首页 > 最新文献

2017 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
A Framework for Universally Composable Diffie-Hellman Key Exchange 通用可组合Diffie-Hellman密钥交换框架
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.63
Ralf Küsters, Daniel Rausch
The analysis of real-world protocols, in particular key exchange protocols and protocols building on these protocols, is a very complex, error-prone, and tedious task. Besides the complexity of the protocols itself, one important reason for this is that the security of the protocols has to be reduced to the security of the underlying cryptographic primitives for every protocol time and again. We would therefore like to get rid of reduction proofs for real-world key exchange protocols as much as possible and in many cases altogether, also for higher-level protocols which use the exchanged keys. So far some first steps have been taken in this direction. But existing work is still quite limited, and, for example, does not support Diffie-Hellman (DH) key exchange, a prevalent cryptographic primitive for real-world protocols. In this paper, building on work by Küsters and Tuengerthal, we provide an ideal functionality in the universal composability setting which supports several common cryptographic primitives, including DH key exchange. This functionality helps to avoid reduction proofs in the analysis of real-world protocols and often eliminates them completely. We also propose a new general ideal key exchange functionality which allows higher-level protocols to use exchanged keys in an ideal way. As a proof of concept, we apply our framework to three practical DH key exchange protocols, namely ISO 9798-3, SIGMA, and OPTLS.
分析现实世界的协议,特别是密钥交换协议和建立在这些协议之上的协议,是一项非常复杂、容易出错且乏味的任务。除了协议本身的复杂性之外,一个重要的原因是协议的安全性必须一次又一次地降低到每个协议的底层加密原语的安全性。因此,我们希望尽可能地摆脱现实世界密钥交换协议的约简证明,在许多情况下,对于使用交换密钥的高级协议也是如此。到目前为止,已经朝这个方向迈出了一些初步步骤。但是现有的工作仍然非常有限,例如,不支持Diffie-Hellman (DH)密钥交换,这是现实世界协议的一种流行的加密原语。在本文中,基于k sters和Tuengerthal的工作,我们在通用可组合性设置中提供了一个理想的功能,该功能支持几种常见的加密原语,包括DH密钥交换。此功能有助于避免在分析现实世界的协议时使用约简证明,并且经常完全消除它们。我们还提出了一种新的通用理想密钥交换功能,它允许高层协议以理想的方式使用交换的密钥。作为概念验证,我们将我们的框架应用于三个实用的DH密钥交换协议,即ISO 9798-3, SIGMA和OPTLS。
{"title":"A Framework for Universally Composable Diffie-Hellman Key Exchange","authors":"Ralf Küsters, Daniel Rausch","doi":"10.1109/SP.2017.63","DOIUrl":"https://doi.org/10.1109/SP.2017.63","url":null,"abstract":"The analysis of real-world protocols, in particular key exchange protocols and protocols building on these protocols, is a very complex, error-prone, and tedious task. Besides the complexity of the protocols itself, one important reason for this is that the security of the protocols has to be reduced to the security of the underlying cryptographic primitives for every protocol time and again. We would therefore like to get rid of reduction proofs for real-world key exchange protocols as much as possible and in many cases altogether, also for higher-level protocols which use the exchanged keys. So far some first steps have been taken in this direction. But existing work is still quite limited, and, for example, does not support Diffie-Hellman (DH) key exchange, a prevalent cryptographic primitive for real-world protocols. In this paper, building on work by Küsters and Tuengerthal, we provide an ideal functionality in the universal composability setting which supports several common cryptographic primitives, including DH key exchange. This functionality helps to avoid reduction proofs in the analysis of real-world protocols and often eliminates them completely. We also propose a new general ideal key exchange functionality which allows higher-level protocols to use exchanged keys in an ideal way. As a proof of concept, we apply our framework to three practical DH key exchange protocols, namely ISO 9798-3, SIGMA, and OPTLS.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"30 1","pages":"881-900"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82797888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multi-touch Authentication Using Hand Geometry and Behavioral Information 使用手几何和行为信息的多点触摸认证
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.54
Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang
In this paper we present a simple and reliable authentication method for mobile devices equipped with multi-touch screens such as smart phones, tablets and laptops. Users are authenticated by performing specially designed multi-touch gestures with one swipe on the touchscreen. During this process, both hand geometry and behavioral characteristics are recorded in the multi-touch traces and used for authentication. By combining both geometry information and behavioral characteristics, we overcome the problem of behavioral variability plaguing many behavior based authentication techniques – which often leads to less accurate authentication or poor user experience – while also ensuring the discernibility of different users with possibly similar handshapes. We evaluate the design of the proposed authentication method thoroughly using a large multi-touch dataset collected from 161 subjects with an elaborately designed procedure to capture behavior variability. The results demonstrate that the fusion of behavioral information with hand geometry features produces effective resistance to behavioral variability over time while at the same time retains discernibility. Our approach achieves EER of 5.84% with only 5 training samples and the performance is further improved to EER of 1.88% with enough training. Security analyses are also conducted to demonstrate that the proposed method is resilient against common smartphone authentication threats such as smudge attack, shoulder surfing attack and statistical attack. Finally, user acceptance of the method is illustrated via a usability study.
本文针对智能手机、平板电脑、笔记本电脑等配备多点触控屏的移动设备,提出了一种简单可靠的身份验证方法。用户通过在触摸屏上进行特别设计的多点触摸手势来进行身份验证。在这个过程中,手的几何形状和行为特征都记录在多点触摸痕迹中,并用于身份验证。通过结合几何信息和行为特征,我们克服了困扰许多基于行为的身份验证技术的行为可变性问题——这通常会导致身份验证不准确或用户体验差——同时也确保了具有相似手型的不同用户的可识别性。我们使用从161名受试者中收集的大型多点触摸数据集,通过精心设计的程序来捕获行为可变性,彻底评估了所提出的认证方法的设计。结果表明,行为信息与手部几何特征的融合可以有效地抵抗行为随时间的变化,同时保持可识别性。我们的方法在5个训练样本的情况下达到了5.84%的EER,在训练足够的情况下,性能进一步提高到1.88%的EER。安全性分析也证明了所提出的方法对常见的智能手机身份验证威胁(如涂抹攻击、肩部冲浪攻击和统计攻击)具有弹性。最后,通过可用性研究说明了用户对该方法的接受程度。
{"title":"Multi-touch Authentication Using Hand Geometry and Behavioral Information","authors":"Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang","doi":"10.1109/SP.2017.54","DOIUrl":"https://doi.org/10.1109/SP.2017.54","url":null,"abstract":"In this paper we present a simple and reliable authentication method for mobile devices equipped with multi-touch screens such as smart phones, tablets and laptops. Users are authenticated by performing specially designed multi-touch gestures with one swipe on the touchscreen. During this process, both hand geometry and behavioral characteristics are recorded in the multi-touch traces and used for authentication. By combining both geometry information and behavioral characteristics, we overcome the problem of behavioral variability plaguing many behavior based authentication techniques – which often leads to less accurate authentication or poor user experience – while also ensuring the discernibility of different users with possibly similar handshapes. We evaluate the design of the proposed authentication method thoroughly using a large multi-touch dataset collected from 161 subjects with an elaborately designed procedure to capture behavior variability. The results demonstrate that the fusion of behavioral information with hand geometry features produces effective resistance to behavioral variability over time while at the same time retains discernibility. Our approach achieves EER of 5.84% with only 5 training samples and the performance is further improved to EER of 1.88% with enough training. Security analyses are also conducted to demonstrate that the proposed method is resilient against common smartphone authentication threats such as smudge attack, shoulder surfing attack and statistical attack. Finally, user acceptance of the method is illustrated via a usability study.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"23 1","pages":"357-372"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83038704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit 科学、安全以及作为科学追求的安全的难以实现的目标
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.38
Cormac Herley, P. V. Oorschot
The past ten years has seen increasing calls to makesecurity research more "scientific".On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means inthe context of computer security research, or consensus onwhat a "Science of Security" should look like. We selectively review work in the history and philosophy of scienceand more recent work under the label "Science of Security".We explore what has been done under the theme of relating science and security, put this in context with historical science, and offer observations and insights we hope maymotivate further exploration and guidance. Among our findings are thatpractices on which the rest of science has reached consensus appear little usedor recognized in security, and a pattern of methodological errors continues unaddressed.
过去十年,越来越多的人呼吁让安全研究更加“科学”。从表面上看,大多数人认为这是可取的,因为人们普遍承认“科学”是一种积极的力量。然而,我们发现,在计算机安全研究的背景下,“科学”的含义很少明确,或者对“安全科学”应该是什么样子的共识也很少。我们在“安全科学”的标签下,选择性地回顾了科学史和哲学方面的工作,以及最近的工作。我们围绕科学与安全的关系这一主题,结合历史科学,对已取得的成就进行了探讨,并提出了自己的观察和见解,希望能够推动进一步探索和指导。我们的发现包括,其他科学领域已经达成共识的做法在安全领域似乎很少被使用或认可,而且一种方法错误的模式仍然没有得到解决。
{"title":"SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit","authors":"Cormac Herley, P. V. Oorschot","doi":"10.1109/SP.2017.38","DOIUrl":"https://doi.org/10.1109/SP.2017.38","url":null,"abstract":"The past ten years has seen increasing calls to makesecurity research more \"scientific\".On the surface, most agree that this is desirable, given universal recognition of \"science\" as a positive force. However, we find that there is little clarity on what \"scientific\" means inthe context of computer security research, or consensus onwhat a \"Science of Security\" should look like. We selectively review work in the history and philosophy of scienceand more recent work under the label \"Science of Security\".We explore what has been done under the theme of relating science and security, put this in context with historical science, and offer observations and insights we hope maymotivate further exploration and guidance. Among our findings are thatpractices on which the rest of science has reached consensus appear little usedor recognized in security, and a pattern of methodological errors continues unaddressed.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"41 1","pages":"99-120"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76354746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security 栈溢出是否有害?复制粘贴对Android应用安全的影响
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.31
Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Y. Acar, M. Backes, S. Fahl
Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Previous research identified Stack Overflow as one of the most important information sources developers rely on. Anecdotes report that software developers copy and paste code snippets from those information sources for convenience reasons. Such behavior results in a constant flow of community-provided code snippets into production software. To date, the impact of this behaviour on code security is unknown. We answer this highly important question by quantifying the proliferation of security-related code snippets from Stack Overflow in Android applications available on Google Play. Access to the rich source of information available on Stack Overflow including ready-to-use code snippets provides huge benefits for software developers. However, when it comes to code security there are some caveats to bear in mind: Due to the complex nature of code security, it is very difficult to provide ready-to-use and secure solutions for every problem. Hence, integrating a security-related code snippet from Stack Overflow into production software requires caution and expertise. Unsurprisingly, we observed insecure code snippets being copied into Android applications millions of users install from Google Play every day. To quantitatively evaluate the extent of this observation, we scanned Stack Overflow for code snippets and evaluated their security score using a stochastic gradient descent classifier. In order to identify code reuse in Android applications, we applied state-of-the-art static analysis. Our results are alarming: 15.4% of the 1.3 million Android applications we analyzed, contained security-related code snippets from Stack Overflow. Out of these 97.9% contain at least one insecure code snippet.
Stack Overflow等在线编程讨论平台为软件开发人员提供了丰富的信息来源。可用的信息包括充满活力的讨论和随时可用的代码片段。先前的研究将堆栈溢出确定为开发人员依赖的最重要的信息源之一。轶事报告称,软件开发人员出于方便的原因从这些信息源复制和粘贴代码片段。这种行为导致社区提供的代码片段不断流入生产软件。到目前为止,这种行为对代码安全性的影响尚不清楚。我们通过量化Google Play上的Android应用程序中Stack Overflow的安全相关代码片段的扩散来回答这个非常重要的问题。访问Stack Overflow上提供的丰富信息源,包括现成的代码片段,为软件开发人员提供了巨大的好处。然而,当涉及到代码安全性时,需要记住一些注意事项:由于代码安全性的复杂性,很难为每个问题提供即用和安全的解决方案。因此,将Stack Overflow中的安全相关代码片段集成到生产软件中需要谨慎和专业知识。不出所料,我们发现每天都有数百万用户从Google Play安装不安全的代码片段被复制到Android应用中。为了定量地评估这种观察的程度,我们扫描了Stack Overflow的代码片段,并使用随机梯度下降分类器评估了它们的安全性评分。为了识别Android应用程序中的代码重用,我们应用了最先进的静态分析。我们的结果令人震惊:在我们分析的130万个Android应用程序中,有15.4%包含来自Stack Overflow的安全相关代码片段。其中97.9%包含至少一个不安全的代码片段。
{"title":"Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security","authors":"Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Y. Acar, M. Backes, S. Fahl","doi":"10.1109/SP.2017.31","DOIUrl":"https://doi.org/10.1109/SP.2017.31","url":null,"abstract":"Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Previous research identified Stack Overflow as one of the most important information sources developers rely on. Anecdotes report that software developers copy and paste code snippets from those information sources for convenience reasons. Such behavior results in a constant flow of community-provided code snippets into production software. To date, the impact of this behaviour on code security is unknown. We answer this highly important question by quantifying the proliferation of security-related code snippets from Stack Overflow in Android applications available on Google Play. Access to the rich source of information available on Stack Overflow including ready-to-use code snippets provides huge benefits for software developers. However, when it comes to code security there are some caveats to bear in mind: Due to the complex nature of code security, it is very difficult to provide ready-to-use and secure solutions for every problem. Hence, integrating a security-related code snippet from Stack Overflow into production software requires caution and expertise. Unsurprisingly, we observed insecure code snippets being copied into Android applications millions of users install from Google Play every day. To quantitatively evaluate the extent of this observation, we scanned Stack Overflow for code snippets and evaluated their security score using a stochastic gradient descent classifier. In order to identify code reuse in Android applications, we applied state-of-the-art static analysis. Our results are alarming: 15.4% of the 1.3 million Android applications we analyzed, contained security-related code snippets from Stack Overflow. Out of these 97.9% contain at least one insecure code snippet.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"49 1 1","pages":"121-136"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73053053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 226
SysPal: System-Guided Pattern Locks for Android SysPal: Android系统引导模式锁
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.61
Geumhwan Cho, J. Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim
To improve the security of user-chosen Android screen lock patterns, we propose a novel system-guided pattern lock scheme called "SysPal" that mandates the use of a small number of randomly selected points while selecting a pattern. Users are given the freedom to use those mandated points at any position. We conducted a large-scale online study with 1,717 participants to evaluate the security and usability of three SysPal policies, varying the number of mandatory points that must be used (upon selecting a pattern) from one to three. Our results suggest that the two SysPal policies that mandate the use of one and two points can help users select significantly more secure patterns compared to the current Android policy: 22.58% and 23.19% fewer patterns were cracked. Those two SysPal policies, however, did not show any statistically significant inferiority in pattern recall success rate (the percentage of participants who correctly recalled their pattern after 24 hours). In our lab study, we asked participants to install our screen unlock application on their own Android device, and observed their real-life phone unlock behaviors for a day. Again, our lab study did not show any statistically significant difference in memorability for those two SysPal policies compared to the current Android policy.
为了提高用户选择的Android屏幕锁定模式的安全性,我们提出了一种新的系统引导模式锁定方案,称为“SysPal”,该方案要求在选择模式时使用少量随机选择的点。用户可以自由地在任何位置使用这些指定的点。我们进行了一项有1,717名参与者的大规模在线研究,以评估三个SysPal策略的安全性和可用性,将必须使用的强制点的数量(在选择模式时)从1更改为3。我们的研究结果表明,与当前的Android策略相比,强制使用1点和2点的两个SysPal策略可以帮助用户选择更安全的模式:被破解的模式分别减少22.58%和23.19%。然而,这两种SysPal策略在模式回忆成功率(24小时后正确回忆模式的参与者百分比)方面并没有显示出统计学上显著的劣势。在我们的实验室研究中,我们要求参与者在他们自己的Android设备上安装我们的屏幕解锁应用程序,并观察他们一天的真实手机解锁行为。同样,我们的实验室研究并没有显示这两种SysPal策略与当前Android策略相比在可记忆性方面有任何统计学上的显著差异。
{"title":"SysPal: System-Guided Pattern Locks for Android","authors":"Geumhwan Cho, J. Huh, Junsung Cho, Seongyeol Oh, Youngbae Song, Hyoungshick Kim","doi":"10.1109/SP.2017.61","DOIUrl":"https://doi.org/10.1109/SP.2017.61","url":null,"abstract":"To improve the security of user-chosen Android screen lock patterns, we propose a novel system-guided pattern lock scheme called \"SysPal\" that mandates the use of a small number of randomly selected points while selecting a pattern. Users are given the freedom to use those mandated points at any position. We conducted a large-scale online study with 1,717 participants to evaluate the security and usability of three SysPal policies, varying the number of mandatory points that must be used (upon selecting a pattern) from one to three. Our results suggest that the two SysPal policies that mandate the use of one and two points can help users select significantly more secure patterns compared to the current Android policy: 22.58% and 23.19% fewer patterns were cracked. Those two SysPal policies, however, did not show any statistically significant inferiority in pattern recall success rate (the percentage of participants who correctly recalled their pattern after 24 hours). In our lab study, we asked participants to install our screen unlock application on their own Android device, and observed their real-life phone unlock behaviors for a day. Again, our lab study did not show any statistically significant difference in memorability for those two SysPal policies compared to the current Android policy.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"34 1","pages":"338-356"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80189066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Catena: Efficient Non-equivocation via Bitcoin Catena:通过比特币实现高效无歧义
Pub Date : 2017-05-22 DOI: 10.1109/SP.2017.19
Alin Tomescu, S. Devadas
We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP_RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log server wants to equivocate ithas to double spend a Bitcoin transaction output. Thus, Catenalogs are as hard to fork as the Bitcoin blockchain: an adversarywithout a large fraction of the network's computational powercannot fork Bitcoin and thus cannot fork a Catena log either. However, different from previous Bitcoin-based work, Catenadecreases the bandwidth requirements of log auditors from 90GB to only tens of megabytes. More precisely, our clients onlyneed to download all Bitcoin block headers (currently less than35 MB) and a small, 600-byte proof for each statement in a block. We implement Catena in Java using the bitcoinj library and use itto extend CONIKS, a recent key transparency scheme, to witnessits public-key directory in the Bitcoin blockchain where it can beefficiently verified by auditors. We show that Catena can securemany systems today, such as public-key directories, Tor directoryservers and software transparency schemes.
我们提出了Catena,一个有效可验证的比特币见证方案。Catena允许任意数量的瘦客户机(如移动电话)有效地就由对抗性服务器管理的特定于应用程序的语句日志达成一致。caten将日志实现为OP_RETURN交易链,并通过利用比特币对双重支出的安全性来防止日志分叉。具体来说,如果日志服务器想要将比特币交易输出的花费翻倍。因此,Catenalogs就像比特币区块链一样难以分叉:没有网络大部分计算能力的对手无法分叉比特币,因此也无法分叉Catena日志。然而,与之前基于比特币的工作不同,catenode将日志审计器的带宽需求从90GB降低到只有几十兆字节。更准确地说,我们的客户只需要下载所有比特币区块头(目前小于35 MB)和一个区块中每个语句的600字节的小证明。我们使用bitcoinj库在Java中实现Catena,并使用它来扩展CONIKS(最近的密钥透明方案),以见证比特币区块链中的公钥目录,审计人员可以有效地验证它。我们展示了Catena今天可以保护许多系统,例如公钥目录,Tor目录服务器和软件透明方案。
{"title":"Catena: Efficient Non-equivocation via Bitcoin","authors":"Alin Tomescu, S. Devadas","doi":"10.1109/SP.2017.19","DOIUrl":"https://doi.org/10.1109/SP.2017.19","url":null,"abstract":"We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP_RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log server wants to equivocate ithas to double spend a Bitcoin transaction output. Thus, Catenalogs are as hard to fork as the Bitcoin blockchain: an adversarywithout a large fraction of the network's computational powercannot fork Bitcoin and thus cannot fork a Catena log either. However, different from previous Bitcoin-based work, Catenadecreases the bandwidth requirements of log auditors from 90GB to only tens of megabytes. More precisely, our clients onlyneed to download all Bitcoin block headers (currently less than35 MB) and a small, 600-byte proof for each statement in a block. We implement Catena in Java using the bitcoinj library and use itto extend CONIKS, a recent key transparency scheme, to witnessits public-key directory in the Bitcoin blockchain where it can beefficiently verified by auditors. We show that Catena can securemany systems today, such as public-key directories, Tor directoryservers and software transparency schemes.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"393-409"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83369692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization 金字塔:利用计数特征增强大数据保护的选择性
Pub Date : 2017-05-21 DOI: 10.1109/SP.2017.60
Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, S. Sen
Protecting vast quantities of data poses a daunting challenge for the growing number of organizations that collect, stockpile, and monetize it. The ability to distinguish data that is actually needed from data collected "just in case" would help these organizations to limit the latter's exposure to attack. A natural approach might be to monitor data use and retain only the working-set of in-use data in accessible storage, unused data can be evicted to a highly protected store. However, many of today's big data applications rely on machine learning (ML) workloads that are periodically retrained by accessing, and thus exposing to attack, the entire data store. Training set minimization methods, such as count featurization, are often used to limit the data needed to train ML workloads to improve performance or scalability. We present Pyramid, a limited-exposure data management system that builds upon count featurization to enhance data protection. As such, Pyramid uniquely introduces both the idea and proof-of-concept for leveraging training set minimization methods to instill rigor and selectivity into big data management. We integrated Pyramid into Spark Velox, a framework for ML-based targeting and personalization. We evaluate it on three applications and show that Pyramid approaches state-of-the-art models while training on less than 1% of the raw data.
对于越来越多的收集、储存和货币化数据的组织来说,保护大量数据是一项艰巨的挑战。区分实际需要的数据和“以防万一”收集的数据的能力将帮助这些组织限制后者遭受攻击的风险。一种自然的方法可能是监视数据的使用,并在可访问的存储中仅保留正在使用的数据的工作集,未使用的数据可以被驱逐到高度保护的存储中。然而,今天的许多大数据应用程序依赖于机器学习(ML)工作负载,这些工作负载通过访问整个数据存储来定期进行再训练,从而暴露在攻击之下。训练集最小化方法,如计数特征化,通常用于限制训练ML工作负载所需的数据,以提高性能或可扩展性。我们提出金字塔,一个有限暴露的数据管理系统,建立在计数功能,以加强数据保护。因此,Pyramid独特地引入了利用训练集最小化方法将严谨性和选择性灌输到大数据管理中的想法和概念验证。我们将Pyramid整合到Spark Velox中,这是一个基于ml的目标定位和个性化框架。我们在三个应用程序上对其进行了评估,并表明金字塔在训练不到1%的原始数据时接近了最先进的模型。
{"title":"Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization","authors":"Mathias Lécuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, S. Sen","doi":"10.1109/SP.2017.60","DOIUrl":"https://doi.org/10.1109/SP.2017.60","url":null,"abstract":"Protecting vast quantities of data poses a daunting challenge for the growing number of organizations that collect, stockpile, and monetize it. The ability to distinguish data that is actually needed from data collected \"just in case\" would help these organizations to limit the latter's exposure to attack. A natural approach might be to monitor data use and retain only the working-set of in-use data in accessible storage, unused data can be evicted to a highly protected store. However, many of today's big data applications rely on machine learning (ML) workloads that are periodically retrained by accessing, and thus exposing to attack, the entire data store. Training set minimization methods, such as count featurization, are often used to limit the data needed to train ML workloads to improve performance or scalability. We present Pyramid, a limited-exposure data management system that builds upon count featurization to enhance data protection. As such, Pyramid uniquely introduces both the idea and proof-of-concept for leveraging training set minimization methods to instill rigor and selectivity into big data management. We integrated Pyramid into Spark Velox, a framework for ML-based targeting and personalization. We evaluate it on three applications and show that Pyramid approaches state-of-the-art models while training on less than 1% of the raw data.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"18 1","pages":"78-95"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90339811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64 NORAX:在AArch64上为COTS二进制文件启用仅执行内存
Pub Date : 2017-05-01 DOI: 10.1109/SP.2017.30
Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, H. Vijayakumar, Wenbo Shen
Code reuse attacks exploiting memory disclosure vulnerabilities can bypass all deployed mitigations. One promising defense against this class of attacks is to enable execute-only memory (XOM) protection on top of fine-grained address space layout randomization (ASLR). However, recent works implementing XOM, despite their efficacy, only protect programs that have been (re)built with new compiler support, leaving commercial-off-the-shelf (COTS) binaries and source-unavailable programs unprotected. We present the design and implementation of NORAX, a practical system that retrofits XOM into stripped COTS binaries on AArch64 platforms. Unlike previous techniques, NORAX requires neither source code nor debugging symbols. NORAX statically transforms existing binaries so that during runtime their code sections can be loaded into XOM memory pages with embedded data relocated and data references properly updated. NORAX allows transformed binaries to leverage the new hardware-based XOM support—a feature widely available on AArch64 platforms (e.g., recent mobile devices) yet virtually unused due to the incompatibility of existing binaries. Furthermore, NORAX is designed to co-exist with other COTS binary hardening techniques, such as in-place randomization (IPR). We apply NORAX to the commonly used Android system binaries running on SAMSUNG Galaxy S6 and LG Nexus 5X devices. The results show that NORAX on average slows down the execution of transformed binaries by 1.18% and increases their memory footprint by 2.21%, suggesting NORAX is practical for real-world adoption.
利用内存公开漏洞的代码重用攻击可以绕过所有已部署的缓解措施。针对这类攻击的一种有希望的防御是在细粒度地址空间布局随机化(ASLR)之上启用纯执行内存(XOM)保护。然而,尽管最近实现XOM的工作很有效,但它们只保护使用新编译器支持(重新)构建的程序,使商用现成(COTS)二进制文件和源代码不可用的程序不受保护。我们提出了NORAX的设计和实现,这是一个在AArch64平台上将XOM改造成剥离COTS二进制文件的实用系统。与以前的技术不同,NORAX既不需要源代码,也不需要调试符号。NORAX静态地转换现有的二进制文件,以便在运行时将其代码段加载到XOM内存页中,并重新定位嵌入的数据并正确更新数据引用。NORAX允许转换后的二进制文件利用新的基于硬件的XOM支持——这一特性在AArch64平台(例如,最近的移动设备)上广泛可用,但由于现有二进制文件的不兼容性,实际上未被使用。此外,NORAX设计用于与其他COTS二元强化技术共存,例如就地随机化(IPR)。我们将NORAX应用于在三星Galaxy S6和LG Nexus 5X设备上运行的常用Android系统二进制文件。结果表明,NORAX平均使转换后的二进制文件的执行速度降低了1.18%,并使它们的内存占用增加了2.21%,这表明NORAX在实际应用中是实用的。
{"title":"NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64","authors":"Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, H. Vijayakumar, Wenbo Shen","doi":"10.1109/SP.2017.30","DOIUrl":"https://doi.org/10.1109/SP.2017.30","url":null,"abstract":"Code reuse attacks exploiting memory disclosure vulnerabilities can bypass all deployed mitigations. One promising defense against this class of attacks is to enable execute-only memory (XOM) protection on top of fine-grained address space layout randomization (ASLR). However, recent works implementing XOM, despite their efficacy, only protect programs that have been (re)built with new compiler support, leaving commercial-off-the-shelf (COTS) binaries and source-unavailable programs unprotected. We present the design and implementation of NORAX, a practical system that retrofits XOM into stripped COTS binaries on AArch64 platforms. Unlike previous techniques, NORAX requires neither source code nor debugging symbols. NORAX statically transforms existing binaries so that during runtime their code sections can be loaded into XOM memory pages with embedded data relocated and data references properly updated. NORAX allows transformed binaries to leverage the new hardware-based XOM support—a feature widely available on AArch64 platforms (e.g., recent mobile devices) yet virtually unused due to the incompatibility of existing binaries. Furthermore, NORAX is designed to co-exist with other COTS binary hardening techniques, such as in-place randomization (IPR). We apply NORAX to the commonly used Android system binaries running on SAMSUNG Galaxy S6 and LG Nexus 5X devices. The results show that NORAX on average slows down the execution of transformed binaries by 1.18% and increases their memory footprint by 2.21%, suggesting NORAX is practical for real-world adoption.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"14 1","pages":"304-319"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75552010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
XHOUND: Quantifying the Fingerprintability of Browser Extensions XHOUND:量化浏览器扩展的可识别性
Pub Date : 2017-05-01 DOI: 10.1109/SP.2017.18
Oleksii Starov, Nick Nikiforakis
In recent years, researchers have shown that unwanted web tracking is on the rise, as advertisers are trying to capitalize on users' online activity, using increasingly intrusive and sophisticated techniques. Among these, browser fingerprinting has received the most attention since it allows trackers to uniquely identify users despite the clearing of cookies and the use of a browser's private mode. In this paper, we investigate and quantify the fingerprintability of browser extensions, such as, AdBlock and Ghostery. We show that an extension's organic activity in a page's DOM can be used to infer its presence, and develop XHound, the first fully automated system for fingerprinting browser extensions. By applying XHound to the 10,000 most popular Google Chrome extensions, we find that a significant fraction of popular browser extensions are fingerprintable and could thus be used to supplement existing fingerprinting methods. Moreover, by surveying the installed extensions of 854 users, we discover that many users tend to install different sets of fingerprintable browser extensions and could thus be uniquely, or near-uniquely identifiable by extension-based fingerprinting. We use XHound's results to build a proof-of-concept extension-fingerprinting script and show that trackers can fingerprint tens of extensions in just a few seconds. Finally, we describe why the fingerprinting of extensions is more intrusive than the fingerprinting of other browser and system properties, and sketch two different approaches towards defending against extension-based fingerprinting.
近年来,研究人员表明,由于广告商试图利用越来越多的侵入性和复杂的技术,从用户的在线活动中获利,不受欢迎的网络跟踪正在上升。其中,浏览器指纹识别受到了最多的关注,因为它允许追踪者在清除cookie和使用浏览器的隐私模式的情况下唯一地识别用户。在本文中,我们调查并量化了浏览器扩展,如AdBlock和Ghostery的指纹识别能力。我们展示了扩展在页面DOM中的有机活动可用于推断其存在,并开发了XHound,这是第一个用于识别浏览器扩展的全自动系统。通过将XHound应用于10,000个最流行的Google Chrome扩展,我们发现大部分流行的浏览器扩展都是可指纹识别的,因此可以用来补充现有的指纹识别方法。此外,通过调查854名用户安装的扩展,我们发现许多用户倾向于安装不同的可指纹浏览器扩展集,因此可以通过基于扩展的指纹识别进行唯一或近乎唯一的识别。我们使用XHound的结果构建了一个概念验证扩展指纹脚本,并展示了跟踪器可以在几秒钟内识别数十个扩展。最后,我们描述了为什么扩展的指纹识别比其他浏览器和系统属性的指纹识别更具侵入性,并概述了两种不同的防御基于扩展的指纹识别的方法。
{"title":"XHOUND: Quantifying the Fingerprintability of Browser Extensions","authors":"Oleksii Starov, Nick Nikiforakis","doi":"10.1109/SP.2017.18","DOIUrl":"https://doi.org/10.1109/SP.2017.18","url":null,"abstract":"In recent years, researchers have shown that unwanted web tracking is on the rise, as advertisers are trying to capitalize on users' online activity, using increasingly intrusive and sophisticated techniques. Among these, browser fingerprinting has received the most attention since it allows trackers to uniquely identify users despite the clearing of cookies and the use of a browser's private mode. In this paper, we investigate and quantify the fingerprintability of browser extensions, such as, AdBlock and Ghostery. We show that an extension's organic activity in a page's DOM can be used to infer its presence, and develop XHound, the first fully automated system for fingerprinting browser extensions. By applying XHound to the 10,000 most popular Google Chrome extensions, we find that a significant fraction of popular browser extensions are fingerprintable and could thus be used to supplement existing fingerprinting methods. Moreover, by surveying the installed extensions of 854 users, we discover that many users tend to install different sets of fingerprintable browser extensions and could thus be uniquely, or near-uniquely identifiable by extension-based fingerprinting. We use XHound's results to build a proof-of-concept extension-fingerprinting script and show that trackers can fingerprint tens of extensions in just a few seconds. Finally, we describe why the fingerprinting of extensions is more intrusive than the fingerprinting of other browser and system properties, and sketch two different approaches towards defending against extension-based fingerprinting.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"36 1","pages":"941-956"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80854274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Verifying and Synthesizing Constant-Resource Implementations with Types 用类型验证和综合常量资源实现
Pub Date : 2017-05-01 DOI: 10.1109/SP.2017.53
V. Ngo, Mario Dehesa-Azuara, Matt Fredrikson, Jan Hoffmann
Side channel attacks have been used to extract critical data such as encryption keys and confidential user data in a variety of adversarial settings. In practice, this threat is addressed by adhering to a constant-time programming discipline, which imposes strict constraints on the way in which programs are written. This introduces an additional hurdle for programmers faced with the already difficult task of writing secure code, highlighting the need for solutions that give the same source-level guarantees while supporting more natural programming models. We propose a novel type system for verifying that programs correctly implement constant-resource behavior. Our type system extends recent work on automatic amortized resource analysis (AARA), a set of techniques that automatically derive provable upper bounds on the resource consumption of programs. We devise new techniques that build on the potential method to achieve compositionality, precision, and automation. A strict global requirement that a program always maintains constant resource usage is too restrictive for most practical applications. It is sufficient to require that the program's resource behavior remain constant with respect to an attacker who is only allowed to observe part of the program's state and behavior. To account for this, our type system incorporates information flow tracking into its resource analysis. This allows our system to certify programs that need to violate the constant-time requirement in certain cases, as long as doing so does not leak confidential information to attackers. We formalize this guarantee by defining a new notion of resource-aware noninterference, and prove that our system enforces it. Finally, we show how our type inference algorithm can be used to synthesize a constant-time implementation from one that cannot be verified as secure, effectively repairing insecure programs automatically. We also show how a second novel AARA system that computes lower bounds on resource usage can be used to derive quantitative bounds on the amount of information that a program leaks through its resource use. We implemented each of these systems in Resource Aware ML, and show that it can be applied to verify constant-time behavior in a number of applicationsincluding encryption and decryption routines, database queries, and other resource-aware functionality.
侧信道攻击已被用于在各种对抗性设置中提取关键数据,如加密密钥和机密用户数据。在实践中,这种威胁是通过坚持固定时间编程原则来解决的,该原则对编写程序的方式施加了严格的约束。这给程序员带来了一个额外的障碍,他们面临着编写安全代码的困难任务,强调需要提供相同的源代码级别保证,同时支持更自然的编程模型的解决方案。我们提出了一种新型系统来验证程序是否正确地实现了恒定资源行为。我们的类型系统扩展了最近在自动平摊资源分析(AARA)方面的工作,AARA是一组自动导出程序资源消耗的可证明上界的技术。我们设计了基于潜在方法的新技术,以实现组合性、精度和自动化。对于大多数实际应用程序来说,程序始终保持恒定的资源使用这一严格的全局要求过于严格。对于只允许观察程序的部分状态和行为的攻击者来说,要求程序的资源行为保持不变就足够了。为了说明这一点,我们的类型系统将信息流跟踪合并到它的资源分析中。这允许我们的系统在某些情况下认证需要违反恒定时间要求的程序,只要这样做不会将机密信息泄露给攻击者。我们通过定义一个资源感知不干涉的新概念来形式化这种保证,并证明我们的系统执行它。最后,我们展示了如何使用我们的类型推断算法从一个不能被验证为安全的实现合成一个恒定时间的实现,从而有效地自动修复不安全的程序。我们还展示了如何使用第二个计算资源使用下限的新型AARA系统来推导程序通过其资源使用泄露的信息量的定量界限。我们在资源感知ML中实现了这些系统中的每一个,并展示了它可以用于验证许多应用程序中的恒定时间行为,包括加密和解密例程,数据库查询和其他资源感知功能。
{"title":"Verifying and Synthesizing Constant-Resource Implementations with Types","authors":"V. Ngo, Mario Dehesa-Azuara, Matt Fredrikson, Jan Hoffmann","doi":"10.1109/SP.2017.53","DOIUrl":"https://doi.org/10.1109/SP.2017.53","url":null,"abstract":"Side channel attacks have been used to extract critical data such as encryption keys and confidential user data in a variety of adversarial settings. In practice, this threat is addressed by adhering to a constant-time programming discipline, which imposes strict constraints on the way in which programs are written. This introduces an additional hurdle for programmers faced with the already difficult task of writing secure code, highlighting the need for solutions that give the same source-level guarantees while supporting more natural programming models. We propose a novel type system for verifying that programs correctly implement constant-resource behavior. Our type system extends recent work on automatic amortized resource analysis (AARA), a set of techniques that automatically derive provable upper bounds on the resource consumption of programs. We devise new techniques that build on the potential method to achieve compositionality, precision, and automation. A strict global requirement that a program always maintains constant resource usage is too restrictive for most practical applications. It is sufficient to require that the program's resource behavior remain constant with respect to an attacker who is only allowed to observe part of the program's state and behavior. To account for this, our type system incorporates information flow tracking into its resource analysis. This allows our system to certify programs that need to violate the constant-time requirement in certain cases, as long as doing so does not leak confidential information to attackers. We formalize this guarantee by defining a new notion of resource-aware noninterference, and prove that our system enforces it. Finally, we show how our type inference algorithm can be used to synthesize a constant-time implementation from one that cannot be verified as secure, effectively repairing insecure programs automatically. We also show how a second novel AARA system that computes lower bounds on resource usage can be used to derive quantitative bounds on the amount of information that a program leaks through its resource use. We implemented each of these systems in Resource Aware ML, and show that it can be applied to verify constant-time behavior in a number of applicationsincluding encryption and decryption routines, database queries, and other resource-aware functionality.","PeriodicalId":6502,"journal":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","volume":"27 1","pages":"710-728"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80885305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
期刊
2017 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1