首页 > 最新文献

2021 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem 无线问题:Android生态系统中FOTA应用分析
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00095
E. Blázquez, S. Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, N. Vallina-Rodriguez, J. Tapiador
Android firmware updates are typically managed by the so-called FOTA (Firmware Over-the-Air) apps. Such apps are highly privileged and play a critical role in maintaining devices secured and updated. The Android operating system offers standard mechanisms—available to Original Equipment Manufacturers (OEMs)—to implement their own FOTA apps but such vendor-specific implementations could be a source of security and privacy issues due to poor software engineering practices. This paper performs the first large-scale and systematic analysis of the FOTA ecosystem through a dataset of 2,013 FOTA apps detected with a tool designed for this purpose over 422,121 pre-installed apps. We classify the different stakeholders developing and deploying FOTA apps on the Android update ecosystem, showing that 43% of FOTA apps are developed by third parties. We report that some devices can have as many as 5 apps implementing FOTA capabilities. By means of static analysis of the code of FOTA apps, we show that some apps present behaviors that can be considered privacy intrusive, such as the collection of sensitive user data (e.g., geolocation linked to unique hardware identifiers), and a significant presence of third-party trackers. We also discover implementation issues leading to critical vulnerabilities, such as the use of public AOSP test keys both for signing FOTA apps and for update verification, thus allowing any update signed with the same key to be installed. Finally, we study telemetry data collected from real devices by a commercial security tool. We demonstrate that FOTA apps are responsible for the installation of non-system apps (e.g., entertainment apps and games), including malware and Potentially Unwanted Programs (PUP). Our findings suggest that FOTA development practices are misaligned with Google’s recommendations.
Android固件更新通常由所谓的FOTA(固件over - air)应用程序管理。这些应用程序具有很高的特权,在维护设备安全和更新方面发挥着关键作用。Android操作系统为原始设备制造商(oem)提供了标准机制来实现他们自己的FOTA应用程序,但由于糟糕的软件工程实践,这种特定于供应商的实现可能成为安全和隐私问题的来源。本文首次对FOTA生态系统进行了大规模的系统分析,通过使用专门设计的工具检测到的2,013个FOTA应用程序的数据集,超过422,121个预装应用程序。我们对在Android更新生态系统中开发和部署FOTA应用的不同利益相关者进行了分类,结果显示43%的FOTA应用是由第三方开发的。我们报告说,一些设备可以有多达5个应用程序实现FOTA功能。通过对FOTA应用程序代码的静态分析,我们发现一些应用程序存在可被视为侵犯隐私的行为,例如收集敏感用户数据(例如,与唯一硬件标识符链接的地理位置),以及第三方跟踪器的显著存在。我们还发现了导致关键漏洞的实现问题,例如使用公共AOSP测试密钥签名FOTA应用程序和更新验证,从而允许安装使用相同密钥签名的任何更新。最后,我们研究了通过商业安全工具从真实设备收集的遥测数据。我们证明FOTA应用程序负责安装非系统应用程序(例如,娱乐应用程序和游戏),包括恶意软件和潜在有害程序(PUP)。我们的发现表明FOTA开发实践与谷歌的建议不一致。
{"title":"Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem","authors":"E. Blázquez, S. Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, N. Vallina-Rodriguez, J. Tapiador","doi":"10.1109/SP40001.2021.00095","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00095","url":null,"abstract":"Android firmware updates are typically managed by the so-called FOTA (Firmware Over-the-Air) apps. Such apps are highly privileged and play a critical role in maintaining devices secured and updated. The Android operating system offers standard mechanisms—available to Original Equipment Manufacturers (OEMs)—to implement their own FOTA apps but such vendor-specific implementations could be a source of security and privacy issues due to poor software engineering practices. This paper performs the first large-scale and systematic analysis of the FOTA ecosystem through a dataset of 2,013 FOTA apps detected with a tool designed for this purpose over 422,121 pre-installed apps. We classify the different stakeholders developing and deploying FOTA apps on the Android update ecosystem, showing that 43% of FOTA apps are developed by third parties. We report that some devices can have as many as 5 apps implementing FOTA capabilities. By means of static analysis of the code of FOTA apps, we show that some apps present behaviors that can be considered privacy intrusive, such as the collection of sensitive user data (e.g., geolocation linked to unique hardware identifiers), and a significant presence of third-party trackers. We also discover implementation issues leading to critical vulnerabilities, such as the use of public AOSP test keys both for signing FOTA apps and for update verification, thus allowing any update signed with the same key to be installed. Finally, we study telemetry data collected from real devices by a commercial security tool. We demonstrate that FOTA apps are responsible for the installation of non-system apps (e.g., entertainment apps and games), including malware and Potentially Unwanted Programs (PUP). Our findings suggest that FOTA development practices are misaligned with Google’s recommendations.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"82 1","pages":"1606-1622"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88609679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Secure and Formally Verified Linux KVM Hypervisor 安全且经过认证的Linux KVM虚拟化环境
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00049
Shih-wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, J. Hui
Commodity hypervisors are widely deployed to support virtual machines (VMs) on multiprocessor hardware. Their growing complexity poses a security risk. To enable formal verification over such a large codebase, we introduce microverification, a new approach that decomposes a commodity hypervisor into a small core and a set of untrusted services so that we can prove security properties of the entire hypervisor by verifying the core alone. To verify the multiprocessor hypervisor core, we introduce security-preserving layers to modularize the proof without hiding information leakage so we can prove each layer of the implementation refines its specification, and the top layer specification is refined by all layers of the core implementation. To verify commodity hypervisor features that require dynamically changing information flow, we introduce data oracles to mask intentional information flow. We can then prove noninterference at the top layer specification and guarantee the resulting security properties hold for the entire hypervisor implementation. Using microverification, we retrofitted the Linux KVM hypervisor with only modest modifications to its codebase. Using Coq, we proved that the hypervisor protects the confidentiality and integrity of VM data, while retaining KVM’s functionality and performance. Our work is the first machine-checked security proof for a commodity multiprocessor hypervisor.
商品管理程序被广泛部署以支持多处理器硬件上的虚拟机。它们日益增长的复杂性构成了安全风险。为了对如此大的代码库进行正式验证,我们引入了微验证,这是一种新的方法,它将商品管理程序分解为一个小核心和一组不受信任的服务,这样我们就可以通过单独验证核心来证明整个管理程序的安全属性。为了验证多处理器管理程序核心,我们引入了安全保护层,在不隐藏信息泄漏的情况下将证明模块化,从而证明实现的每一层都对其规范进行了细化,并且核心实现的所有层都对顶层规范进行了细化。为了验证需要动态更改信息流的商品管理程序特性,我们引入了数据oracle来掩盖有意的信息流。然后,我们可以证明顶层规范的不干扰性,并保证最终的安全属性适用于整个管理程序实现。使用微验证,我们对Linux KVM管理程序进行了改进,仅对其代码库进行了适度的修改。通过使用Coq,我们证明了虚拟机管理程序保护了VM数据的机密性和完整性,同时保留了KVM的功能和性能。我们的工作是商用多处理器管理程序的第一个机器检查安全性证明。
{"title":"A Secure and Formally Verified Linux KVM Hypervisor","authors":"Shih-wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, J. Hui","doi":"10.1109/SP40001.2021.00049","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00049","url":null,"abstract":"Commodity hypervisors are widely deployed to support virtual machines (VMs) on multiprocessor hardware. Their growing complexity poses a security risk. To enable formal verification over such a large codebase, we introduce microverification, a new approach that decomposes a commodity hypervisor into a small core and a set of untrusted services so that we can prove security properties of the entire hypervisor by verifying the core alone. To verify the multiprocessor hypervisor core, we introduce security-preserving layers to modularize the proof without hiding information leakage so we can prove each layer of the implementation refines its specification, and the top layer specification is refined by all layers of the core implementation. To verify commodity hypervisor features that require dynamically changing information flow, we introduce data oracles to mask intentional information flow. We can then prove noninterference at the top layer specification and guarantee the resulting security properties hold for the entire hypervisor implementation. Using microverification, we retrofitted the Linux KVM hypervisor with only modest modifications to its codebase. Using Coq, we proved that the hypervisor protects the confidentiality and integrity of VM data, while retaining KVM’s functionality and performance. Our work is the first machine-checked security proof for a commodity multiprocessor hypervisor.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"6 1","pages":"1782-1799"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75236651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments 以反欺诈为善:移动支付的道德反欺诈系统
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00100
Z. Din, Harish Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King
App builders commonly use security challenges, a form of step-up authentication, to add security to their apps. However, the ethical implications of this type of architecture has not been studied previously.In this paper, we present a large-scale measurement study of running an existing anti-fraud security challenge, Boxer, in real apps running on mobile devices. We find that although Boxer does work well overall, it is unable to scan effectively on devices that run its machine learning models at less than one frame per second (FPS), blocking users who use inexpensive devices.With the insights from our study, we design Daredevil, a new anti-fraud system for scanning payment cards that works well across the broad range of performance characteristics and hardware configurations found on modern mobile devices. Daredevil reduces the number of devices that run at less than one FPS by an order of magnitude compared to Boxer, providing a more equitable system for fighting fraud.In total, we collect data from 5,085,444 real devices spread across 496 real apps running production software and interacting with real users.
应用程序开发人员通常使用安全挑战(一种升级身份验证形式)来增加应用程序的安全性。然而,这种类型的建筑的伦理含义之前还没有被研究过。在本文中,我们提出了在移动设备上运行的真实应用程序中运行现有反欺诈安全挑战Boxer的大规模测量研究。我们发现,虽然Boxer总体上运行得很好,但它无法在运行其机器学习模型的设备上以低于每秒一帧(FPS)的速度进行有效扫描,从而阻碍了使用廉价设备的用户。根据我们研究的见解,我们设计了Daredevil,这是一种用于扫描支付卡的新型反欺诈系统,在现代移动设备的各种性能特征和硬件配置下都能很好地工作。与《拳击手》相比,《夜魔侠》减少了少于1 FPS的设备数量,提供了一个更公平的系统来对抗欺诈。我们总共收集了5085444个真实设备的数据,这些设备分布在496个运行生产软件并与真实用户交互的真实应用程序中。
{"title":"Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments","authors":"Z. Din, Harish Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King","doi":"10.1109/SP40001.2021.00100","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00100","url":null,"abstract":"App builders commonly use security challenges, a form of step-up authentication, to add security to their apps. However, the ethical implications of this type of architecture has not been studied previously.In this paper, we present a large-scale measurement study of running an existing anti-fraud security challenge, Boxer, in real apps running on mobile devices. We find that although Boxer does work well overall, it is unable to scan effectively on devices that run its machine learning models at less than one frame per second (FPS), blocking users who use inexpensive devices.With the insights from our study, we design Daredevil, a new anti-fraud system for scanning payment cards that works well across the broad range of performance characteristics and hardware configurations found on modern mobile devices. Daredevil reduces the number of devices that run at less than one FPS by an order of magnitude compared to Boxer, providing a more equitable system for fighting fraud.In total, we collect data from 5,085,444 real devices spread across 496 real apps running production software and interacting with real users.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"6 1","pages":"1623-1640"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77024388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption PEGASUS:同态加密中的桥接多项式和非多项式计算
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00043
Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu
Homomorphic encryption (HE) is considered as one of the most important primitives for privacy-preserving applications. However, an efficient approach to evaluate both polynomial and non-polynomial functions on encrypted data is still absent, which hinders the deployment of HE to real-life applications. To address this issue, we propose a practical framework PEGASUS. PEGASUS can efficiently switch back and forth between a packed CKKS ciphertext and FHEW ciphertexts without decryption, allowing us to evaluate arithmetic functions efficiently on the CKKS side, and to evaluate look-up tables on FHEW ciphertexts. Our FHEW → CKKS conversion algorithm is more practical than the existing methods. We improve the computational complexity from linear to sublinear. Moreover, the size of our conversion key is significantly smaller, e.g., reduced from 80 gigabytes to 12 megabytes. We present extensive benchmarks of PEGASUS, including sigmoid/ReLU/min/max/division, sorting and max-pooling. To further demonstrate the capability of PEGASUS, we developed two more applications. The first one is a private decision tree evaluation whose communication cost is about two orders of magnitude smaller than the previous HE-based approaches. The second one is a secure K-means clustering that is able to run on thousands of encrypted samples in minutes that outperforms the best existing system by 14 × – 20×. To the best of our knowledge, this is the first work that supports practical K-means clustering using HE in a single server setting.
同态加密(HE)被认为是隐私保护应用程序中最重要的原语之一。然而,目前仍然缺乏一种有效的方法来评估加密数据上的多项式和非多项式函数,这阻碍了HE在实际应用中的部署。为了解决这个问题,我们提出了一个实用的框架PEGASUS。PEGASUS可以在没有解密的情况下在打包的CKKS密文和FHEW密文之间有效地来回切换,允许我们在CKKS端有效地评估算术函数,并在FHEW密文上评估查找表。我们的FHEW→CKKS转换算法比现有的方法更实用。我们提高了从线性到次线性的计算复杂度。此外,我们的转换密钥的大小明显更小,例如,从80千兆字节减少到12兆字节。我们提供了PEGASUS的广泛基准测试,包括sigmoid/ReLU/min/max/division,排序和最大池。为了进一步展示PEGASUS的能力,我们开发了另外两个应用程序。第一种方法是一个私有决策树评估,其通信成本比之前基于he的方法小两个数量级。第二种是安全的K-means聚类,它能够在几分钟内运行数千个加密样本,比现有最好的系统性能高出14倍到20倍。据我们所知,这是第一个在单个服务器设置中使用HE支持实际K-means集群的工作。
{"title":"PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption","authors":"Wen-jie Lu, Zhicong Huang, Cheng Hong, Yiping Ma, Hunter Qu","doi":"10.1109/SP40001.2021.00043","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00043","url":null,"abstract":"Homomorphic encryption (HE) is considered as one of the most important primitives for privacy-preserving applications. However, an efficient approach to evaluate both polynomial and non-polynomial functions on encrypted data is still absent, which hinders the deployment of HE to real-life applications. To address this issue, we propose a practical framework PEGASUS. PEGASUS can efficiently switch back and forth between a packed CKKS ciphertext and FHEW ciphertexts without decryption, allowing us to evaluate arithmetic functions efficiently on the CKKS side, and to evaluate look-up tables on FHEW ciphertexts. Our FHEW → CKKS conversion algorithm is more practical than the existing methods. We improve the computational complexity from linear to sublinear. Moreover, the size of our conversion key is significantly smaller, e.g., reduced from 80 gigabytes to 12 megabytes. We present extensive benchmarks of PEGASUS, including sigmoid/ReLU/min/max/division, sorting and max-pooling. To further demonstrate the capability of PEGASUS, we developed two more applications. The first one is a private decision tree evaluation whose communication cost is about two orders of magnitude smaller than the previous HE-based approaches. The second one is a secure K-means clustering that is able to run on thousands of encrypted samples in minutes that outperforms the best existing system by 14 × – 20×. To the best of our knowledge, this is the first work that supports practical K-means clustering using HE in a single server setting.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"58 1","pages":"1057-1073"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88867986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time Bomberman:在设计阶段定义和击败滴答作响的硬件定时炸弹
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00052
Timothy Trippel, K. Shin, K. Bush, Matthew Hicks
To cope with ever-increasing design complexities, integrated circuit designers increase both the size of their design teams and their reliance on third-party intellectual property (IP). Both come at the expense of trust: it is computationally infeasible to exhaustively verify that a design is free of all possible malicious modifications (i.e., hardware Trojans). Making matters worse, unlike software, hardware modifications are permanent: there is no "patching" mechanism for hardware; and powerful: they serve as a foothold for subverting software that sits above.To counter this threat, prior work uses both static and dynamic analysis techniques to verify hardware designs are Trojan-free. Unfortunately, researchers continue to reveal weaknesses in these "one-size-fits-all", heuristic-based approaches. Instead of attempting to detect all possible hardware Trojans, we take the first step in addressing the hardware Trojan threat in a divide-and-conquer fashion: defining and eliminating Ticking Timebomb Trojans (TTTs), forcing attackers to implement larger Trojan designs detectable via existing verification and side-channel defenses. Like many system-level software defenses (e.g., Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP)), our goal is to systematically constrict the hardware attacker’s design space.First, we construct a definition of TTTs derived from their functional behavior. Next, we translate this definition into fundamental components required to realize TTT behavior in hardware. Using these components, we expand the set of all known TTTs to a total of six variants—including unseen variants. Leveraging our definition, we design and implement a TTT-specific dynamic verification toolchain extension, called Bomber-man. Using four real-world hardware designs, we demonstrate Bomberman’s ability to detect all TTT variants, where previous defenses fail, with <1.2% false positives.
为了应对不断增加的设计复杂性,集成电路设计人员增加了设计团队的规模和对第三方知识产权(IP)的依赖。两者都是以信任为代价的:在计算上不可能彻底验证设计不受所有可能的恶意修改(即硬件木马)的影响。更糟糕的是,与软件不同,硬件修改是永久性的:硬件没有“补丁”机制;而且功能强大:它们是颠覆上层软件的立足点。为了应对这种威胁,之前的工作使用静态和动态分析技术来验证硬件设计是无木马的。不幸的是,研究人员继续揭示这些“一刀切”的、基于启发式的方法的弱点。我们不是试图检测所有可能的硬件木马,而是采取分而治之的方式解决硬件木马威胁的第一步:定义和消除定时炸弹木马(ttt),迫使攻击者实现更大的木马设计,通过现有的验证和侧通道防御可以检测到。像许多系统级软件防御(例如,地址空间布局随机化(ASLR)和数据执行预防(DEP)),我们的目标是系统地压缩硬件攻击者的设计空间。首先,我们根据ttt的功能行为构造了ttt的定义。接下来,我们将此定义转换为在硬件中实现TTT行为所需的基本组件。使用这些组件,我们将所有已知ttt的集合扩展到总共六个变体—包括未见的变体。利用我们的定义,我们设计并实现了一个特定于ttt的动态验证工具链扩展,称为Bomber-man。使用四种现实世界的硬件设计,我们展示了Bomberman检测所有TTT变体的能力,其中先前的防御失败,误报率<1.2%。
{"title":"Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time","authors":"Timothy Trippel, K. Shin, K. Bush, Matthew Hicks","doi":"10.1109/SP40001.2021.00052","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00052","url":null,"abstract":"To cope with ever-increasing design complexities, integrated circuit designers increase both the size of their design teams and their reliance on third-party intellectual property (IP). Both come at the expense of trust: it is computationally infeasible to exhaustively verify that a design is free of all possible malicious modifications (i.e., hardware Trojans). Making matters worse, unlike software, hardware modifications are permanent: there is no \"patching\" mechanism for hardware; and powerful: they serve as a foothold for subverting software that sits above.To counter this threat, prior work uses both static and dynamic analysis techniques to verify hardware designs are Trojan-free. Unfortunately, researchers continue to reveal weaknesses in these \"one-size-fits-all\", heuristic-based approaches. Instead of attempting to detect all possible hardware Trojans, we take the first step in addressing the hardware Trojan threat in a divide-and-conquer fashion: defining and eliminating Ticking Timebomb Trojans (TTTs), forcing attackers to implement larger Trojan designs detectable via existing verification and side-channel defenses. Like many system-level software defenses (e.g., Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP)), our goal is to systematically constrict the hardware attacker’s design space.First, we construct a definition of TTTs derived from their functional behavior. Next, we translate this definition into fundamental components required to realize TTT behavior in hardware. Using these components, we expand the set of all known TTTs to a total of six variants—including unseen variants. Leveraging our definition, we design and implement a TTT-specific dynamic verification toolchain extension, called Bomber-man. Using four real-world hardware designs, we demonstrate Bomberman’s ability to detect all TTT variants, where previous defenses fail, with <1.2% false positives.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"80 1","pages":"970-986"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87102931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land 生存主义:Windows恶意软件的系统分析
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00047
Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, I. Martinovic
As malware detection algorithms and methods become more sophisticated, malware authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal evidence claims Living-Off-The-Land (LotL) techniques are one of the major evasion techniques used in many malware attacks. These techniques leverage binaries already present in the system to conduct malicious actions. We present the first large-scale systematic investigation of the use of these techniques by malware on Windows systems.In this paper, we analyse how common the use of these native system binaries is across several malware datasets, containing a total of 31,805,549 samples. We identify an average 9.41% prevalence. Our results show that the use of LotL techniques is prolific, particularly in Advanced Persistent Threat (APT) malware samples where the prevalence is 26.26%, over twice that of commodity malware.To illustrate the evasive potential of LotL techniques, we test the usage of LotL techniques against several fully patched Windows systems in a local sandboxed environment and show that there is a generalised detection gap in 10 of the most popular anti-virus products.
随着恶意软件检测算法和方法变得越来越复杂,恶意软件作者采用同样复杂的规避机制来击败它们。坊间证据表明,“离地生存”(LotL)技术是许多恶意软件攻击中使用的主要规避技术之一。这些技术利用系统中已经存在的二进制文件来执行恶意操作。我们提出了在Windows系统上使用这些技术的恶意软件的第一次大规模系统调查。在本文中,我们分析了这些本地系统二进制文件在几个恶意软件数据集中的使用情况,总共包含31,805,549个样本。我们确定平均9.41%的患病率。我们的研究结果表明,LotL技术的使用非常多,特别是在高级持续威胁(APT)恶意软件样本中,其患病率为26.26%,是普通恶意软件的两倍多。为了说明LotL技术的规避潜力,我们在本地沙箱环境中测试了LotL技术对几个完全打过补丁的Windows系统的使用情况,并显示在10种最流行的反病毒产品中存在普遍的检测差距。
{"title":"Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land","authors":"Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, I. Martinovic","doi":"10.1109/SP40001.2021.00047","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00047","url":null,"abstract":"As malware detection algorithms and methods become more sophisticated, malware authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal evidence claims Living-Off-The-Land (LotL) techniques are one of the major evasion techniques used in many malware attacks. These techniques leverage binaries already present in the system to conduct malicious actions. We present the first large-scale systematic investigation of the use of these techniques by malware on Windows systems.In this paper, we analyse how common the use of these native system binaries is across several malware datasets, containing a total of 31,805,549 samples. We identify an average 9.41% prevalence. Our results show that the use of LotL techniques is prolific, particularly in Advanced Persistent Threat (APT) malware samples where the prevalence is 26.26%, over twice that of commodity malware.To illustrate the evasive potential of LotL techniques, we test the usage of LotL techniques against several fully patched Windows systems in a local sandboxed environment and show that there is a generalised detection gap in 10 of the most popular anti-virus products.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"52 1","pages":"1557-1574"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84456726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis 书虫游戏:通过文档分析自动发现LTE漏洞
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00104
Yi Chen, Yepeng Yao, Xiaofeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu
In the past decade, the security of cellular networks has been increasingly under scrutiny, leading to the discovery of numerous vulnerabilities that expose the network and its users to a wide range of security risks, from denial of service to information leak. However, most of these findings have been made through ad-hoc manual analysis, which is inadequate for fundamentally enhancing the security assurance of a system as complex as the cellular network. An important observation is that the massive amount of technical documentation of cellular network can provide key insights into the protection it puts in place and help identify potential security flaws. Particularly, we found that such documentation often contains hazard indicators (HIs) – the statement that describes a risky operation (e.g., abort an ongoing procedure) when a certain event happens at a state, which can guide a test on the system to find out whether the operation can indeed be triggered by an unauthorized party to cause harm to the cellular core or legitimate users’ equipment. Based upon this observation, we present in this paper a new framework that makes the first step toward intelligent and systematic security analysis of cellular networks. Our approach, called Atomic, utilizes natural-language processing and machine learning techniques to scan a large amount of LTE documentation for HIs. The HIs discovered are further parsed and analyzed to recover state and event information for generating test cases. These test cases are further utilized to automatically construct tests in an LTE simulation environment, which runs the tests to detect the vulnerabilities in the LTE that allow the risky operations to happen without proper protection. In our research, we implemented Atomic and ran it on the LTE NAS specification, including 549 pages with 13,598 sentences and 283,850 words. In less than 5 hours, our prototype reported 42 vulnerabilities from 192 HIs discovered, including 10 never reported before, under two threat models. All these vulnerabilities have been confirmed through end-to-end attacks, which lead to unauthorized disruption of the LTE service a legitimate user’s equipment receives. We reported our findings to authorized parties and received their confirmation that these vulnerabilities indeed exist in major commercial carriers and $2,000 USD reward from Google.
在过去的十年中,蜂窝网络的安全性受到了越来越多的审查,导致发现了许多漏洞,这些漏洞使网络及其用户面临从拒绝服务到信息泄露的各种安全风险。然而,这些发现大多是通过特别的人工分析得出的,这不足以从根本上增强像蜂窝网络这样复杂的系统的安全保障。一个重要的观察是,大量的蜂窝网络技术文档可以提供关键的见解,以保护它到位,并帮助识别潜在的安全漏洞。特别是,我们发现此类文件通常包含危险指标(HIs) -描述在某个状态下发生特定事件时的危险操作(例如,中止正在进行的程序)的声明,这可以指导对系统的测试,以确定操作是否确实可以由未经授权的一方触发,对蜂窝核心或合法用户的设备造成伤害。基于这一观察,我们在本文中提出了一个新的框架,使蜂窝网络的智能和系统的安全分析迈出了第一步。我们的方法称为Atomic,利用自然语言处理和机器学习技术来扫描大量的LTE文档。对发现的HIs进行进一步的解析和分析,以恢复状态和事件信息,从而生成测试用例。这些测试用例进一步用于在LTE模拟环境中自动构建测试,该环境运行测试以检测LTE中的漏洞,这些漏洞允许在没有适当保护的情况下发生危险操作。在我们的研究中,我们实现了Atomic,并在LTE NAS规范上运行它,包括549页,13,598个句子和283,850个单词。在不到5个小时的时间里,我们的原型在两种威胁模型下报告了发现的192个he中的42个漏洞,其中包括10个以前从未报告过的漏洞。所有这些漏洞都是通过端到端攻击得到证实的,这些攻击会导致合法用户的设备接收到未经授权的LTE服务中断。我们向授权方报告了我们的发现,并得到了他们的确认,这些漏洞确实存在于主要的商业运营商中,并获得了谷歌2000美元的奖励。
{"title":"Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis","authors":"Yi Chen, Yepeng Yao, Xiaofeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu","doi":"10.1109/SP40001.2021.00104","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00104","url":null,"abstract":"In the past decade, the security of cellular networks has been increasingly under scrutiny, leading to the discovery of numerous vulnerabilities that expose the network and its users to a wide range of security risks, from denial of service to information leak. However, most of these findings have been made through ad-hoc manual analysis, which is inadequate for fundamentally enhancing the security assurance of a system as complex as the cellular network. An important observation is that the massive amount of technical documentation of cellular network can provide key insights into the protection it puts in place and help identify potential security flaws. Particularly, we found that such documentation often contains hazard indicators (HIs) – the statement that describes a risky operation (e.g., abort an ongoing procedure) when a certain event happens at a state, which can guide a test on the system to find out whether the operation can indeed be triggered by an unauthorized party to cause harm to the cellular core or legitimate users’ equipment. Based upon this observation, we present in this paper a new framework that makes the first step toward intelligent and systematic security analysis of cellular networks. Our approach, called Atomic, utilizes natural-language processing and machine learning techniques to scan a large amount of LTE documentation for HIs. The HIs discovered are further parsed and analyzed to recover state and event information for generating test cases. These test cases are further utilized to automatically construct tests in an LTE simulation environment, which runs the tests to detect the vulnerabilities in the LTE that allow the risky operations to happen without proper protection. In our research, we implemented Atomic and ran it on the LTE NAS specification, including 549 pages with 13,598 sentences and 283,850 words. In less than 5 hours, our prototype reported 42 vulnerabilities from 192 HIs discovered, including 10 never reported before, under two threat models. All these vulnerabilities have been confirmed through end-to-end attacks, which lead to unauthorized disruption of the LTE service a legitimate user’s equipment receives. We reported our findings to authorized parties and received their confirmation that these vulnerabilities indeed exist in major commercial carriers and $2,000 USD reward from Google.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"91 1","pages":"1197-1214"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74666857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis NtFuzz:在Windows上使用静态二进制分析启用类型感知内核模糊
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00114
Jaeseung Choi, Kangsu Kim, Daejin Lee, S. Cha
Although it is common practice for kernel fuzzers to leverage type information of system calls, current Windows kernel fuzzers do not follow the practice as most system calls are private and largely undocumented. In this paper, we present a practical static binary analyzer that automatically infers system call types on Windows at scale. We incorporate our analyzer to NtFuzz, a type-aware Windows kernel fuzzing framework. To our knowledge, this is the first practical fuzzing system that utilizes scalable binary analysis on a COTS OS. With NtFuzz, we found 11 previously unknown kernel bugs, and earned $25,000 through the bug bounty program offered by Microsoft. All these results confirm the practicality of our system as a kernel fuzzer.
尽管内核模糊器利用系统调用的类型信息是一种常见的做法,但当前的Windows内核模糊器并没有遵循这种做法,因为大多数系统调用都是私有的,而且在很大程度上没有记录。在本文中,我们提出了一个实用的静态二进制分析器,它可以大规模地自动推断Windows上的系统调用类型。我们将分析器整合到NtFuzz中,这是一个类型感知的Windows内核模糊测试框架。据我们所知,这是第一个在COTS操作系统上利用可扩展二进制分析的实用模糊测试系统。通过NtFuzz,我们发现了11个以前未知的内核错误,并通过微软提供的错误赏金计划获得了25,000美元。这些结果证实了本系统作为核心模糊器的实用性。
{"title":"NtFuzz: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis","authors":"Jaeseung Choi, Kangsu Kim, Daejin Lee, S. Cha","doi":"10.1109/SP40001.2021.00114","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00114","url":null,"abstract":"Although it is common practice for kernel fuzzers to leverage type information of system calls, current Windows kernel fuzzers do not follow the practice as most system calls are private and largely undocumented. In this paper, we present a practical static binary analyzer that automatically infers system call types on Windows at scale. We incorporate our analyzer to NtFuzz, a type-aware Windows kernel fuzzing framework. To our knowledge, this is the first practical fuzzing system that utilizes scalable binary analysis on a COTS OS. With NtFuzz, we found 11 previously unknown kernel bugs, and earned $25,000 through the bug bounty program offered by Microsoft. All these results confirm the practicality of our system as a kernel fuzzer.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"56 1","pages":"677-693"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81525688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
ARBITRAR: User-Guided API Misuse Detection 仲裁:用户导向的API误用检测
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00090
Ziyang Li, Aravind Machiry, Binghong Chen, M. Naik, Ke Wang, Le Song
Software APIs exhibit rich diversity and complexity which not only renders them a common source of programming errors but also hinders program analysis tools for checking them. Such tools either expect a precise API specification, which requires program analysis expertise, or presume that correct API usages follow simple idioms that can be automatically mined from code, which suffers from poor accuracy. We propose a new approach that allows regular programmers to find API misuses. Our approach interacts with the user to classify valid and invalid usages of each target API method. It minimizes user burden by employing an active learning algorithm that ranks API usages by their likelihood of being invalid. We implemented our approach in a tool called ARBITRAR for C/C++ programs, and applied it to check the uses of 18 API methods in 21 large real-world programs, including OpenSSL and Linux Kernel. Within just 3 rounds of user interaction on average per API method, ARBITRAR found 40 new bugs, with patches accepted for 18 of them. Moreover, ARBITRAR finds all known bugs reported by a state-of-the-art tool APISAN in a benchmark suite comprising 92 bugs with a false positive rate of only 51.5% compared to APISAN’s 87.9%.
软件api表现出丰富的多样性和复杂性,这不仅使它们成为编程错误的常见来源,而且阻碍了程序分析工具对它们进行检查。这类工具要么需要精确的API规范,这需要程序分析专业知识,要么假定正确的API用法遵循可以从代码中自动挖掘的简单习惯用法,而这种习惯用法的准确性很差。我们提出了一种新方法,允许普通程序员发现API的误用。我们的方法与用户交互,对每个目标API方法的有效和无效用法进行分类。它采用主动学习算法,根据API使用无效的可能性对其进行排序,从而最大限度地减少用户负担。我们在C/ c++程序的一个名为ARBITRAR的工具中实现了我们的方法,并应用它来检查21个大型现实世界程序(包括OpenSSL和Linux Kernel)中18种API方法的使用情况。在平均每个API方法的3轮用户交互中,ARBITRAR发现了40个新bug,其中18个已经接受了补丁。此外,ARBITRAR在一个包含92个错误的基准套件中发现了由最先进的工具APISAN报告的所有已知错误,假阳性率仅为51.5%,而APISAN的假阳性率为87.9%。
{"title":"ARBITRAR: User-Guided API Misuse Detection","authors":"Ziyang Li, Aravind Machiry, Binghong Chen, M. Naik, Ke Wang, Le Song","doi":"10.1109/SP40001.2021.00090","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00090","url":null,"abstract":"Software APIs exhibit rich diversity and complexity which not only renders them a common source of programming errors but also hinders program analysis tools for checking them. Such tools either expect a precise API specification, which requires program analysis expertise, or presume that correct API usages follow simple idioms that can be automatically mined from code, which suffers from poor accuracy. We propose a new approach that allows regular programmers to find API misuses. Our approach interacts with the user to classify valid and invalid usages of each target API method. It minimizes user burden by employing an active learning algorithm that ranks API usages by their likelihood of being invalid. We implemented our approach in a tool called ARBITRAR for C/C++ programs, and applied it to check the uses of 18 API methods in 21 large real-world programs, including OpenSSL and Linux Kernel. Within just 3 rounds of user interaction on average per API method, ARBITRAR found 40 new bugs, with patches accepted for 18 of them. Moreover, ARBITRAR finds all known bugs reported by a state-of-the-art tool APISAN in a benchmark suite comprising 92 bugs with a false positive rate of only 51.5% compared to APISAN’s 87.9%.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"8 1","pages":"1400-1415"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82339484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient 当LoRa遇到EMR:电磁隐蔽信道可以具有超级弹性
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00031
Cheng Shen, T. Liu, Jun Huang, Rui Tan
Due to the low power of electromagnetic radiation (EMR), EM convert channel has been widely considered as a short-range attack that can be easily mitigated by shielding. This paper overturns this common belief by demonstrating how covert EM signals leaked from typical laptops, desktops and servers are decoded from hundreds of meters away, or penetrate aggressive shield previously considered as sufficient to ensure emission security. We achieve this by designing EMLoRa – a super resilient EM covert channel that exploits memory as a LoRa-like radio. EMLoRa represents the first attempt of designing an EM covert channel using state-of-the-art spread spectrum technology. It tackles a set of unique challenges, such as handling complex spectral characteristics of EMR, tolerating signal distortions caused by CPU contention, and preventing adversarial detectors from demodulating covert signals. Experiment results show that EMLoRa boosts communication range by 20x and improves attenuation resilience by up to 53 dB when compared with prior EM covert channels at the same bit rate. By achieving this, EMLoRa allows an attacker to circumvent security perimeter, breach Faraday cage, and localize air-gapped devices in a wide area using just a small number of inexpensive sensors. To countermeasure EMLoRa, we further explore the feasibility of uncovering EMLoRa's signal using energy- and CNN-based detectors. Experiments show that both detectors suffer limited range, allowing EMLoRa to gain a significant range advantage. Our results call for further research on the countermeasure against spread spectrum-based EM covert channels.
由于电磁辐射(EMR)的低功率,电磁转换信道被广泛认为是一种可以很容易地通过屏蔽来减轻的近距离攻击。这篇论文推翻了这种普遍的看法,它展示了从典型的笔记本电脑、台式电脑和服务器泄露的隐蔽电磁信号是如何在数百米外被解码的,或者如何穿透以前被认为足以确保发射安全的侵略性屏蔽。我们通过设计EMLoRa来实现这一目标,EMLoRa是一种超级弹性的EM隐蔽信道,利用存储器作为LoRa-like无线电。EMLoRa代表了使用最先进的扩频技术设计EM隐蔽信道的第一次尝试。它解决了一系列独特的挑战,例如处理EMR的复杂频谱特性,容忍由CPU争用引起的信号失真,以及防止对抗性检测器解调隐蔽信号。实验结果表明,在相同比特率下,EMLoRa与现有的EM隐蔽信道相比,通信范围提高了20倍,衰减恢复能力提高了53 dB。通过实现这一点,EMLoRa允许攻击者绕过安全边界,突破法拉第笼,并使用少量廉价的传感器在大范围内定位气隙设备。为了对抗EMLoRa,我们进一步探索了使用基于能量和cnn的检测器来发现EMLoRa信号的可行性。实验表明,这两种探测器的距离都是有限的,这使得EMLoRa获得了显著的距离优势。我们的研究结果要求对基于扩频的EM隐蔽信道的对策进行进一步的研究。
{"title":"When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient","authors":"Cheng Shen, T. Liu, Jun Huang, Rui Tan","doi":"10.1109/SP40001.2021.00031","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00031","url":null,"abstract":"Due to the low power of electromagnetic radiation (EMR), EM convert channel has been widely considered as a short-range attack that can be easily mitigated by shielding. This paper overturns this common belief by demonstrating how covert EM signals leaked from typical laptops, desktops and servers are decoded from hundreds of meters away, or penetrate aggressive shield previously considered as sufficient to ensure emission security. We achieve this by designing EMLoRa – a super resilient EM covert channel that exploits memory as a LoRa-like radio. EMLoRa represents the first attempt of designing an EM covert channel using state-of-the-art spread spectrum technology. It tackles a set of unique challenges, such as handling complex spectral characteristics of EMR, tolerating signal distortions caused by CPU contention, and preventing adversarial detectors from demodulating covert signals. Experiment results show that EMLoRa boosts communication range by 20x and improves attenuation resilience by up to 53 dB when compared with prior EM covert channels at the same bit rate. By achieving this, EMLoRa allows an attacker to circumvent security perimeter, breach Faraday cage, and localize air-gapped devices in a wide area using just a small number of inexpensive sensors. To countermeasure EMLoRa, we further explore the feasibility of uncovering EMLoRa's signal using energy- and CNN-based detectors. Experiments show that both detectors suffer limited range, allowing EMLoRa to gain a significant range advantage. Our results call for further research on the countermeasure against spread spectrum-based EM covert channels.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"48 1","pages":"1304-1317"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75750214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2021 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1