首页 > 最新文献

ACM Transactions on Privacy and Security最新文献

英文 中文
An Experimental Assessment of Inconsistencies in Memory Forensics 记忆取证中不一致性的实验评估
4区 计算机科学 Q1 Computer Science Pub Date : 2023-10-20 DOI: 10.1145/3628600
Jenny Ottmann, Frank Breitinger, Felix Freiling
Memory forensics is concerned with the acquisition and analysis of copies of volatile memory (memory dumps). Based on an empirical assessment of observable inconsistencies in 360 memory dumps of a running Linux system, we confirm a state of overwhelming inconsistency in memory forensics: Almost a third of these dumps had an empty process list and was therefore obviously incomplete. Out of those dumps that were analyzable, almost every second dump showed some form of inconsistency that potentially impacts the interpretation of the dump in a forensic investigation. These results are based on a new way to estimate the level of causal consistency of a memory dump. The factors influencing these inconsistencies are less clear but in general correlate with the level of concurrency (system load and number of threads).
内存取证涉及易失性内存(内存转储)副本的获取和分析。基于对运行Linux系统的360个内存转储中可观察到的不一致性的经验评估,我们确认了内存取证中存在压倒性的不一致性状态:几乎三分之一的这些转储具有空进程列表,因此显然是不完整的。在这些可分析的转储中,几乎每一次转储都显示出某种形式的不一致,这可能会影响取证调查中对转储的解释。这些结果是基于一种新的方法来估计内存转储的因果一致性水平。影响这些不一致的因素不太清楚,但通常与并发级别(系统负载和线程数)相关。
{"title":"An Experimental Assessment of Inconsistencies in Memory Forensics","authors":"Jenny Ottmann, Frank Breitinger, Felix Freiling","doi":"10.1145/3628600","DOIUrl":"https://doi.org/10.1145/3628600","url":null,"abstract":"Memory forensics is concerned with the acquisition and analysis of copies of volatile memory (memory dumps). Based on an empirical assessment of observable inconsistencies in 360 memory dumps of a running Linux system, we confirm a state of overwhelming inconsistency in memory forensics: Almost a third of these dumps had an empty process list and was therefore obviously incomplete. Out of those dumps that were analyzable, almost every second dump showed some form of inconsistency that potentially impacts the interpretation of the dump in a forensic investigation. These results are based on a new way to estimate the level of causal consistency of a memory dump. The factors influencing these inconsistencies are less clear but in general correlate with the level of concurrency (system load and number of threads).","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135567344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems 欺骗对抗欺骗:异构电信系统中的来电显示验证
4区 计算机科学 Q1 Computer Science Pub Date : 2023-09-27 DOI: 10.1145/3625546
Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.
来电显示欺骗是一个全球性的行业问题,经常成为电话欺诈的关键促成因素。为了解决这个问题,美国联邦通信委员会(FCC)要求美国的电信提供商实施STIR/SHAKEN,这是一种基于数字签名的行业驱动解决方案。STIR/SHAKEN依赖于公钥基础设施(PKI)来管理数字证书,但是为全球电信行业扩展这个PKI是极其困难的,如果不是不可能的话。此外,它只适用于基于ip的系统(例如SIP),而传统的非ip系统(例如SS7)则不受保护。到目前为止,搅拌/震动的替代方法还没有得到充分的研究。在本文中,我们提出了一个无pki的解决方案,称为来电显示验证(CIV)。CIV基于质询-响应过程而不是数字签名来验证呼叫者ID,因此不需要PKI。它支持IP和非IP系统。也许与直觉相反,我们表明数字欺骗可以与双音多频率(DTMF)结合使用,以有效地实现挑战响应过程,即使用欺骗来对抗欺骗。我们通过仅更新用户手机上的软件来实现跨异构网络(SS7/SIP)的VoIP、蜂窝电话和固定电话的CIV。这是第一个具有适用于当前电信体系结构中所有三种类型电话系统的工作原型的呼叫者ID身份验证解决方案。最后,我们展示了如何通过将CIV作为服务集成到用户可以订阅的电信云中来优化CIV的实现。
{"title":"Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems","authors":"Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao","doi":"10.1145/3625546","DOIUrl":"https://doi.org/10.1145/3625546","url":null,"abstract":"Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135537407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Auditing for Real-Time Systems 实时系统的系统审计
4区 计算机科学 Q1 Computer Science Pub Date : 2023-09-22 DOI: 10.1145/3625229
Ayoosh Bansal, Anant Kandikuppa, Monowar Hasan, Chien-Ying Chen, Adam Bates, Sibin Mohan
System auditing is an essential tool for detecting malicious events and conducting forensic analysis. Although used extensively on general-purpose systems, auditing frameworks have not been designed with consideration for the unique constraints and properties of Real-Time Systems (RTS). System auditing could provide tremendous benefits for security-critical RTS. However, a naïve deployment of auditing on RTS could violate the temporal requirements of the system while also rendering auditing incomplete and ineffectual. To ensure effective auditing that meets the computational needs of recording complete audit information while adhering to the temporal requirements of the RTS, it is essential to carefully integrate auditing into the real-time (RT) schedule. This work adapts the Linux Audit framework for use in RT Linux by leveraging the common properties of such systems, such as special purpose and predictability. Ellipsis , an efficient system for auditing RTS is devised that learns the expected benign behaviors of the system and generates succinct descriptions of the expected activity. Evaluations using varied RT applications show that Ellipsis reduces the volume of audit records generated during benign activity by up to 97.55%, while recording detailed logs for suspicious activities. Empirical analyses establish that the auditing infrastructure adheres to the properties of predictability and isolation that are important to RTS. Furthermore, the schedulability of RT task sets under audit is comprehensively analyzed to enable the safe integration of auditing in RT task schedules.
系统审计是检测恶意事件和进行取证分析的重要工具。尽管审计框架在通用系统中广泛使用,但在设计时并没有考虑到实时系统(RTS)的独特约束和属性。系统审计可以为安全关键型RTS提供巨大的好处。然而,在RTS上部署naïve审计可能会违反系统的时间需求,同时也会导致审计不完整和无效。为了确保有效的审计满足记录完整审计信息的计算需求,同时遵守RTS的时间要求,必须仔细地将审计集成到实时(RT)计划中。这项工作通过利用这些系统的共同属性(如特殊用途和可预测性)来调整Linux审计框架,以便在RT Linux中使用。Ellipsis是一种高效的RTS审计系统,它可以学习系统的预期良性行为,并生成预期活动的简洁描述。使用各种RT应用程序进行的评估表明,Ellipsis将良性活动期间生成的审计记录量减少了97.55%,同时为可疑活动记录了详细的日志。实证分析表明,审计基础结构遵循对RTS很重要的可预测性和隔离性属性。此外,还全面分析了审计下RT任务集的可调度性,以便在RT任务计划中安全集成审计。
{"title":"System Auditing for Real-Time Systems","authors":"Ayoosh Bansal, Anant Kandikuppa, Monowar Hasan, Chien-Ying Chen, Adam Bates, Sibin Mohan","doi":"10.1145/3625229","DOIUrl":"https://doi.org/10.1145/3625229","url":null,"abstract":"System auditing is an essential tool for detecting malicious events and conducting forensic analysis. Although used extensively on general-purpose systems, auditing frameworks have not been designed with consideration for the unique constraints and properties of Real-Time Systems (RTS). System auditing could provide tremendous benefits for security-critical RTS. However, a naïve deployment of auditing on RTS could violate the temporal requirements of the system while also rendering auditing incomplete and ineffectual. To ensure effective auditing that meets the computational needs of recording complete audit information while adhering to the temporal requirements of the RTS, it is essential to carefully integrate auditing into the real-time (RT) schedule. This work adapts the Linux Audit framework for use in RT Linux by leveraging the common properties of such systems, such as special purpose and predictability. Ellipsis , an efficient system for auditing RTS is devised that learns the expected benign behaviors of the system and generates succinct descriptions of the expected activity. Evaluations using varied RT applications show that Ellipsis reduces the volume of audit records generated during benign activity by up to 97.55%, while recording detailed logs for suspicious activities. Empirical analyses establish that the auditing infrastructure adheres to the properties of predictability and isolation that are important to RTS. Furthermore, the schedulability of RT task sets under audit is comprehensively analyzed to enable the safe integration of auditing in RT task schedules.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting Lightbox:基于光谱指纹的光电传感器攻击检测
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-17 DOI: 10.1145/3615867
Dohyun Kim, Mangi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, Yongdae Kim
Photoelectric sensors are utilized in a range of safety-critical applications, such as medical devices and autonomous vehicles. However, the public exposure of the input channel of a photoelectric sensor makes it vulnerable to malicious inputs. Several studies have suggested possible attacks on photoelectric sensors by injecting malicious signals. While a few defense techniques have been proposed against such attacks, they could be either bypassed or used for limited purposes. In this study, we propose Lightbox, a novel defense system to detect sensor attacks on photoelectric sensors based on signal fingerprinting. Lightbox uses the spectrum of the received light as a feature to distinguish the attacker’s malicious signals from the authentic signal, which is a signal from the sensor’s light source. We evaluated Lightbox against 1) a saturation attacker, 2) a simple spoofing attacker, and 3) a sophisticated attacker who is aware of Lightbox and can combine multiple light sources to mimic the authentic light source. Lightbox achieved the overall accuracy over 99% for the saturation attacker and simple spoofing attacker, and robustness against a sophisticated attacker. We also evaluated Lightbox considering various environments such as transmission medium, background noise, and input waveform. Finally, we demonstrate the practicality of Lightbox with experiments using a single-board computer after further reducing the training time.
光电传感器用于一系列安全关键应用,如医疗设备和自动驾驶汽车。然而,光电传感器输入通道的公开暴露使其容易受到恶意输入。一些研究已经提出了通过注入恶意信号来攻击光电传感器的可能性。虽然针对此类攻击已经提出了一些防御技术,但它们要么可以被绕过,要么用于有限的目的。在这项研究中,我们提出了一种基于信号指纹的新型防御系统Lightbox,用于检测对光电传感器的传感器攻击。Lightbox使用接收光的光谱作为特征来区分攻击者的恶意信号和真实信号,真实信号是来自传感器光源的信号。我们针对以下情况对Lightbox进行了评估:1)饱和攻击者,2)简单的欺骗攻击者,以及3)了解Lightbox并可以组合多个光源来模拟真实光源的复杂攻击者。Lightbox对饱和攻击者和简单欺骗攻击者的总体准确率超过99%,对复杂攻击者的鲁棒性。我们还对Lightbox进行了评估,考虑了各种环境,如传输介质、背景噪声和输入波形。最后,在进一步缩短训练时间后,我们利用单板计算机进行了实验,证明了Lightbox的实用性。
{"title":"Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting","authors":"Dohyun Kim, Mangi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, Yongdae Kim","doi":"10.1145/3615867","DOIUrl":"https://doi.org/10.1145/3615867","url":null,"abstract":"Photoelectric sensors are utilized in a range of safety-critical applications, such as medical devices and autonomous vehicles. However, the public exposure of the input channel of a photoelectric sensor makes it vulnerable to malicious inputs. Several studies have suggested possible attacks on photoelectric sensors by injecting malicious signals. While a few defense techniques have been proposed against such attacks, they could be either bypassed or used for limited purposes. In this study, we propose Lightbox, a novel defense system to detect sensor attacks on photoelectric sensors based on signal fingerprinting. Lightbox uses the spectrum of the received light as a feature to distinguish the attacker’s malicious signals from the authentic signal, which is a signal from the sensor’s light source. We evaluated Lightbox against 1) a saturation attacker, 2) a simple spoofing attacker, and 3) a sophisticated attacker who is aware of Lightbox and can combine multiple light sources to mimic the authentic light source. Lightbox achieved the overall accuracy over 99% for the saturation attacker and simple spoofing attacker, and robustness against a sophisticated attacker. We also evaluated Lightbox considering various environments such as transmission medium, background noise, and input waveform. Finally, we demonstrate the practicality of Lightbox with experiments using a single-board computer after further reducing the training time.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46395049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 围攻下的欺诈检测:实际中毒攻击和防御策略
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-08 DOI: 10.1145/3613244
Tommaso Paladini, Francesco Monti, Mario Polino, Michele Carminati, S. Zanero
Machine learning (ML) models are vulnerable to adversarial machine learning (AML) attacks. Unlike other contexts, the fraud detection domain is characterized by inherent challenges that make conventional approaches hardly applicable. In this paper, we extend the application of AML techniques to the fraud detection task by studying poisoning attacks and their possible countermeasures. First, we present a novel approach for performing poisoning attacks that overcomes the fraud detection domain-specific constraints. It generates fraudulent candidate transactions and tests them against a machine learning-based Oracle, which simulates the target fraud detection system aiming at evading it. Misclassified fraudulent candidate transactions are then integrated into the target detection system’s training set, poisoning its model and shifting its decision boundary. Second, we propose a novel approach that extends the adversarial training technique to mitigate AML attacks: during the training phase of the detection system, we generate artificial frauds by modifying random original legitimate transactions; then, we include them in the training set with the correct label. By doing so, we instruct our model to recognize evasive transactions before an attack occurs. Using two real bank datasets, we evaluate the security of several state-of-the-art fraud detection systems by deploying our poisoning attack with different degrees of attacker’s knowledge and attacking strategies. The experimental results show that our attack works even when the attacker has minimal knowledge of the target system. Then, we demonstrate that the proposed countermeasure can mitigate adversarial attacks by reducing the stolen amount of money up to 100%.
机器学习(ML)模型容易受到对抗性机器学习(AML)攻击。与其他情况不同,欺诈检测领域的特点是固有的挑战,使传统方法几乎不适用。在本文中,我们通过研究中毒攻击及其可能的对策,将AML技术的应用扩展到欺诈检测任务中。首先,我们提出了一种执行中毒攻击的新方法,该方法克服了欺诈检测领域特定的限制。它生成欺诈性候选交易,并将其与基于机器学习的Oracle进行测试,该Oracle模拟旨在规避欺诈的目标欺诈检测系统。然后,将错误分类的欺诈性候选事务集成到目标检测系统的训练集中,使其模型中毒,并改变其决策边界。其次,我们提出了一种新的方法,扩展了对抗性训练技术来减轻AML攻击:在检测系统的训练阶段,我们通过修改随机的原始合法交易来生成人工欺诈;然后,我们将它们包含在带有正确标签的训练集中。通过这样做,我们指示我们的模型在攻击发生之前识别规避交易。使用两个真实的银行数据集,我们通过利用不同程度的攻击者知识和攻击策略部署中毒攻击,评估了几种最先进的欺诈检测系统的安全性。实验结果表明,即使攻击者对目标系统知之甚少,我们的攻击仍然有效。然后,我们证明了所提出的对策可以通过将被盗金额减少到100%来减轻对抗性攻击。
{"title":"Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies","authors":"Tommaso Paladini, Francesco Monti, Mario Polino, Michele Carminati, S. Zanero","doi":"10.1145/3613244","DOIUrl":"https://doi.org/10.1145/3613244","url":null,"abstract":"Machine learning (ML) models are vulnerable to adversarial machine learning (AML) attacks. Unlike other contexts, the fraud detection domain is characterized by inherent challenges that make conventional approaches hardly applicable. In this paper, we extend the application of AML techniques to the fraud detection task by studying poisoning attacks and their possible countermeasures. First, we present a novel approach for performing poisoning attacks that overcomes the fraud detection domain-specific constraints. It generates fraudulent candidate transactions and tests them against a machine learning-based Oracle, which simulates the target fraud detection system aiming at evading it. Misclassified fraudulent candidate transactions are then integrated into the target detection system’s training set, poisoning its model and shifting its decision boundary. Second, we propose a novel approach that extends the adversarial training technique to mitigate AML attacks: during the training phase of the detection system, we generate artificial frauds by modifying random original legitimate transactions; then, we include them in the training set with the correct label. By doing so, we instruct our model to recognize evasive transactions before an attack occurs. Using two real bank datasets, we evaluate the security of several state-of-the-art fraud detection systems by deploying our poisoning attack with different degrees of attacker’s knowledge and attacking strategies. The experimental results show that our attack works even when the attacker has minimal knowledge of the target system. Then, we demonstrate that the proposed countermeasure can mitigate adversarial attacks by reducing the stolen amount of money up to 100%.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48675684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism TLS-MHSA:一种基于多头自注意机制的加密恶意流量有效检测模型
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-07 DOI: 10.1145/3613960
Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security. However, hackers have also exploited the salient features of the TLS protocol to carry out covert malicious attacks, which threaten the security of network space. Currently, the commonly used traffic detection methods are not always reliable when applied to the problem of encrypted malicious traffic detection due to their limitations. The most significant problem is that these methods do not focus on the key features of encrypted traffic. To address this problem, this study proposes an efficient detection model for encrypted malicious traffic based on transport layer security protocol and a multi-head self-attention mechanism called TLS-MHSA. Firstly, we extract the features of TLS traffic during pre-processing and perform traffic statistics to filter redundant features. Then, we use a multi-head self-attention mechanism to focus on learning key features as well as generate the most important combined features to construct the detection model, thereby detecting the encrypted malicious traffic. Finally, we use a public dataset to verify the effectiveness and efficiency of the TLS-MHSA model, and the experimental results show that the proposed TLS-MHSA model has high precision, recall, F1-measure, AUC-ROC as well as higher stability than seven state-of-the-art detection models.
近年来,随着用户对网络安全意识的提高,使用TLS(传输层安全)协议来保护通信信息变得越来越流行。然而,黑客也利用TLS协议的显著特点进行隐蔽的恶意攻击,威胁到网络空间的安全。目前,常用的流量检测方法在应用于加密恶意流量检测问题时,由于其局限性,并不总是可靠的。最重要的问题是,这些方法没有关注加密流量的关键特征。为了解决这个问题,本研究提出了一种基于传输层安全协议和TLS-MHSA多头自注意机制的加密恶意流量有效检测模型。首先,我们在预处理过程中提取TLS流量的特征,并进行流量统计以过滤冗余特征。然后,我们使用多头自注意机制来集中学习关键特征,并生成最重要的组合特征来构建检测模型,从而检测加密的恶意流量。最后,我们使用公共数据集验证了TLS-MHSA模型的有效性和效率,实验结果表明,所提出的TLS-MHSA模型具有高精度、召回率、F1测度、AUC-ROC以及比七个最先进的检测模型更高的稳定性。
{"title":"TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism","authors":"Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad","doi":"10.1145/3613960","DOIUrl":"https://doi.org/10.1145/3613960","url":null,"abstract":"In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security. However, hackers have also exploited the salient features of the TLS protocol to carry out covert malicious attacks, which threaten the security of network space. Currently, the commonly used traffic detection methods are not always reliable when applied to the problem of encrypted malicious traffic detection due to their limitations. The most significant problem is that these methods do not focus on the key features of encrypted traffic. To address this problem, this study proposes an efficient detection model for encrypted malicious traffic based on transport layer security protocol and a multi-head self-attention mechanism called TLS-MHSA. Firstly, we extract the features of TLS traffic during pre-processing and perform traffic statistics to filter redundant features. Then, we use a multi-head self-attention mechanism to focus on learning key features as well as generate the most important combined features to construct the detection model, thereby detecting the encrypted malicious traffic. Finally, we use a public dataset to verify the effectiveness and efficiency of the TLS-MHSA model, and the experimental results show that the proposed TLS-MHSA model has high precision, recall, F1-measure, AUC-ROC as well as higher stability than seven state-of-the-art detection models.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49045332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAM: Query-Efficient Adversarial Attacks Against Graph Neural Networks SAM:针对图神经网络的查询高效对抗性攻击
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-27 DOI: 10.1145/3611307
Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu
Recent studies indicate that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Particularly, adversarially perturbing the graph structure, e.g., flipping edges, can lead to salient degeneration of GNNs’ accuracy. In general, efficiency and stealthiness are two significant metrics to evaluate an attack method in practical use. However, most prevailing graph structure-based attack methods are query intensive, which impacts their practical use. Furthermore, while the stealthiness of perturbations has been discussed in previous studies, the majority of them focus on the attack scenario targeting a single node. To fill the research gap, we present a global attack method against GNNs, Saturation adversarial Attack with Meta-gradient, in this article. We first propose an enhanced meta-learning-based optimization method to obtain useful gradient information concerning graph structural perturbations. Then, leveraging the notion of saturation attack, we devise an effective algorithm to determine the perturbations based on the derived meta-gradients. Meanwhile, to ensure stealthiness, we introduce a similarity constraint to suppress the number of perturbed edges. Thorough experiments demonstrate that our method can effectively depreciate the accuracy of GNNs with a small number of queries. While achieving a higher misclassification rate, we also show that the perturbations developed by our method are not noticeable.
最近的研究表明,图神经网络(gnn)容易受到对抗性攻击。特别是,对抗性地扰动图结构,例如,翻转边缘,会导致gnn的精度显著退化。在实际应用中,效率和隐身性是评估攻击方法的两个重要指标。然而,大多数流行的基于图结构的攻击方法是查询密集型的,这影响了它们的实际使用。此外,虽然之前的研究已经讨论了摄动的隐身性,但大多数研究都集中在针对单个节点的攻击场景上。为了填补这一研究空白,本文提出了一种针对gnn的全局攻击方法——基于元梯度的饱和对抗攻击(SAM)。我们首先提出了一种增强的基于元学习的优化方法,以获得有关图结构扰动的有用梯度信息。然后,利用饱和攻击的概念,我们设计了一种有效的算法来确定基于派生的元梯度的扰动。同时,为了保证算法的隐蔽性,引入了相似度约束来抑制干扰边的数量。实验表明,该方法可以通过少量查询有效地降低gnn的准确率。在获得更高的误分类率的同时,我们还表明,由我们的方法产生的扰动并不明显。
{"title":"SAM: Query-Efficient Adversarial Attacks Against Graph Neural Networks","authors":"Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu","doi":"10.1145/3611307","DOIUrl":"https://doi.org/10.1145/3611307","url":null,"abstract":"Recent studies indicate that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Particularly, adversarially perturbing the graph structure, e.g., flipping edges, can lead to salient degeneration of GNNs’ accuracy. In general, efficiency and stealthiness are two significant metrics to evaluate an attack method in practical use. However, most prevailing graph structure-based attack methods are query intensive, which impacts their practical use. Furthermore, while the stealthiness of perturbations has been discussed in previous studies, the majority of them focus on the attack scenario targeting a single node. To fill the research gap, we present a global attack method against GNNs, Saturation adversarial Attack with Meta-gradient, in this article. We first propose an enhanced meta-learning-based optimization method to obtain useful gradient information concerning graph structural perturbations. Then, leveraging the notion of saturation attack, we devise an effective algorithm to determine the perturbations based on the derived meta-gradients. Meanwhile, to ensure stealthiness, we introduce a similarity constraint to suppress the number of perturbed edges. Thorough experiments demonstrate that our method can effectively depreciate the accuracy of GNNs with a small number of queries. While achieving a higher misclassification rate, we also show that the perturbations developed by our method are not noticeable.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45624385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending Against Membership Inference Attacks on Beacon Services 防范信标服务的成员推理攻击
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-19 DOI: https://dl.acm.org/doi/10.1145/3603627
Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

Large genomic datasets are created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Beacon services have emerged to broaden accessibility to such data. These services enable users to query for the presence of a particular minor allele in a dataset, and information helps care providers determine if genomic variation is spurious or has some known clinical indication. However, various studies have shown that this process can leak information regarding if individuals are members of the underlying dataset. There are various approaches to mitigate this vulnerability, but they are limited in that they (1) typically rely on heuristics to add noise to the Beacon responses; (2) offer probabilistic privacy guarantees only, neglecting data utility; and (3) assume a batch setting where all queries arrive at once. In this article, we present a novel algorithmic framework to ensure privacy in a Beacon service setting with a minimal number of query response flips. We represent this problem as one of combinatorial optimization in both the batch setting and the online setting (where queries arrive sequentially). We introduce principled algorithms with both privacy and, in some cases, worst-case utility guarantees. Moreover, through extensive experiments, we show that the proposed approaches significantly outperform the state of the art in terms of privacy and utility, using a dataset consisting of 800 individuals and 1.3 million single nucleotide variants.

大型基因组数据集是通过许多活动创建的,包括娱乐性家谱调查、生物医学研究和临床护理。与此同时,基因组数据在最初的收集点之外的重用也变得很有价值,但隐私问题往往阻碍了访问。信标服务的出现扩大了对这些数据的可访问性。这些服务使用户能够查询数据集中是否存在特定的次要等位基因,信息可以帮助医疗服务提供者确定基因组变异是虚假的还是有一些已知的临床指征。然而,各种研究表明,这个过程可能会泄露有关个人是否是底层数据集成员的信息。有多种方法可以缓解此漏洞,但它们的局限性在于:(1)通常依赖于启发式方法向Beacon响应添加噪声;(2)仅提供概率隐私保障,忽略数据效用;(3)假设所有查询一次到达的批处理设置。在本文中,我们提出了一种新的算法框架,以确保在Beacon服务设置中使用最少数量的查询响应翻转来保护隐私。我们将这个问题表示为批处理设置和在线设置(查询顺序到达)中的组合优化之一。我们引入了具有隐私性的原则算法,在某些情况下,还具有最坏情况效用保证。此外,通过广泛的实验,我们表明,所提出的方法在隐私和实用性方面明显优于最新技术,使用由800个个体和130万个单核苷酸变体组成的数据集。
{"title":"Defending Against Membership Inference Attacks on Beacon Services","authors":"Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik","doi":"https://dl.acm.org/doi/10.1145/3603627","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3603627","url":null,"abstract":"<p>Large genomic datasets are created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Beacon services have emerged to broaden accessibility to such data. These services enable users to query for the presence of a particular minor allele in a dataset, and information helps care providers determine if genomic variation is spurious or has some known clinical indication. However, various studies have shown that this process can leak information regarding if individuals are members of the underlying dataset. There are various approaches to mitigate this vulnerability, but they are limited in that they (1) typically rely on heuristics to add noise to the Beacon responses; (2) offer probabilistic privacy guarantees only, neglecting data utility; and (3) assume a batch setting where all queries arrive at once. In this article, we present a novel algorithmic framework to ensure privacy in a Beacon service setting with a minimal number of query response flips. We represent this problem as one of combinatorial optimization in both the batch setting and the online setting (where queries arrive sequentially). We introduce principled algorithms with both privacy and, in some cases, worst-case utility guarantees. Moreover, through extensive experiments, we show that the proposed approaches significantly outperform the state of the art in terms of privacy and utility, using a dataset consisting of 800 individuals and 1.3 million single nucleotide variants.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability 对抗复杂性的机械化证明及其在通用可组合性中的应用
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-19 DOI: https://dl.acm.org/doi/10.1145/3589962
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub

In this work, we enhance the EasyCrypt proof assistant to reason about the computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations. Our Hoare logic is built on top of the module system used by EasyCrypt for modeling adversaries. We prove that our logic is sound w.r.t. the semantics of EasyCrypt programs—we also provide full semantics for the EasyCrypt module system, which was lacking previously.

We showcase (for the first time in EasyCrypt and in other computer-aided cryptographic tools) how our approach can express precise relationships between the probability of adversarial success and their execution time. In particular, we can quantify existentially over adversaries in a complexity class and express general composition statements in simulation-based frameworks. Moreover, such statements can be composed to derive standard concrete security bounds for cryptographic constructions whose security is proved in a modular way. As a main benefit of our approach, we revisit security proofs of some well-known cryptographic constructions and present a new formalization of universal composability.

在这项工作中,我们增强了EasyCrypt证明助手来推断对手的计算复杂性。关键的技术工具是用于对抗性计算的计算复杂性(执行时间和oracle调用)推理的Hoare逻辑。我们的Hoare逻辑建立在EasyCrypt用于对对手建模的模块系统之上。我们证明了我们的逻辑除了EasyCrypt程序的语义之外是合理的——我们还为EasyCrypt模块系统提供了以前所缺乏的完整语义。我们(首次在EasyCrypt和其他计算机辅助加密工具中)展示了我们的方法如何表达对抗性成功概率与其执行时间之间的精确关系。特别是,我们可以在复杂性类中对对手进行存在性量化,并在基于模拟的框架中表达通用组合语句。此外,还可以将这些语句组合起来,以导出以模块化方式证明其安全性的加密结构的标准具体安全界。作为我们的方法的主要优点,我们重新审视了一些著名的加密结构的安全性证明,并提出了通用可组合性的新形式化。
{"title":"Mechanized Proofs of Adversarial Complexity and Application to Universal Composability","authors":"Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub","doi":"https://dl.acm.org/doi/10.1145/3589962","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589962","url":null,"abstract":"<p>In this work, we enhance the EasyCrypt proof assistant to reason about the computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations. Our Hoare logic is built on top of the module system used by EasyCrypt for modeling adversaries. We prove that our logic is sound w.r.t. the semantics of EasyCrypt programs—we also provide full semantics for the EasyCrypt module system, which was lacking previously.</p><p>We showcase (for the first time in EasyCrypt and in other computer-aided cryptographic tools) how our approach can express precise relationships between the probability of adversarial success and their execution time. In particular, we can quantify existentially over adversaries in a complexity class and express general composition statements in simulation-based frameworks. Moreover, such statements can be composed to derive standard concrete security bounds for cryptographic constructions whose security is proved in a modular way. As a main benefit of our approach, we revisit security proofs of some well-known cryptographic constructions and present a new formalization of universal composability.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage 一种保护隐私记录链接的漏洞评估框架
IF 2.3 4区 计算机科学 Q1 Computer Science Pub Date : 2023-06-27 DOI: https://dl.acm.org/doi/10.1145/3589641
Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell

The linkage of records to identify common entities across multiple data sources has gained increasing interest over the last few decades. In the absence of unique entity identifiers, quasi-identifying attributes such as personal names and addresses are generally used to link records. Due to privacy concerns that arise when such sensitive information is used, privacy-preserving record linkage (PPRL) methods have been proposed to link records without revealing any sensitive or confidential information about these records. Popular PPRL methods such as Bloom filter encoding, however, are known to be susceptible to various privacy attacks. Therefore, a systematic analysis of the privacy risks associated with sensitive databases as well as PPRL methods used in linkage projects is of great importance. In this article we present a novel framework to assess the vulnerabilities of sensitive databases and existing PPRL encoding methods. We discuss five types of vulnerabilities: frequency, length, co-occurrence, similarity, and similarity neighborhood, of both plaintext and encoded values that an adversary can exploit in order to reidentify sensitive plaintext values from encoded data. In an experimental evaluation we assess the vulnerabilities of two databases using five existing PPRL encoding methods. This evaluation shows that our proposed framework can be used in real-world linkage applications to assess the vulnerabilities associated with sensitive databases to be linked, as well as with PPRL encoding methods.

在过去的几十年里,通过记录链接来识别跨多个数据源的公共实体已经获得了越来越多的关注。在没有唯一实体标识符的情况下,通常使用个人姓名和地址等准标识属性来链接记录。由于在使用这些敏感信息时会出现隐私问题,因此提出了隐私保护记录链接(PPRL)方法,以在不泄露这些记录的任何敏感或机密信息的情况下链接记录。然而,众所周知,流行的PPRL方法(如Bloom过滤器编码)容易受到各种隐私攻击。因此,系统地分析与敏感数据库相关的隐私风险以及在关联项目中使用的PPRL方法是非常重要的。在本文中,我们提出了一个新的框架来评估敏感数据库和现有的PPRL编码方法的漏洞。我们讨论了五种类型的漏洞:频率、长度、共存、相似性和相似性邻域,攻击者可以利用明文和编码值的漏洞,以便从编码数据中重新识别敏感的明文值。在实验评估中,我们使用五种现有的PPRL编码方法对两个数据库的漏洞进行了评估。这一评估表明,我们提出的框架可以在现实世界的链接应用中使用,以评估与要链接的敏感数据库以及PPRL编码方法相关的漏洞。
{"title":"A Vulnerability Assessment Framework for Privacy-preserving Record Linkage","authors":"Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell","doi":"https://dl.acm.org/doi/10.1145/3589641","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589641","url":null,"abstract":"<p>The linkage of records to identify common entities across multiple data sources has gained increasing interest over the last few decades. In the absence of unique entity identifiers, quasi-identifying attributes such as personal names and addresses are generally used to link records. Due to privacy concerns that arise when such sensitive information is used, privacy-preserving record linkage (PPRL) methods have been proposed to link records without revealing any sensitive or confidential information about these records. Popular PPRL methods such as Bloom filter encoding, however, are known to be susceptible to various privacy attacks. Therefore, a systematic analysis of the privacy risks associated with sensitive databases as well as PPRL methods used in linkage projects is of great importance. In this article we present a novel framework to assess the vulnerabilities of sensitive databases and existing PPRL encoding methods. We discuss five types of vulnerabilities: frequency, length, co-occurrence, similarity, and similarity neighborhood, of both plaintext and encoded values that an adversary can exploit in order to reidentify sensitive plaintext values from encoded data. In an experimental evaluation we assess the vulnerabilities of two databases using five existing PPRL encoding methods. This evaluation shows that our proposed framework can be used in real-world linkage applications to assess the vulnerabilities associated with sensitive databases to be linked, as well as with PPRL encoding methods.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1