首页 > 最新文献

ACM Transactions on Privacy and Security最新文献

英文 中文
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism TLS-MHSA:一种基于多头自注意机制的加密恶意流量有效检测模型
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-07 DOI: 10.1145/3613960
Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad
In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security. However, hackers have also exploited the salient features of the TLS protocol to carry out covert malicious attacks, which threaten the security of network space. Currently, the commonly used traffic detection methods are not always reliable when applied to the problem of encrypted malicious traffic detection due to their limitations. The most significant problem is that these methods do not focus on the key features of encrypted traffic. To address this problem, this study proposes an efficient detection model for encrypted malicious traffic based on transport layer security protocol and a multi-head self-attention mechanism called TLS-MHSA. Firstly, we extract the features of TLS traffic during pre-processing and perform traffic statistics to filter redundant features. Then, we use a multi-head self-attention mechanism to focus on learning key features as well as generate the most important combined features to construct the detection model, thereby detecting the encrypted malicious traffic. Finally, we use a public dataset to verify the effectiveness and efficiency of the TLS-MHSA model, and the experimental results show that the proposed TLS-MHSA model has high precision, recall, F1-measure, AUC-ROC as well as higher stability than seven state-of-the-art detection models.
近年来,随着用户对网络安全意识的提高,使用TLS(传输层安全)协议来保护通信信息变得越来越流行。然而,黑客也利用TLS协议的显著特点进行隐蔽的恶意攻击,威胁到网络空间的安全。目前,常用的流量检测方法在应用于加密恶意流量检测问题时,由于其局限性,并不总是可靠的。最重要的问题是,这些方法没有关注加密流量的关键特征。为了解决这个问题,本研究提出了一种基于传输层安全协议和TLS-MHSA多头自注意机制的加密恶意流量有效检测模型。首先,我们在预处理过程中提取TLS流量的特征,并进行流量统计以过滤冗余特征。然后,我们使用多头自注意机制来集中学习关键特征,并生成最重要的组合特征来构建检测模型,从而检测加密的恶意流量。最后,我们使用公共数据集验证了TLS-MHSA模型的有效性和效率,实验结果表明,所提出的TLS-MHSA模型具有高精度、召回率、F1测度、AUC-ROC以及比七个最先进的检测模型更高的稳定性。
{"title":"TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism","authors":"Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad","doi":"10.1145/3613960","DOIUrl":"https://doi.org/10.1145/3613960","url":null,"abstract":"In recent years, the use of TLS (Transport Layer Security) protocol to protect communication information has become increasingly popular as users are more aware of network security. However, hackers have also exploited the salient features of the TLS protocol to carry out covert malicious attacks, which threaten the security of network space. Currently, the commonly used traffic detection methods are not always reliable when applied to the problem of encrypted malicious traffic detection due to their limitations. The most significant problem is that these methods do not focus on the key features of encrypted traffic. To address this problem, this study proposes an efficient detection model for encrypted malicious traffic based on transport layer security protocol and a multi-head self-attention mechanism called TLS-MHSA. Firstly, we extract the features of TLS traffic during pre-processing and perform traffic statistics to filter redundant features. Then, we use a multi-head self-attention mechanism to focus on learning key features as well as generate the most important combined features to construct the detection model, thereby detecting the encrypted malicious traffic. Finally, we use a public dataset to verify the effectiveness and efficiency of the TLS-MHSA model, and the experimental results show that the proposed TLS-MHSA model has high precision, recall, F1-measure, AUC-ROC as well as higher stability than seven state-of-the-art detection models.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49045332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAM: Query-Efficient Adversarial Attacks Against Graph Neural Networks SAM:针对图神经网络的查询高效对抗性攻击
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-27 DOI: 10.1145/3611307
Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu
Recent studies indicate that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Particularly, adversarially perturbing the graph structure, e.g., flipping edges, can lead to salient degeneration of GNNs’ accuracy. In general, efficiency and stealthiness are two significant metrics to evaluate an attack method in practical use. However, most prevailing graph structure-based attack methods are query intensive, which impacts their practical use. Furthermore, while the stealthiness of perturbations has been discussed in previous studies, the majority of them focus on the attack scenario targeting a single node. To fill the research gap, we present a global attack method against GNNs, Saturation adversarial Attack with Meta-gradient, in this article. We first propose an enhanced meta-learning-based optimization method to obtain useful gradient information concerning graph structural perturbations. Then, leveraging the notion of saturation attack, we devise an effective algorithm to determine the perturbations based on the derived meta-gradients. Meanwhile, to ensure stealthiness, we introduce a similarity constraint to suppress the number of perturbed edges. Thorough experiments demonstrate that our method can effectively depreciate the accuracy of GNNs with a small number of queries. While achieving a higher misclassification rate, we also show that the perturbations developed by our method are not noticeable.
最近的研究表明,图神经网络(gnn)容易受到对抗性攻击。特别是,对抗性地扰动图结构,例如,翻转边缘,会导致gnn的精度显著退化。在实际应用中,效率和隐身性是评估攻击方法的两个重要指标。然而,大多数流行的基于图结构的攻击方法是查询密集型的,这影响了它们的实际使用。此外,虽然之前的研究已经讨论了摄动的隐身性,但大多数研究都集中在针对单个节点的攻击场景上。为了填补这一研究空白,本文提出了一种针对gnn的全局攻击方法——基于元梯度的饱和对抗攻击(SAM)。我们首先提出了一种增强的基于元学习的优化方法,以获得有关图结构扰动的有用梯度信息。然后,利用饱和攻击的概念,我们设计了一种有效的算法来确定基于派生的元梯度的扰动。同时,为了保证算法的隐蔽性,引入了相似度约束来抑制干扰边的数量。实验表明,该方法可以通过少量查询有效地降低gnn的准确率。在获得更高的误分类率的同时,我们还表明,由我们的方法产生的扰动并不明显。
{"title":"SAM: Query-Efficient Adversarial Attacks Against Graph Neural Networks","authors":"Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu","doi":"10.1145/3611307","DOIUrl":"https://doi.org/10.1145/3611307","url":null,"abstract":"Recent studies indicate that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Particularly, adversarially perturbing the graph structure, e.g., flipping edges, can lead to salient degeneration of GNNs’ accuracy. In general, efficiency and stealthiness are two significant metrics to evaluate an attack method in practical use. However, most prevailing graph structure-based attack methods are query intensive, which impacts their practical use. Furthermore, while the stealthiness of perturbations has been discussed in previous studies, the majority of them focus on the attack scenario targeting a single node. To fill the research gap, we present a global attack method against GNNs, Saturation adversarial Attack with Meta-gradient, in this article. We first propose an enhanced meta-learning-based optimization method to obtain useful gradient information concerning graph structural perturbations. Then, leveraging the notion of saturation attack, we devise an effective algorithm to determine the perturbations based on the derived meta-gradients. Meanwhile, to ensure stealthiness, we introduce a similarity constraint to suppress the number of perturbed edges. Thorough experiments demonstrate that our method can effectively depreciate the accuracy of GNNs with a small number of queries. While achieving a higher misclassification rate, we also show that the perturbations developed by our method are not noticeable.","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45624385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending Against Membership Inference Attacks on Beacon Services 防范信标服务的成员推理攻击
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-19 DOI: https://dl.acm.org/doi/10.1145/3603627
Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik

Large genomic datasets are created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Beacon services have emerged to broaden accessibility to such data. These services enable users to query for the presence of a particular minor allele in a dataset, and information helps care providers determine if genomic variation is spurious or has some known clinical indication. However, various studies have shown that this process can leak information regarding if individuals are members of the underlying dataset. There are various approaches to mitigate this vulnerability, but they are limited in that they (1) typically rely on heuristics to add noise to the Beacon responses; (2) offer probabilistic privacy guarantees only, neglecting data utility; and (3) assume a batch setting where all queries arrive at once. In this article, we present a novel algorithmic framework to ensure privacy in a Beacon service setting with a minimal number of query response flips. We represent this problem as one of combinatorial optimization in both the batch setting and the online setting (where queries arrive sequentially). We introduce principled algorithms with both privacy and, in some cases, worst-case utility guarantees. Moreover, through extensive experiments, we show that the proposed approaches significantly outperform the state of the art in terms of privacy and utility, using a dataset consisting of 800 individuals and 1.3 million single nucleotide variants.

大型基因组数据集是通过许多活动创建的,包括娱乐性家谱调查、生物医学研究和临床护理。与此同时,基因组数据在最初的收集点之外的重用也变得很有价值,但隐私问题往往阻碍了访问。信标服务的出现扩大了对这些数据的可访问性。这些服务使用户能够查询数据集中是否存在特定的次要等位基因,信息可以帮助医疗服务提供者确定基因组变异是虚假的还是有一些已知的临床指征。然而,各种研究表明,这个过程可能会泄露有关个人是否是底层数据集成员的信息。有多种方法可以缓解此漏洞,但它们的局限性在于:(1)通常依赖于启发式方法向Beacon响应添加噪声;(2)仅提供概率隐私保障,忽略数据效用;(3)假设所有查询一次到达的批处理设置。在本文中,我们提出了一种新的算法框架,以确保在Beacon服务设置中使用最少数量的查询响应翻转来保护隐私。我们将这个问题表示为批处理设置和在线设置(查询顺序到达)中的组合优化之一。我们引入了具有隐私性的原则算法,在某些情况下,还具有最坏情况效用保证。此外,通过广泛的实验,我们表明,所提出的方法在隐私和实用性方面明显优于最新技术,使用由800个个体和130万个单核苷酸变体组成的数据集。
{"title":"Defending Against Membership Inference Attacks on Beacon Services","authors":"Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik","doi":"https://dl.acm.org/doi/10.1145/3603627","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3603627","url":null,"abstract":"<p>Large genomic datasets are created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Beacon services have emerged to broaden accessibility to such data. These services enable users to query for the presence of a particular minor allele in a dataset, and information helps care providers determine if genomic variation is spurious or has some known clinical indication. However, various studies have shown that this process can leak information regarding if individuals are members of the underlying dataset. There are various approaches to mitigate this vulnerability, but they are limited in that they (1) typically rely on heuristics to add noise to the Beacon responses; (2) offer probabilistic privacy guarantees only, neglecting data utility; and (3) assume a batch setting where all queries arrive at once. In this article, we present a novel algorithmic framework to ensure privacy in a Beacon service setting with a minimal number of query response flips. We represent this problem as one of combinatorial optimization in both the batch setting and the online setting (where queries arrive sequentially). We introduce principled algorithms with both privacy and, in some cases, worst-case utility guarantees. Moreover, through extensive experiments, we show that the proposed approaches significantly outperform the state of the art in terms of privacy and utility, using a dataset consisting of 800 individuals and 1.3 million single nucleotide variants.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"1 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability 对抗复杂性的机械化证明及其在通用可组合性中的应用
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-19 DOI: https://dl.acm.org/doi/10.1145/3589962
Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub

In this work, we enhance the EasyCrypt proof assistant to reason about the computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations. Our Hoare logic is built on top of the module system used by EasyCrypt for modeling adversaries. We prove that our logic is sound w.r.t. the semantics of EasyCrypt programs—we also provide full semantics for the EasyCrypt module system, which was lacking previously.

We showcase (for the first time in EasyCrypt and in other computer-aided cryptographic tools) how our approach can express precise relationships between the probability of adversarial success and their execution time. In particular, we can quantify existentially over adversaries in a complexity class and express general composition statements in simulation-based frameworks. Moreover, such statements can be composed to derive standard concrete security bounds for cryptographic constructions whose security is proved in a modular way. As a main benefit of our approach, we revisit security proofs of some well-known cryptographic constructions and present a new formalization of universal composability.

在这项工作中,我们增强了EasyCrypt证明助手来推断对手的计算复杂性。关键的技术工具是用于对抗性计算的计算复杂性(执行时间和oracle调用)推理的Hoare逻辑。我们的Hoare逻辑建立在EasyCrypt用于对对手建模的模块系统之上。我们证明了我们的逻辑除了EasyCrypt程序的语义之外是合理的——我们还为EasyCrypt模块系统提供了以前所缺乏的完整语义。我们(首次在EasyCrypt和其他计算机辅助加密工具中)展示了我们的方法如何表达对抗性成功概率与其执行时间之间的精确关系。特别是,我们可以在复杂性类中对对手进行存在性量化,并在基于模拟的框架中表达通用组合语句。此外,还可以将这些语句组合起来,以导出以模块化方式证明其安全性的加密结构的标准具体安全界。作为我们的方法的主要优点,我们重新审视了一些著名的加密结构的安全性证明,并提出了通用可组合性的新形式化。
{"title":"Mechanized Proofs of Adversarial Complexity and Application to Universal Composability","authors":"Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub","doi":"https://dl.acm.org/doi/10.1145/3589962","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589962","url":null,"abstract":"<p>In this work, we enhance the EasyCrypt proof assistant to reason about the computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle calls) of adversarial computations. Our Hoare logic is built on top of the module system used by EasyCrypt for modeling adversaries. We prove that our logic is sound w.r.t. the semantics of EasyCrypt programs—we also provide full semantics for the EasyCrypt module system, which was lacking previously.</p><p>We showcase (for the first time in EasyCrypt and in other computer-aided cryptographic tools) how our approach can express precise relationships between the probability of adversarial success and their execution time. In particular, we can quantify existentially over adversaries in a complexity class and express general composition statements in simulation-based frameworks. Moreover, such statements can be composed to derive standard concrete security bounds for cryptographic constructions whose security is proved in a modular way. As a main benefit of our approach, we revisit security proofs of some well-known cryptographic constructions and present a new formalization of universal composability.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"38 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage 一种保护隐私记录链接的漏洞评估框架
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-27 DOI: https://dl.acm.org/doi/10.1145/3589641
Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell

The linkage of records to identify common entities across multiple data sources has gained increasing interest over the last few decades. In the absence of unique entity identifiers, quasi-identifying attributes such as personal names and addresses are generally used to link records. Due to privacy concerns that arise when such sensitive information is used, privacy-preserving record linkage (PPRL) methods have been proposed to link records without revealing any sensitive or confidential information about these records. Popular PPRL methods such as Bloom filter encoding, however, are known to be susceptible to various privacy attacks. Therefore, a systematic analysis of the privacy risks associated with sensitive databases as well as PPRL methods used in linkage projects is of great importance. In this article we present a novel framework to assess the vulnerabilities of sensitive databases and existing PPRL encoding methods. We discuss five types of vulnerabilities: frequency, length, co-occurrence, similarity, and similarity neighborhood, of both plaintext and encoded values that an adversary can exploit in order to reidentify sensitive plaintext values from encoded data. In an experimental evaluation we assess the vulnerabilities of two databases using five existing PPRL encoding methods. This evaluation shows that our proposed framework can be used in real-world linkage applications to assess the vulnerabilities associated with sensitive databases to be linked, as well as with PPRL encoding methods.

在过去的几十年里,通过记录链接来识别跨多个数据源的公共实体已经获得了越来越多的关注。在没有唯一实体标识符的情况下,通常使用个人姓名和地址等准标识属性来链接记录。由于在使用这些敏感信息时会出现隐私问题,因此提出了隐私保护记录链接(PPRL)方法,以在不泄露这些记录的任何敏感或机密信息的情况下链接记录。然而,众所周知,流行的PPRL方法(如Bloom过滤器编码)容易受到各种隐私攻击。因此,系统地分析与敏感数据库相关的隐私风险以及在关联项目中使用的PPRL方法是非常重要的。在本文中,我们提出了一个新的框架来评估敏感数据库和现有的PPRL编码方法的漏洞。我们讨论了五种类型的漏洞:频率、长度、共存、相似性和相似性邻域,攻击者可以利用明文和编码值的漏洞,以便从编码数据中重新识别敏感的明文值。在实验评估中,我们使用五种现有的PPRL编码方法对两个数据库的漏洞进行了评估。这一评估表明,我们提出的框架可以在现实世界的链接应用中使用,以评估与要链接的敏感数据库以及PPRL编码方法相关的漏洞。
{"title":"A Vulnerability Assessment Framework for Privacy-preserving Record Linkage","authors":"Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell","doi":"https://dl.acm.org/doi/10.1145/3589641","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589641","url":null,"abstract":"<p>The linkage of records to identify common entities across multiple data sources has gained increasing interest over the last few decades. In the absence of unique entity identifiers, quasi-identifying attributes such as personal names and addresses are generally used to link records. Due to privacy concerns that arise when such sensitive information is used, privacy-preserving record linkage (PPRL) methods have been proposed to link records without revealing any sensitive or confidential information about these records. Popular PPRL methods such as Bloom filter encoding, however, are known to be susceptible to various privacy attacks. Therefore, a systematic analysis of the privacy risks associated with sensitive databases as well as PPRL methods used in linkage projects is of great importance. In this article we present a novel framework to assess the vulnerabilities of sensitive databases and existing PPRL encoding methods. We discuss five types of vulnerabilities: frequency, length, co-occurrence, similarity, and similarity neighborhood, of both plaintext and encoded values that an adversary can exploit in order to reidentify sensitive plaintext values from encoded data. In an experimental evaluation we assess the vulnerabilities of two databases using five existing PPRL encoding methods. This evaluation shows that our proposed framework can be used in real-world linkage applications to assess the vulnerabilities associated with sensitive databases to be linked, as well as with PPRL encoding methods.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"74 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction 欧拉:通过可扩展时间链路预测检测网络横向运动
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-27 DOI: https://dl.acm.org/doi/10.1145/3588771
Isaiah J. King, H. Howie Huang

Lateral movement is a key stage of system compromise used by advanced persistent threats. Detecting it is no simple task. When network host logs are abstracted into discrete temporal graphs, the problem can be reframed as anomalous edge detection in an evolving network. Research in modern deep graph learning techniques has produced many creative and complicated models for this task. However, as is the case in many machine learning fields, the generality of models is of paramount importance for accuracy and scalability during training and inference. In this article, we propose a formalized approach to this problem with a framework we call Euler. It consists of a model-agnostic graph neural network stacked upon a model-agnostic sequence encoding layer such as a recurrent neural network. Models built according to the Euler framework can easily distribute their graph convolutional layers across multiple machines for large performance improvements. Additionally, we demonstrate that Euler-based models are as good, or better, than every state-of-the-art approach to anomalous link detection and prediction that we tested. As anomaly-based intrusion detection systems, our models efficiently identified anomalous connections between entities with high precision and outperformed all other unsupervised techniques for anomalous lateral movement detection. Additionally, we show that as a piece of a larger anomaly detection pipeline, Euler models perform well enough for use in real-world systems. With more advanced, yet still lightweight, alerting mechanisms ingesting the embeddings produced by Euler models, precision is boosted from 0.243, to 0.986 on real-world network traffic.

横向移动是高级持续性威胁所使用的系统入侵的关键阶段。检测它不是一项简单的任务。当网络主机日志被抽象成离散的时间图时,问题可以被重新定义为一个不断发展的网络中的异常边缘检测。现代深度图学习技术的研究已经为这项任务产生了许多创造性和复杂的模型。然而,与许多机器学习领域的情况一样,模型的通用性对于训练和推理过程中的准确性和可扩展性至关重要。在本文中,我们提出了一种形式化的方法来解决这个问题,我们称之为欧拉框架。它由一个模型不可知的图神经网络叠加在一个模型不可知的序列编码层(如循环神经网络)上组成。根据欧拉框架构建的模型可以轻松地将其图形卷积层分布在多台机器上,从而大大提高性能。此外,我们证明了基于欧拉的模型与我们测试过的每一种最先进的异常链接检测和预测方法一样好,甚至更好。作为基于异常的入侵检测系统,我们的模型可以高效、高精度地识别实体之间的异常连接,并且优于所有其他无监督的异常横向移动检测技术。此外,我们还表明,作为更大的异常检测管道的一部分,欧拉模型在实际系统中表现良好。使用更先进但仍然轻量级的警报机制摄取欧拉模型产生的嵌入,在真实网络流量上的精度从0.243提高到0.986。
{"title":"Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction","authors":"Isaiah J. King, H. Howie Huang","doi":"https://dl.acm.org/doi/10.1145/3588771","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3588771","url":null,"abstract":"<p>Lateral movement is a key stage of system compromise used by advanced persistent threats. Detecting it is no simple task. When network host logs are abstracted into discrete temporal graphs, the problem can be reframed as anomalous edge detection in an evolving network. Research in modern deep graph learning techniques has produced many creative and complicated models for this task. However, as is the case in many machine learning fields, the generality of models is of paramount importance for accuracy and scalability during training and inference. In this article, we propose a formalized approach to this problem with a framework we call <span>Euler</span>. It consists of a model-agnostic graph neural network stacked upon a model-agnostic sequence encoding layer such as a recurrent neural network. Models built according to the <span>Euler</span> framework can easily distribute their graph convolutional layers across multiple machines for large performance improvements. Additionally, we demonstrate that <span>Euler</span>-based models are as good, or better, than every state-of-the-art approach to anomalous link detection and prediction that we tested. As anomaly-based intrusion detection systems, our models efficiently identified anomalous connections between entities with high precision and outperformed all other unsupervised techniques for anomalous lateral movement detection. Additionally, we show that as a piece of a larger anomaly detection pipeline, <span>Euler</span> models perform well enough for use in real-world systems. With more advanced, yet still lightweight, alerting mechanisms ingesting the embeddings produced by <span>Euler</span> models, precision is boosted from 0.243, to 0.986 on real-world network traffic.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"18 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs 异构tee上分布式事件驱动Enclave应用的端到端安全性
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: https://dl.acm.org/doi/10.1145/3592607
Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg

This article presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives provided by Trusted Execution Environments (TEEs) to guarantee authenticity and integrity properties of applications, and to secure control of input and output devices. More specifically, we guarantee that if an output is produced by the application, it was allowed to be produced by the application’s source code based on an authentic trace of inputs.

We present an integrated open-source framework to develop, deploy, and use such applications across heterogeneous TEEs. Beyond authenticity and integrity, our framework optionally provides confidentiality and a notion of availability, and facilitates software development at a high level of abstraction over the platform-specific TEE layer. We support event-driven programming to develop distributed enclave applications in Rust and C for heterogeneous TEE, including Intel SGX, ARM TrustZone, and Sancus.

In this article we discuss the workings of our approach, the extensions we made to the Sancus processor, and the integration of our development model with commercial TEEs. Our evaluation of security and performance aspects show that TEEs, together with our programming model, form a basis for powerful security architectures for dependable systems in domains such as Industrial Control Systems and the Internet of Things, illustrating our framework’s unique suitability for a broad range of use cases which combine cloud processing, mobile and edge devices, and lightweight sensing and actuation.

本文提供了一种方法,可以在依赖于小型可信计算基础的情况下,为共享基础设施上的分布式事件驱动应用程序的安全执行提供强有力的保证。我们基于可信执行环境(tee)提供的安全原语进行构建和扩展,以保证应用程序的真实性和完整性属性,并确保对输入和输出设备的控制安全。更具体地说,我们保证如果一个输出是由应用程序产生的,那么它是允许由应用程序的源代码基于输入的真实跟踪产生的。我们提供了一个集成的开源框架,用于跨异构tee开发、部署和使用此类应用程序。除了真实性和完整性之外,我们的框架还可选地提供机密性和可用性的概念,并在特定于平台的TEE层上促进高层次抽象的软件开发。我们支持事件驱动编程,以Rust和C语言为异构TEE开发分布式enclave应用程序,包括Intel SGX、ARM TrustZone和Sancus。在本文中,我们将讨论我们的方法的工作方式,我们对Sancus处理器所做的扩展,以及我们的开发模型与商业tee的集成。我们对安全和性能方面的评估表明,tee与我们的编程模型一起,构成了工业控制系统和物联网等领域可靠系统的强大安全架构的基础,说明了我们的框架对结合云处理、移动和边缘设备以及轻量级传感和驱动的广泛用例的独特适用性。
{"title":"End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs","authors":"Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg","doi":"https://dl.acm.org/doi/10.1145/3592607","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3592607","url":null,"abstract":"<p>This article presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives provided by Trusted Execution Environments (TEEs) to guarantee authenticity and integrity properties of applications, and to secure control of input and output devices. More specifically, we guarantee that if an output is produced by the application, it was allowed to be produced by the application’s source code based on an authentic trace of inputs.</p><p>We present an integrated open-source framework to develop, deploy, and use such applications across heterogeneous TEEs. Beyond authenticity and integrity, our framework optionally provides confidentiality and a notion of availability, and facilitates software development at a high level of abstraction over the platform-specific TEE layer. We support event-driven programming to develop distributed enclave applications in Rust and C for heterogeneous TEE, including Intel SGX, ARM TrustZone, and Sancus.</p><p>In this article we discuss the workings of our approach, the extensions we made to the Sancus processor, and the integration of our development model with commercial TEEs. Our evaluation of security and performance aspects show that TEEs, together with our programming model, form a basis for powerful security architectures for dependable systems in domains such as Industrial Control Systems and the Internet of Things, illustrating our framework’s unique suitability for a broad range of use cases which combine cloud processing, mobile and edge devices, and lightweight sensing and actuation.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"219 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks 超越梯度:利用模型反转攻击中的对抗性先验
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: https://dl.acm.org/doi/10.1145/3592800
Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis

Collaborative machine learning settings such as federated learning can be susceptible to adversarial interference and attacks. One class of such attacks is termed model inversion attacks, characterised by the adversary reverse-engineering the model into disclosing the training data. Previous implementations of this attack typically only rely on the shared data representations, ignoring the adversarial priors, or require that specific layers are present in the target model, reducing the potential attack surface. In this work, we propose a novel context-agnostic model inversion framework that builds on the foundations of gradient-based inversion attacks, but additionally exploits the features and the style of the data controlled by an in-the-network adversary. Our technique outperforms existing gradient-based approaches both qualitatively and quantitatively across all training settings, showing particular effectiveness against the collaborative medical imaging tasks. Finally, we demonstrate that our method achieves significant success on two downstream tasks: sensitive feature inference and facial recognition spoofing.

协作机器学习设置(如联邦学习)可能容易受到对抗性干扰和攻击。其中一类攻击被称为模型反转攻击,其特征是攻击者对模型进行逆向工程,使其暴露训练数据。这种攻击的先前实现通常只依赖于共享数据表示,而忽略了对抗性先验,或者要求目标模型中存在特定的层,从而减少了潜在的攻击面。在这项工作中,我们提出了一种新的上下文无关模型反演框架,该框架建立在基于梯度的反演攻击的基础上,但还利用了网络内对手控制的数据的特征和风格。我们的技术在所有训练设置的定性和定量上都优于现有的基于梯度的方法,在协作医学成像任务中表现出特别的有效性。最后,我们证明了我们的方法在两个下游任务上取得了显著的成功:敏感特征推理和面部识别欺骗。
{"title":"Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks","authors":"Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis","doi":"https://dl.acm.org/doi/10.1145/3592800","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3592800","url":null,"abstract":"<p>Collaborative machine learning settings such as federated learning can be susceptible to adversarial interference and attacks. One class of such attacks is termed <i>model inversion attacks</i>, characterised by the adversary reverse-engineering the model into disclosing the training data. Previous implementations of this attack typically <i>only</i> rely on the shared data representations, ignoring the adversarial priors, or require that specific layers are present in the target model, reducing the potential attack surface. In this work, we propose a novel context-agnostic model inversion framework that builds on the foundations of gradient-based inversion attacks, but additionally exploits the features and the style of the data controlled by an in-the-network adversary. Our technique outperforms existing gradient-based approaches both qualitatively and quantitatively across all training settings, showing particular effectiveness against the collaborative medical imaging tasks. Finally, we demonstrate that our method achieves significant success on two downstream tasks: sensitive feature inference and facial recognition spoofing.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"25 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets 广义GGM树的多用户约束伪随机函数安全性研究
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: https://dl.acm.org/doi/10.1145/3592608
Chun Guo, Xiao Wang, Xiang Xie, Yu Yu

Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom generator to pseudorandom function transformation of Goldreich, Goldwasser, and Micali, with a goal to provide references for its recently popularized use in applied cryptography. We propose a generalized model for GGM trees and analyze its mu prefix-constrained pseudorandom function security in the random oracle model. Our model allows to derive concrete bounds and improvements for various protocols, and we showcase on the Bitcoin-Improvement-Proposal standard Bip32 hierarchical wallets and function secret sharing protocols. In both scenarios, we propose improvements with better performance and concrete security bounds at the same time. Compared with the state-of-the-art designs, our SHACAL3- and Keccak-p-based Bip32 variants reduce the communication cost of MPC-based implementations by 73.3% to 93.8%, whereas our AES-based function secret sharing substantially improves mu security while reducing computations by 50%.

多用户(mu)安全性考虑的是大规模攻击者,在给定对多个密码系统实例的访问权限后,试图破坏其中至少一个。本文对Goldreich、Goldwasser、Micali等人的伪随机生成器到伪随机函数变换的所谓GGM树的mu安全性进行了初步研究,旨在为其在应用密码学中的普及应用提供参考。提出了一种广义的GGM树模型,并在随机oracle模型中分析了其mu前缀约束伪随机函数的安全性。我们的模型允许推导出各种协议的具体界限和改进,我们展示了比特币改进建议标准Bip32分层钱包和功能秘密共享协议。在这两种情况下,我们同时提出了性能更好和具体安全边界的改进。与最先进的设计相比,我们基于shaal3和keccak -p的Bip32变体将基于mpc的实现的通信成本降低了73.3%至93.8%,而我们基于aes的功能秘密共享大大提高了mu安全性,同时减少了50%的计算量。
{"title":"The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets","authors":"Chun Guo, Xiao Wang, Xiang Xie, Yu Yu","doi":"https://dl.acm.org/doi/10.1145/3592608","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3592608","url":null,"abstract":"<p>Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom generator to pseudorandom function transformation of Goldreich, Goldwasser, and Micali, with a goal to provide references for its recently popularized use in applied cryptography. We propose a generalized model for GGM trees and analyze its <i>mu prefix-constrained pseudorandom function</i> security in the random oracle model. Our model allows to derive concrete bounds and improvements for various protocols, and we showcase on the Bitcoin-Improvement-Proposal standard <sans-serif>Bip32</sans-serif> hierarchical wallets and function secret sharing protocols. In both scenarios, we propose improvements with better performance and concrete security bounds at the same time. Compared with the state-of-the-art designs, our <sans-serif>SHACAL3</sans-serif>- and <span>Keccak</span>-p-based <sans-serif>Bip32</sans-serif> variants reduce the communication cost of MPC-based implementations by 73.3% to 93.8%, whereas our <sans-serif>AES</sans-serif>-based function secret sharing substantially improves mu security while reducing computations by 50%.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"28 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure 通用拓扑结构下多智能体系统的隐私保护弹性一致性
IF 2.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: https://dl.acm.org/doi/10.1145/3587933
Jian Hou, Jing Wang, Mingyue Zhang, Zhi Jin, Chunlin Wei, Zuohua Ding

Recent advances of consensus control have made it significant in multi-agent systems such as in distributed machine learning, distributed multi-vehicle cooperative systems. However, during its application it is crucial to achieve resilience and privacy; specifically, when there are adversary/faulty nodes in a general topology structure, normal agents can also reach consensus while keeping their actual states unobserved.

In this article, we modify the state-of-the-art Q-consensus algorithm by introducing predefined noise or well-designed cryptography to guarantee the privacy of each agent state. In the former case, we add specified noise on agent state before it is transmitted to the neighbors and then gradually decrease the value of noise so the exact agent state cannot be evaluated. In the latter one, the Paillier cryptosystem is applied for reconstructing reward function in two consecutive interactions between each pair of neighboring agents. Therefore, multi-agent privacy-preserving resilient consensus (MAPPRC) can be achieved in a general topology structure. Moreover, in the modified version, we reconstruct reward function and credibility function so both convergence rate and stability of the system are improved.

The simulation results indicate the algorithms’ tolerance for constant and/or persistent faulty agents as well as their protection of privacy. Compared with the previous studies that consider both resilience and privacy-preserving requirements, the proposed algorithms in this article greatly relax the topological conditions. At the end of the article, to verify the effectiveness of the proposed algorithms, we conduct two sets of experiments, i.e., a smart-car hardware platform consisting of four vehicles and a distributed machine learning platform containing 10 workers and a server.

共识控制的最新进展使其在分布式机器学习、分布式多车辆协作系统等多智能体系统中具有重要意义。然而,在应用过程中,实现弹性和隐私是至关重要的;具体来说,当一般拓扑结构中存在对手/故障节点时,正常代理也可以在保持其实际状态不被观察的情况下达成共识。在本文中,我们通过引入预定义的噪声或精心设计的加密来修改最先进的Q-consensus算法,以保证每个代理状态的隐私性。在前一种情况下,我们在智能体状态传递给邻居之前,在其上加入指定的噪声,然后逐渐减小噪声的值,从而无法评估出智能体的确切状态。在后一种算法中,采用Paillier密码系统重构相邻智能体之间的连续交互中的奖励函数。因此,多智能体隐私保护弹性共识(MAPPRC)可以在一般的拓扑结构中实现。此外,在改进版本中,我们重构了奖励函数和可信度函数,从而提高了系统的收敛速度和稳定性。仿真结果表明了算法对持续故障代理的容忍度以及对隐私的保护。与以往同时考虑弹性和隐私保护要求的研究相比,本文提出的算法大大放宽了拓扑条件。在文章的最后,为了验证所提出算法的有效性,我们进行了两组实验,即由四辆车组成的智能汽车硬件平台和包含10名工人和一台服务器的分布式机器学习平台。
{"title":"Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure","authors":"Jian Hou, Jing Wang, Mingyue Zhang, Zhi Jin, Chunlin Wei, Zuohua Ding","doi":"https://dl.acm.org/doi/10.1145/3587933","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3587933","url":null,"abstract":"<p>Recent advances of consensus control have made it significant in multi-agent systems such as in distributed machine learning, distributed multi-vehicle cooperative systems. However, during its application it is crucial to achieve resilience and privacy; specifically, when there are adversary/faulty nodes in a general topology structure, normal agents can also reach consensus while keeping their actual states unobserved.</p><p>In this article, we modify the state-of-the-art Q-consensus algorithm by introducing predefined noise or well-designed cryptography to guarantee the privacy of each agent state. In the former case, we add specified noise on agent state before it is transmitted to the neighbors and then gradually decrease the value of noise so the exact agent state cannot be evaluated. In the latter one, the Paillier cryptosystem is applied for reconstructing reward function in two consecutive interactions between each pair of neighboring agents. Therefore, multi-agent privacy-preserving resilient consensus (MAPPRC) can be achieved in a general topology structure. Moreover, in the modified version, we reconstruct reward function and credibility function so both convergence rate and stability of the system are improved.</p><p>The simulation results indicate the algorithms’ tolerance for constant and/or persistent faulty agents as well as their protection of privacy. Compared with the previous studies that consider both resilience and privacy-preserving requirements, the proposed algorithms in this article greatly relax the topological conditions. At the end of the article, to verify the effectiveness of the proposed algorithms, we conduct two sets of experiments, i.e., a smart-car hardware platform consisting of four vehicles and a distributed machine learning platform containing 10 workers and a server.</p>","PeriodicalId":56050,"journal":{"name":"ACM Transactions on Privacy and Security","volume":"90 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138540669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Privacy and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1