文
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation 使用区块链和安全多方计算的去中心化私人数据市场
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-03-16 DOI: 10.1145/3652162
Julen Bernabé-Rodríguez, Albert Garreta, Oscar Lage

Big data has proven to be a very useful tool for companies and users, but companies with larger datasets have ended being more competitive than the others thanks to machine learning or artificial inteligence. Secure multi-party computation (SMPC) allows the smaller companies to jointly train arbitrary models on their private data while assuring privacy, and thus gives data owners the ability to perform what are currently known as federated learning algorithms. Besides, with a blockchain it is possible to coordinate and audit those computations in a decentralized way. In this document, we consider a private data marketplace as a space where researchers and data owners meet to agree the use of private data for statistics or more complex model trainings. This document presents a candidate architecure for a private data marketplace by combining SMPC and a public, general-purpose blockchain. Such a marketplace is proposed as a smart contract deployed in the blockchain, while the privacy preserving computation is held by SMPC.

大数据已被证明是对公司和用户非常有用的工具,但由于机器学习或人工智能,拥有较大数据集的公司最终比其他公司更具竞争力。安全多方计算(SMPC)允许规模较小的公司在确保隐私的前提下,在其私有数据上联合训练任意模型,从而使数据所有者有能力执行目前所谓的联合学习算法。此外,有了区块链,就有可能以去中心化的方式协调和审计这些计算。在本文中,我们将私人数据市场视为一个空间,研究人员和数据所有者可以在此会面,就使用私人数据进行统计或更复杂的模型训练达成一致。本文通过将 SMPC 与公共通用区块链相结合,提出了私有数据市场的候选架构。这种市场是作为部署在区块链中的智能合约提出的,而隐私保护计算则由 SMPC 负责。
{"title":"A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation","authors":"Julen Bernabé-Rodríguez, Albert Garreta, Oscar Lage","doi":"10.1145/3652162","DOIUrl":"https://doi.org/10.1145/3652162","url":null,"abstract":"<p>Big data has proven to be a very useful tool for companies and users, but companies with larger datasets have ended being more competitive than the others thanks to machine learning or artificial inteligence. Secure multi-party computation (SMPC) allows the smaller companies to jointly train arbitrary models on their private data while assuring privacy, and thus gives data owners the ability to perform what are currently known as federated learning algorithms. Besides, with a blockchain it is possible to coordinate and audit those computations in a decentralized way. In this document, we consider a private data marketplace as a space where researchers and data owners meet to agree the use of private data for statistics or more complex model trainings. This document presents a candidate architecure for a private data marketplace by combining SMPC and a public, general-purpose blockchain. Such a marketplace is proposed as a smart contract deployed in the blockchain, while the privacy preserving computation is held by SMPC.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain CySecBERT:网络安全领域的领域适应语言模型
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-03-15 DOI: 10.1145/3652594
Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter

The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.

网络安全领域发展迅速。安全专业人员需要获得有关过去、当前和未来威胁的情报,因为攻击正变得越来越先进,而且越来越多地针对更大、更复杂的系统。由于人工无法处理和分析如此大量的信息,网络安全专家只能依靠机器学习技术。在文本领域,像 BERT 这样的预训练语言模型已被证明很有帮助,因为它们为进一步微调提供了良好的基准。但是,由于网络安全领域的知识和许多专业术语,一般的语言模型可能会忽略文本信息的要点。为此,我们创建了一个高质量的数据集,并提出了一个专门针对网络安全领域的语言模型,该模型可作为网络安全系统的基本构件。我们在 15 项任务中对该模型进行了比较:与领域相关的外在任务用于测量特定问题的性能,内在任务用于测量模型内部表征的性能,以及来自 SuperGLUE 基准的一般任务。内在任务的结果表明,与其他模型相比,我们的模型改进了领域词的内部表示空间。由序列标记和分类组成的依赖于领域的外部任务表明,该模型在网络安全场景中表现最佳。此外,我们还特别注意超参数的选择,以防止灾难性遗忘,因为预训练模型在进一步训练过程中往往会遗忘原有知识。
{"title":"CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain","authors":"Markus Bayer, Philipp Kuehn, Ramin Shanehsaz, Christian Reuter","doi":"10.1145/3652594","DOIUrl":"https://doi.org/10.1145/3652594","url":null,"abstract":"<p>The field of cybersecurity is evolving fast. Security professionals are in need of intelligence on past, current and - ideally - on upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cybersecurity experts rely on machine learning techniques. In the textual domain, pre-trained language models like BERT have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cybersecurity, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset and present a language model specifically tailored to the cybersecurity domain which can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared to the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRAAC: A Multi-Stage Risk-Aware Adaptive Authentication and Access Control Framework for Android MRAAC:面向安卓的多阶段风险感知自适应身份验证和访问控制框架
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-02-15 DOI: 10.1145/3648372
Jiayi Chen, Urs Hengartner, Hassan Khan

Adaptive authentication enables smartphones and enterprise apps to decide when and how to authenticate users based on contextual and behavioral factors. In practice, a system may employ multiple policies to adapt its authentication mechanisms and access controls to various scenarios. However, existing approaches suffer from contradictory or insecure adaptations, which may enable attackers to bypass the authentication system. Besides, most existing approaches are inflexible and do not provide desirable access controls. We design and build a multi-stage risk-aware adaptive authentication and access control framework (MRAAC), which provides the following novel contributions: Multi-stage:MRAAC organizes adaptation policies in multiple stages to handle different risk types and progressively adapts authentication mechanisms based on context, resource sensitivity, and user authenticity. Appropriate access control:MRAAC provides libraries to enable sensitive apps to manage the availability of their in-app resources based on MRAAC’s risk awareness. Extensible:While existing proposals are tailored to cater to a single use case, MRAAC supports a variety of use cases with custom risk models. We exemplify these advantages of MRAAC by deploying it for three use cases: an enhanced version of Android Smart Lock, guest-aware continuous authentication, and corporate app for BYOD. We conduct experiments to quantify the CPU, memory, latency, and battery performance of MRAAC. Our evaluation shows that MRAAC enables various stakeholders (device manufacturers, enterprise and secure app developers) to provide complex adaptive authentication workflows on COTS Android with low processing and battery overhead.

自适应身份验证使智能手机和企业应用程序能够根据上下文和行为因素决定何时以及如何对用户进行身份验证。在实践中,系统可能会采用多种策略,使其身份验证机制和访问控制适应各种场景。然而,现有方法存在自相矛盾或不安全的适应性问题,这可能会使攻击者绕过身份验证系统。此外,大多数现有方法缺乏灵活性,无法提供理想的访问控制。我们设计并建立了一个多阶段风险感知自适应身份验证和访问控制框架(MRAAC),它具有以下新贡献:多阶段:MRAAC在多个阶段组织适应策略,以处理不同的风险类型,并根据上下文、资源敏感性和用户真实性逐步调整认证机制。适当的访问控制:MRAAC提供库,使敏感应用程序能够根据MRAAC的风险意识管理其应用程序内资源的可用性。可扩展性:现有的建议都是针对单一用例量身定制的,而MRAAC支持各种用例,并可自定义风险模型。我们通过在三种用例中部署MRAAC来体现MRAAC的这些优势:增强版安卓智能锁、访客感知持续身份验证和用于BYOD的企业应用。我们通过实验来量化 MRAAC 的 CPU、内存、延迟和电池性能。我们的评估结果表明,MRAAC 能让各利益相关方(设备制造商、企业和安全应用开发商)在 COTS Android 上提供复杂的自适应身份验证工作流,同时降低处理和电池开销。
{"title":"MRAAC: A Multi-Stage Risk-Aware Adaptive Authentication and Access Control Framework for Android","authors":"Jiayi Chen, Urs Hengartner, Hassan Khan","doi":"10.1145/3648372","DOIUrl":"https://doi.org/10.1145/3648372","url":null,"abstract":"<p>Adaptive authentication enables smartphones and enterprise apps to decide when and how to authenticate users based on contextual and behavioral factors. In practice, a system may employ multiple policies to adapt its authentication mechanisms and access controls to various scenarios. However, existing approaches suffer from contradictory or insecure adaptations, which may enable attackers to bypass the authentication system. Besides, most existing approaches are inflexible and do not provide desirable access controls. We design and build a multi-stage risk-aware adaptive authentication and access control framework (MRAAC), which provides the following novel contributions: <b>Multi-stage:</b>\u0000MRAAC organizes adaptation policies in multiple stages to handle different risk types and progressively adapts authentication mechanisms based on context, resource sensitivity, and user authenticity. <b>Appropriate access control:</b>\u0000MRAAC provides libraries to enable sensitive apps to manage the availability of their in-app resources based on MRAAC’s risk awareness. <b>Extensible:</b>\u0000While existing proposals are tailored to cater to a single use case, MRAAC supports a variety of use cases with custom risk models. We exemplify these advantages of MRAAC by deploying it for three use cases: an enhanced version of Android Smart Lock, guest-aware continuous authentication, and corporate app for BYOD. We conduct experiments to quantify the CPU, memory, latency, and battery performance of MRAAC. Our evaluation shows that MRAAC enables various stakeholders (device manufacturers, enterprise and secure app developers) to provide complex adaptive authentication workflows on COTS Android with low processing and battery overhead.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139765963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats 结合网络安全情报完善汽车网络威胁
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-02-05 DOI: 10.1145/3644075
Florian Sommer, Mona Gierl, Reiner Kriesten, Frank Kargl, Eric Sax

Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this paper, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumerations and Classifications (CAPEC™), and Common Weakness Enumeration (CWE™). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.

现代汽车越来越依赖电子、软件和通信技术(网络空间)来执行驾驶任务。空中(OTA)连接通过创建远程访问入口进一步扩展了网络空间。因此,车辆面临着可能影响道路安全的安全攻击。要保护汽车免受网络威胁,就必须深入了解安全攻击、漏洞和缓解措施。尽管联合国 R155 等文件中对汽车威胁的描述仍很抽象,但这造成了潜在漏洞被忽视的风险,从而无法保护车辆免受威胁。迄今为止,人们对汽车攻击、其利用的具体漏洞以及保护系统免受这些攻击的安全机制之间的关系还没有形成共识。在本文中,我们旨在通过创建联合国 R155、微软 STRIDE 分类、常见攻击模式枚举和分类 (CAPEC™) 以及常见弱点枚举 (CWE™) 之间的映射来缩小这一差距。通过这种方式,现有的攻击、漏洞和缓解措施方面的详细知识被整合起来,并与汽车领域相关联。在实践中,这完善了联合国 R155 威胁清单,从而支持汽车制造商、供应商和审批机构满足和评估汽车开发在网络安全方面的要求。总体而言,我们在联合国威胁、STRIDE、CAPEC 攻击模式和 CWE 弱点之间创建了 204 个映射。我们通过应用汽车攻击数据库(AAD)验证了这些映射,该数据库由 361 次针对汽车的真实攻击组成。此外,我们还根据汽车相关攻击定义了另外 25 种攻击模式。
{"title":"Combining Cyber Security Intelligence to Refine Automotive Cyber Threats","authors":"Florian Sommer, Mona Gierl, Reiner Kriesten, Frank Kargl, Eric Sax","doi":"10.1145/3644075","DOIUrl":"https://doi.org/10.1145/3644075","url":null,"abstract":"<p>Modern vehicles increasingly rely on electronics, software, and communication technologies (cyber space) to perform their driving task. Over-The-Air (OTA) connectivity further extends the cyber space by creating remote access entry points. Accordingly, the vehicle is exposed to security attacks that are able to impact road safety. A profound understanding of security attacks, vulnerabilities, and mitigations is necessary to protect vehicles against cyber threats. While automotive threat descriptions, such as in UN R155, are still abstract, this creates a risk that potential vulnerabilities are overlooked and the vehicle is not secured against them. So far, there is no common understanding of the relationship of automotive attacks, the concrete vulnerabilities they exploit, and security mechanisms that would protect the system against these attacks. In this paper, we aim at closing this gap by creating a mapping between UN R155, Microsoft STRIDE classification, Common Attack Pattern Enumerations and Classifications (CAPEC™), and Common Weakness Enumeration (CWE™). In this way, already existing detailed knowledge of attacks, vulnerabilities, and mitigations is combined and linked to the automotive domain. In practice, this refines the list of UN R155 threats and therefore supports vehicle manufacturers, suppliers, and approval authorities to meet and assess the requirements for vehicle development in terms of cybersecurity. Overall, 204 mappings between UN threats, STRIDE, CAPEC attack patterns, and CWE weaknesses were created. We validated these mappings by applying our Automotive Attack Database (AAD) that consists of 361 real-world attacks on vehicles. Furthermore, 25 additional attack patterns were defined based on automotive-related attacks.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139689872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks AdverSPAM:在线社交网络中的对抗性垃圾邮件账户操纵
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-01-26 DOI: 10.1145/3643563
Federico Concone, Salvatore Gaglio, Andrea Giammanco, Giuseppe Lo Re, Marco Morana

In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the adversary mechanisms through which an attacker could induce a classification algorithm to provide the desired output. Such strategies, known as Adversarial Machine Learning (AML), have a twofold purpose: to calculate a perturbation to be applied to the classifier’s input such that the outcome is subverted, while maintaining the underlying intent of the original data. Although any manipulation that accomplishes these goals is theoretically acceptable, in real scenarios perturbations must correspond to a set of permissible manipulations of the input, which is rarely considered in the literature. In this paper, we present AdverSPAM, an AML technique designed to fool the spam account detection system of an Online Social Network (OSN). The proposed black-box evasion attack is formulated as an optimization problem that computes the adversarial sample while maintaining two important properties of the feature space, namely statistical correlation and semantic dependency. Although being demonstrated in an OSN security scenario, such an approach might be applied in other context where the aim is to perturb data described by mutually related features. Experiments conducted on a public dataset show the effectiveness of AdverSPAM compared to five state-of-the-art competitors, even in the presence of adversarial defense mechanisms.

近年来,机器学习(ML)被广泛应用于复杂的 IT 系统核心,这促使研究人员开始研究 ML 技术的安全性和可靠性。一种非常特殊的威胁涉及对抗机制,攻击者可以通过这种机制诱导分类算法提供所需的输出。此类策略被称为对抗式机器学习(AML),具有双重目的:计算出应用于分类器输入的扰动,从而颠覆结果,同时保持原始数据的基本意图。虽然从理论上讲,任何能实现这些目标的操作都是可以接受的,但在实际场景中,扰动必须与一组允许的输入操作相对应,而这在文献中很少被考虑到。在本文中,我们提出了一种反洗钱技术 AdverSPAM,旨在骗过在线社交网络(OSN)的垃圾邮件账户检测系统。所提出的黑盒规避攻击被表述为一个优化问题,在计算对抗样本的同时保持特征空间的两个重要属性,即统计相关性和语义依赖性。虽然这种方法是在 OSN 安全场景下演示的,但也可应用于其他旨在扰乱由相互关联的特征描述的数据的场景。在公共数据集上进行的实验表明,AdverSPAM 与五种最先进的竞争对手相比非常有效,即使在存在对抗性防御机制的情况下也是如此。
{"title":"AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks","authors":"Federico Concone, Salvatore Gaglio, Andrea Giammanco, Giuseppe Lo Re, Marco Morana","doi":"10.1145/3643563","DOIUrl":"https://doi.org/10.1145/3643563","url":null,"abstract":"<p>In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the <i>adversary</i> mechanisms through which an attacker could induce a classification algorithm to provide the desired output. Such strategies, known as Adversarial Machine Learning (AML), have a twofold purpose: to calculate a perturbation to be applied to the classifier’s input such that the outcome is subverted, while maintaining the underlying intent of the original data. Although any manipulation that accomplishes these goals is theoretically acceptable, in real scenarios perturbations must correspond to a set of permissible manipulations of the input, which is rarely considered in the literature. In this paper, we present <i>AdverSPAM</i>, an AML technique designed to fool the spam account detection system of an Online Social Network (OSN). The proposed black-box evasion attack is formulated as an optimization problem that computes the adversarial sample while maintaining two important properties of the feature space, namely <i>statistical correlation</i> and <i>semantic dependency</i>. Although being demonstrated in an OSN security scenario, such an approach might be applied in other context where the aim is to perturb data described by mutually related features. Experiments conducted on a public dataset show the effectiveness of <i>AdverSPAM</i> compared to five state-of-the-art competitors, even in the presence of adversarial defense mechanisms.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs 利用威胁知识图谱揭示 CWE-CVE-CPE 关系
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-01-19 DOI: 10.1145/3641819
Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski

Security assessment relies on public information about products, vulnerabilities, and weaknesses. So far, databases in these categories have rarely been analyzed in combination. Yet, doing so could help predict unreported vulnerabilities and identify common threat patterns. In this paper, we propose a methodology for producing and optimizing a knowledge graph that aggregates knowledge from common threat databases (CVE, CWE, and CPE). We apply the threat knowledge graph to predict associations between threat databases, specifically between products, vulnerabilities, and weaknesses. We evaluate the prediction performance both in closed world with associations from the knowledge graph, and in open world with associations revealed afterward. Using rank-based metrics (i.e., Mean Rank, Mean Reciprocal Rank, and Hits@N scores), we demonstrate the ability of the threat knowledge graph to uncover many associations that are currently unknown but will be revealed in the future, which remains useful over different time periods. We propose approaches to optimize the knowledge graph, and show that they indeed help in further uncovering associations. We have made the artifacts of our work publicly available.

安全评估依赖于有关产品、漏洞和弱点的公共信息。迄今为止,这些类别的数据库还很少进行综合分析。然而,这样做有助于预测未报告的漏洞并识别常见的威胁模式。在本文中,我们提出了一种制作和优化知识图谱的方法,该图谱汇总了来自常见威胁数据库(CVE、CWE 和 CPE)的知识。我们应用威胁知识图谱来预测威胁数据库之间的关联,特别是产品、漏洞和弱点之间的关联。我们评估了在封闭世界中利用知识图谱中的关联进行预测的性能,以及在开放世界中利用事后揭示的关联进行预测的性能。利用基于等级的指标(即平均等级、平均互易等级和 Hits@N 分数),我们展示了威胁知识图谱发现许多目前未知但将来会揭示的关联的能力,这在不同时间段仍然有用。我们提出了优化知识图谱的方法,并证明这些方法确实有助于进一步发现关联。我们公开了我们的工作成果。
{"title":"Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs","authors":"Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski","doi":"10.1145/3641819","DOIUrl":"https://doi.org/10.1145/3641819","url":null,"abstract":"<p>Security assessment relies on public information about products, vulnerabilities, and weaknesses. So far, databases in these categories have rarely been analyzed in combination. Yet, doing so could help predict unreported vulnerabilities and identify common threat patterns. In this paper, we propose a methodology for producing and optimizing a knowledge graph that aggregates knowledge from common threat databases (CVE, CWE, and CPE). We apply the threat knowledge graph to predict associations between threat databases, specifically between products, vulnerabilities, and weaknesses. We evaluate the prediction performance both in closed world with associations from the knowledge graph, and in open world with associations revealed afterward. Using rank-based metrics (i.e., Mean Rank, Mean Reciprocal Rank, and Hits@N scores), we demonstrate the ability of the threat knowledge graph to uncover many associations that are currently unknown but will be revealed in the future, which remains useful over different time periods. We propose approaches to optimize the knowledge graph, and show that they indeed help in further uncovering associations. We have made the artifacts of our work publicly available.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139501391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions 比特币的未来是否像我们想象的那样安全?通过大额交易发起贿赂攻击的比特币脆弱性分析
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2024-01-18 DOI: 10.1145/3641546
Ghader Ebrahimpour, Mohammad Sayad Haghighi

Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker’s computational power does not exceed 50% of the network power. In this paper, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup and they are given incentives that are dynamically calculated. In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. We will reformulate the bribery attack to propose a general mathematical foundation upon which we build multiple strategies. We show that, unlike Whale Attack, these strategies are practical, especially in the future when halvings lower the mining rewards. In the so called ’guaranteed variable-rate bribing with commitment’ strategy, through optimization by Differential Evolution (DE), we show how double spending is possible in the Bitcoin ecosystem for any transaction whose value is above 218.9BTC, and this comes with 100% success rate. A slight reduction in the success probability, e.g. by 10%, brings the threshold down to 165BTC. If the rationality assumption holds, this shows how vulnerable blockchain-based systems like Bitcoin are. We suggest a soft fork on Bitcoin to fix this issue at the end.

比特币使用区块链技术维护交易秩序,并提供概率保证以防止重复消费,前提是攻击者的计算能力不超过网络能力的 50%。在本文中,我们设计了一种新颖的贿赂攻击,并证明这种保证会遭到极大破坏。在这种设置中,矿工被假定为理性的,他们获得的奖励是动态计算的。在这种攻击中,对手会滥用比特币协议来贿赂矿工,并最大限度地提高自己的收益。我们将重新表述贿赂攻击,提出一个通用数学基础,并在此基础上构建多种策略。我们将证明,与 "鲸鱼攻击 "不同,这些策略是切实可行的,尤其是在未来半价降低挖矿奖励的情况下。在所谓的 "有承诺的保证可变利率贿赂 "策略中,通过差分进化(DE)的优化,我们展示了在比特币生态系统中,任何价值超过 218.9BTC 的交易都有可能出现双重消费,而且成功率高达 100%。稍微降低成功概率,比如降低 10%,阈值就会降低到 165BTC。如果理性假设成立,这就说明了像比特币这样基于区块链的系统是多么脆弱。我们建议对比特币进行软分叉,最终解决这个问题。
{"title":"Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions","authors":"Ghader Ebrahimpour, Mohammad Sayad Haghighi","doi":"10.1145/3641546","DOIUrl":"https://doi.org/10.1145/3641546","url":null,"abstract":"<p>Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker’s computational power does not exceed 50% of the network power. In this paper, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup and they are given incentives that are dynamically calculated. In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. We will reformulate the bribery attack to propose a general mathematical foundation upon which we build multiple strategies. We show that, unlike Whale Attack, these strategies are practical, especially in the future when halvings lower the mining rewards. In the so called ’guaranteed variable-rate bribing with commitment’ strategy, through optimization by Differential Evolution (DE), we show how double spending is possible in the Bitcoin ecosystem for any transaction whose value is above 218.9BTC, and this comes with 100% success rate. A slight reduction in the success probability, e.g. by 10%, brings the threshold down to 165BTC. If the rationality assumption holds, this shows how vulnerable blockchain-based systems like Bitcoin are. We suggest a soft fork on Bitcoin to fix this issue at the end.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139499276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network 在闪电网络中使用强化学习的非侵入式平衡断层扫描技术
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-12-29 DOI: 10.1145/3639366
Yan Qiao, Kui Wu, Majid Khabbazian

The Lightning Network (LN) is a second layer system for solving the scalability problem of Bitcoin transactions. In the current implementation of LN, channel capacity (i.e., the sum of individual balances held in the channel) is public information, while individual balances are kept secret for privacy concerns. Attackers may discover a particular balance of a channel by sending multiple fake payments through the channel. Such an attack, however, can hardly threaten the security of the LN system due to its high cost and noticeable intrusions. In this work, we present a novel non-intrusive balance tomography attack, which infers channel balances silently by performing legal transactions between two pre-created LN nodes. To minimize the cost of the attack, we propose an algorithm to compute the optimal payment amount for each transaction and design a path construction method using reinforcement learning to explore the most informative path to conduct the transactions. Finally, we propose two approaches (NIBT-RL and NIBT-RL-β) to accurately and efficiently infer all individual balances using the results of these transactions. Experiments using simulated account balances over actual LN topology show that our method can accurately infer (90%sim 94% ) of all balances in LN with around 12 USD.

闪电网络(LN)是解决比特币交易可扩展性问题的第二层系统。在目前的 LN 实现中,通道容量(即通道中持有的单个余额总和)是公开信息,而出于隐私考虑,单个余额是保密的。攻击者可以通过发送多笔虚假付款来发现通道的特定余额。然而,这种攻击由于成本高、入侵明显,很难威胁到 LN 系统的安全。在这项工作中,我们提出了一种新颖的非侵入式余额断层扫描攻击,通过在两个预先创建的 LN 节点之间进行合法交易,悄无声息地推断出通道余额。为了最小化攻击成本,我们提出了一种算法来计算每笔交易的最优支付金额,并设计了一种使用强化学习的路径构建方法来探索进行交易的最有信息量的路径。最后,我们提出了两种方法(NIBT-RL 和 NIBT-RL-β),利用这些交易的结果准确有效地推断出所有个人余额。使用实际 LN 拓扑上的模拟账户余额进行的实验表明,我们的方法可以准确地推断出 LN 中的所有余额(90%sim 94%),推断结果约为 12 美元。
{"title":"Non-Intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network","authors":"Yan Qiao, Kui Wu, Majid Khabbazian","doi":"10.1145/3639366","DOIUrl":"https://doi.org/10.1145/3639366","url":null,"abstract":"<p>The Lightning Network (LN) is a second layer system for solving the scalability problem of Bitcoin transactions. In the current implementation of LN, channel capacity (i.e., the sum of individual balances held in the channel) is public information, while individual balances are kept secret for privacy concerns. Attackers may discover a particular balance of a channel by sending multiple <i>fake</i> payments through the channel. Such an attack, however, can hardly threaten the security of the LN system due to its high cost and noticeable intrusions. In this work, we present a novel <i>non-intrusive balance tomography</i> attack, which infers channel balances silently by performing legal transactions between two pre-created LN nodes. To minimize the cost of the attack, we propose an algorithm to compute the optimal payment amount for each transaction and design a path construction method using reinforcement learning to explore the most informative path to conduct the transactions. Finally, we propose two approaches (NIBT-RL and NIBT-RL-<i>β</i>) to accurately and efficiently infer all individual balances using the results of these transactions. Experiments using simulated account balances over actual LN topology show that our method can accurately infer (90%sim 94% ) of all balances in LN with around 12 USD.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139078799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives 头顶上的斯芬克斯:来自对称基元的群组签名
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-12-27 DOI: 10.1145/3638763
Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang

Group signatures and their variants have been widely used in privacy-sensitive scenarios such as anonymous authentication and attestation. In this paper, we present a new post-quantum group signature scheme from symmetric primitives. Using only symmetric primitives makes the scheme less prone to unknown attacks than basing the design on newly proposed hard problems whose security is less well-understood. However, symmetric primitives do not have rich algebraic properties, and this makes it extremely challenging to design a group signature scheme on top of them. It is even more challenging if we want a group signature scheme suitable for real-world applications, one that can support large groups and require few trust assumptions. Our scheme is based on MPC-in-the-head non-interactive zero-knowledge proofs, and we specifically design a novel hash-based group credential scheme, which is rooted in the SPHINCS+ signature scheme but with various modifications to make it MPC (multi-party computation) friendly. The security of the scheme has been proved under the fully dynamic group signature model. We provide an implementation of the scheme and demonstrate the feasibility of handling a group size as large as 260. This is the first group signature scheme from symmetric primitives that supports such a large group size and meets all the security requirements.

群签名及其变体已广泛应用于匿名认证和证明等对隐私敏感的场景。本文从对称基元出发,提出了一种新的后量子群签名方案。只使用对称基元使该方案不容易受到未知攻击,而不是将设计建立在安全性不太了解的新提出的难题上。然而,对称基元并不具有丰富的代数特性,这使得在其基础上设计分组签名方案极具挑战性。如果我们想设计一种适用于现实世界应用的群签名方案,一种能支持大型群组且不需要太多信任假设的方案,那就更具有挑战性了。我们的方案基于 MPC-in-the-head 非交互式零知识证明,我们特别设计了一种新颖的基于哈希值的群组证书方案,该方案植根于 SPHINCS+ 签名方案,但做了各种修改,使其对 MPC(多方计算)友好。该方案的安全性已在全动态群组签名模型下得到证明。我们提供了该方案的实现方法,并演示了处理多达 260 个群组的可行性。这是第一个支持如此大的组规模并满足所有安全要求的对称基元组签名方案。
{"title":"Sphinx-in-the-Head: Group Signatures from Symmetric Primitives","authors":"Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang","doi":"10.1145/3638763","DOIUrl":"https://doi.org/10.1145/3638763","url":null,"abstract":"<p>Group signatures and their variants have been widely used in privacy-sensitive scenarios such as anonymous authentication and attestation. In this paper, we present a new post-quantum group signature scheme from symmetric primitives. Using only symmetric primitives makes the scheme less prone to unknown attacks than basing the design on newly proposed hard problems whose security is less well-understood. However, symmetric primitives do not have rich algebraic properties, and this makes it extremely challenging to design a group signature scheme on top of them. It is even more challenging if we want a group signature scheme suitable for real-world applications, one that can support large groups and require few trust assumptions. Our scheme is based on MPC-in-the-head non-interactive zero-knowledge proofs, and we specifically design a novel hash-based group credential scheme, which is rooted in the SPHINCS+ signature scheme but with various modifications to make it MPC (multi-party computation) friendly. The security of the scheme has been proved under the fully dynamic group signature model. We provide an implementation of the scheme and demonstrate the feasibility of handling a group size as large as 2<sup>60</sup>. This is the first group signature scheme from symmetric primitives that supports such a large group size and meets all the security requirements.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139063268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models DEEPFAKER:人脸深度伪造和检测模型的统一评估平台
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-11-29 DOI: 10.1145/3634914
Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo

DeepFake data contains realistically manipulated faces - its abuses pose a huge threat to the security and privacy-critical applications. Intensive research from academia and industry has produced many deepfake/detection models, leading to a constant race of attack and defense. However, due to the lack of a unified evaluation platform, many critical questions on this subject remain largely unexplored. (i) How is the anti-detection ability of the existing deepfake models? (ii) How generalizable are existing detection models against different deepfake samples? (iii) How effective are the detection APIs provided by the cloud-based vendors? (iv) How evasive and transferable are adversarial deepfakes in the lab and real-world environment? (v) How do various factors impact the performance of deepfake and detection models?

To bridge the gap, we design and implement DEEPFAKER, a unified and comprehensive deepfake-detection evaluation platform. Specifically, DEEPFAKER has integrated 10 state-of-the-art deepfake methods and 9 representative detection methods, while providing a user-friendly interface and modular design that allows for easy integration of new methods. Leveraging DEEPFAKER, we conduct a large-scale empirical study of facial deepfake/detection models and draw a set of key findings: (i) the detection methods have poor generalization on samples generated by different deepfake methods; (ii) there is no significant correlation between anti-detection ability and visual quality of deepfake samples; (iii) the current detection APIs have poor detection performance and adversarial deepfakes can achieve about 70% ASR (attack success rate) on all cloud-based vendors, calling for an urgent need to deploy effective and robust detection APIs; (iv) the detection methods in the lab are more robust against transfer attacks than the detection APIs in the real-world environment; (v) deepfake videos may not always be more difficult to detect after video compression. We envision that DEEPFAKER will benefit future research on facial deepfake and detection.

DeepFake数据包含真实操纵的人脸——它的滥用对安全和隐私关键型应用构成了巨大威胁。学术界和工业界的深入研究已经产生了许多深度伪造/检测模型,导致不断的攻击和防御竞赛。然而,由于缺乏统一的评估平台,这一主题的许多关键问题在很大程度上仍未得到探讨。(1)现有deepfake模型的抗检测能力如何?(ii)现有检测模型对不同深度伪造样本的泛化程度如何?(iii)基于云的供应商提供的检测api的有效性如何?(iv)在实验室和现实环境中,对抗性深度伪造的规避性和可转移性如何?(v)各种因素如何影响深度造假和检测模型的性能?为了弥补这一差距,我们设计并实现了DEEPFAKER,一个统一、全面的深度假检测评估平台。具体来说,DEEPFAKER集成了10种最先进的深度伪造方法和9种代表性的检测方法,同时提供了用户友好的界面和模块化设计,可以轻松集成新方法。利用DEEPFAKER,我们对人脸深度伪造/检测模型进行了大规模的实证研究,并得出了一系列关键发现:(i)检测方法对不同深度伪造方法生成的样本泛化较差;(ii) deepfake样本的抗检测能力与视觉质量之间没有显著的相关性;(iii)目前的检测api检测性能较差,对抗性深度伪造在所有基于云的供应商上可以达到70%左右的ASR(攻击成功率),迫切需要部署有效和健壮的检测api;(iv)实验室中的检测方法对传输攻击的鲁棒性比现实环境中的检测api更强;(v)经过视频压缩后,深度造假视频可能并不总是更难以检测。我们预计,DEEPFAKER将有利于未来的面部深度伪造和检测研究。
{"title":"DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models","authors":"Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo","doi":"10.1145/3634914","DOIUrl":"https://doi.org/10.1145/3634914","url":null,"abstract":"<p>DeepFake data contains realistically manipulated faces - its abuses pose a huge threat to the security and privacy-critical applications. Intensive research from academia and industry has produced many deepfake/detection models, leading to a constant race of attack and defense. However, due to the lack of a unified evaluation platform, many critical questions on this subject remain largely unexplored. <i>(i)</i> How is the anti-detection ability of the existing deepfake models? <i>(ii)</i> How generalizable are existing detection models against different deepfake samples? <i>(iii)</i> How effective are the detection APIs provided by the cloud-based vendors? <i>(iv)</i> How evasive and transferable are adversarial deepfakes in the lab and real-world environment? <i>(v)</i> How do various factors impact the performance of deepfake and detection models? </p><p>To bridge the gap, we design and implement <monospace>DEEPFAKER</monospace>, a unified and comprehensive deepfake-detection evaluation platform. Specifically, <monospace>DEEPFAKER</monospace> has integrated 10 state-of-the-art deepfake methods and 9 representative detection methods, while providing a user-friendly interface and modular design that allows for easy integration of new methods. Leveraging <monospace>DEEPFAKER</monospace>, we conduct a large-scale empirical study of facial deepfake/detection models and draw a set of key findings: <i>(i)</i> the detection methods have poor generalization on samples generated by different deepfake methods; <i>(ii)</i> there is no significant correlation between anti-detection ability and visual quality of deepfake samples; <i>(iii)</i> the current detection APIs have poor detection performance and adversarial deepfakes can achieve about 70% ASR (attack success rate) on all cloud-based vendors, calling for an urgent need to deploy effective and robust detection APIs; <i>(iv)</i> the detection methods in the lab are more robust against transfer attacks than the detection APIs in the real-world environment; <i>(v)</i> deepfake videos may not always be more difficult to detect after video compression. We envision that <monospace>DEEPFAKER</monospace> will benefit future research on facial deepfake and detection.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1