首页 > 最新文献

2021 IEEE Symposium on Security and Privacy (SP)最新文献

英文 中文
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse 仇恨、骚扰和网络暴力的变化
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00028
Kurt Thomas, Devdatta Akhawe, Michael Bailey, D. Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Z. Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, S. Meiklejohn, T. Ristenpart, G. Stringhini
We argue that existing security, privacy, and antiabuse protections fail to address the growing threat of online hate and harassment. In order for our community to understand and address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs. In the process, we identify seven classes of attacks—such as toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal evidence from a three-year survey that hate and harassment is a pervasive, growing experience for online users, particularly for at-risk communities like young adults and people who identify as LGBTQ+. Responding to each class of hate and harassment requires a unique strategy and we highlight five such potential research directions that ultimately empower individuals, communities, and platforms to do so.
我们认为,现有的安全、隐私和反滥用保护措施未能解决日益增长的网络仇恨和骚扰威胁。为了让我们的社区理解和解决这一差距,我们提出了一个关于在线仇恨和骚扰的推理分类。我们的分类法借鉴了150多篇跨学科研究论文,涵盖了从亲密伴侣暴力到协同暴民等不同的威胁。在这个过程中,我们确定了7类攻击——比如有毒内容和监视——每一类攻击都源于不同的攻击者能力和意图。我们还提供了一项为期三年的纵向调查的证据,表明仇恨和骚扰对网络用户来说是一种普遍的、日益增长的体验,尤其是对年轻人和LGBTQ+人群等高危群体。应对每一类仇恨和骚扰需要一个独特的策略,我们强调了五个潜在的研究方向,最终赋予个人、社区和平台这样做的能力。
{"title":"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse","authors":"Kurt Thomas, Devdatta Akhawe, Michael Bailey, D. Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Z. Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, S. Meiklejohn, T. Ristenpart, G. Stringhini","doi":"10.1109/SP40001.2021.00028","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00028","url":null,"abstract":"We argue that existing security, privacy, and antiabuse protections fail to address the growing threat of online hate and harassment. In order for our community to understand and address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs. In the process, we identify seven classes of attacks—such as toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal evidence from a three-year survey that hate and harassment is a pervasive, growing experience for online users, particularly for at-risk communities like young adults and people who identify as LGBTQ+. Responding to each class of hate and harassment requires a unique strategy and we highlight five such potential research directions that ultimately empower individuals, communities, and platforms to do so.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"103 1","pages":"247-267"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80417856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
An Interactive Prover for Protocol Verification in the Computational Model 计算模型中协议验证的交互式证明器
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00078
David Baelde, S. Delaune, Charlie Jacomme, Adrien Koutsos, Solène Moreau
Given the central importance of designing secure protocols, providing solid mathematical foundations and computer-assisted methods to attest for their correctness is becoming crucial. Here, we elaborate on the formal approach introduced by Bana and Comon in [10], [11], which was originally designed to analyze protocols for a fixed number of sessions, and lacks support for proof mechanization.In this paper, we present a framework and an interactive prover allowing to mechanize proofs of security protocols for an arbitrary number of sessions in the computational model. More specifically, we develop a meta-logic as well as a proof system for deriving security properties. Proofs in our system only deal with high-level, symbolic representations of protocol executions, similar to proofs in the symbolic model, but providing security guarantees at the computational level. We have implemented our approach within a new interactive prover, the Squirrel prover, taking as input protocols specified in the applied pi-calculus, and we have performed a number of case studies covering a variety of primitives (hashes, encryption, signatures, Diffie-Hellman exponentiation) and security properties (authentication, strong secrecy, unlinkability).
考虑到设计安全协议的核心重要性,提供坚实的数学基础和计算机辅助方法来证明其正确性变得至关重要。在这里,我们详细阐述了Bana和Comon在[10],[11]中引入的形式化方法,该方法最初设计用于分析固定数量会话的协议,并且缺乏对证明机械化的支持。在本文中,我们提出了一个框架和一个交互式证明器,允许在计算模型中为任意数量的会话机械化安全协议的证明。更具体地说,我们开发了一个元逻辑以及一个用于派生安全属性的证明系统。我们系统中的证明只处理协议执行的高级符号表示,类似于符号模型中的证明,但在计算层面提供安全保证。我们已经在一个新的交互式证明器Squirrel证明器中实现了我们的方法,将其作为应用pi-calculus中指定的输入协议,并且我们已经执行了许多案例研究,涵盖了各种原语(哈希、加密、签名、Diffie-Hellman幂)和安全属性(身份验证、强保密性、不可链接性)。
{"title":"An Interactive Prover for Protocol Verification in the Computational Model","authors":"David Baelde, S. Delaune, Charlie Jacomme, Adrien Koutsos, Solène Moreau","doi":"10.1109/SP40001.2021.00078","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00078","url":null,"abstract":"Given the central importance of designing secure protocols, providing solid mathematical foundations and computer-assisted methods to attest for their correctness is becoming crucial. Here, we elaborate on the formal approach introduced by Bana and Comon in [10], [11], which was originally designed to analyze protocols for a fixed number of sessions, and lacks support for proof mechanization.In this paper, we present a framework and an interactive prover allowing to mechanize proofs of security protocols for an arbitrary number of sessions in the computational model. More specifically, we develop a meta-logic as well as a proof system for deriving security properties. Proofs in our system only deal with high-level, symbolic representations of protocol executions, similar to proofs in the symbolic model, but providing security guarantees at the computational level. We have implemented our approach within a new interactive prover, the Squirrel prover, taking as input protocols specified in the applied pi-calculus, and we have performed a number of case studies covering a variety of primitives (hashes, encryption, signatures, Diffie-Hellman exponentiation) and security properties (authentication, strong secrecy, unlinkability).","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"109 1","pages":"537-554"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74663248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures 超越不可伪造性和后量子签名的强化签名方案
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00093
C. Cremers, Samed Düzlü, Rune Fiedler, M. Fischlin, Christian Janson
Modern digital signature schemes can provide more guarantees than the standard notion of (strong) unforgeability, such as offering security even in the presence of maliciously generated keys, or requiring to know a message to produce a signature for it. The use of signature schemes that lack these properties has previously enabled attacks on real-world protocols. In this work we revisit several of these notions beyond unforgeability, establish relations among them, provide the first formal definition of non re-signability, and a transformation that can provide these properties for a given signature scheme in a provable and efficient way.Our results are not only relevant for established schemes: for example, the ongoing NIST PQC competition towards standardizing post-quantum signature schemes has six finalists in its third round. We perform an in-depth analysis of the candidates with respect to their security properties beyond unforgeability. We show that many of them do not yet offer these stronger guarantees, which implies that the security guarantees of these post-quantum schemes are not strictly stronger than, but instead incomparable to, classical signature schemes. We show how applying our transformation would efficiently solve this, paving the way for the standardized schemes to provide these additional guarantees and thereby making them harder to misuse.
现代数字签名方案可以提供比(强)不可伪造性的标准概念更多的保证,例如即使存在恶意生成的密钥,也可以提供安全性,或者需要知道消息才能为其生成签名。以前,使用缺乏这些属性的签名方案会导致对真实世界协议的攻击。在这项工作中,我们重新审视了不可伪造性之外的几个概念,建立了它们之间的关系,提供了第一个不可重可标记性的正式定义,并以一种可证明和有效的方式为给定的签名方案提供了这些属性的转换。我们的研究结果不仅与已建立的方案相关:例如,正在进行的标准化后量子签名方案的NIST PQC竞赛在第三轮中有六个决赛选手。除了不可伪造性之外,我们还对候选人的安全属性进行了深入分析。我们表明,它们中的许多还没有提供这些更强的保证,这意味着这些后量子方案的安全保证并不严格地比经典签名方案强,而是无法与之相比。我们将展示如何应用我们的转换来有效地解决这个问题,为标准化方案提供这些额外的保证铺平道路,从而使它们更难被滥用。
{"title":"BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures","authors":"C. Cremers, Samed Düzlü, Rune Fiedler, M. Fischlin, Christian Janson","doi":"10.1109/SP40001.2021.00093","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00093","url":null,"abstract":"Modern digital signature schemes can provide more guarantees than the standard notion of (strong) unforgeability, such as offering security even in the presence of maliciously generated keys, or requiring to know a message to produce a signature for it. The use of signature schemes that lack these properties has previously enabled attacks on real-world protocols. In this work we revisit several of these notions beyond unforgeability, establish relations among them, provide the first formal definition of non re-signability, and a transformation that can provide these properties for a given signature scheme in a provable and efficient way.Our results are not only relevant for established schemes: for example, the ongoing NIST PQC competition towards standardizing post-quantum signature schemes has six finalists in its third round. We perform an in-depth analysis of the candidates with respect to their security properties beyond unforgeability. We show that many of them do not yet offer these stronger guarantees, which implies that the security guarantees of these post-quantum schemes are not strictly stronger than, but instead incomparable to, classical signature schemes. We show how applying our transformation would efficiently solve this, paving the way for the standardized schemes to provide these additional guarantees and thereby making them harder to misuse.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"74 1","pages":"1696-1714"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87085755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Decentralized and Encrypted National Gun Registry 一个分散和加密的国家枪支登记处
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00072
S. Kamara, Tarik Moataz, A. Park, Lucy Qin
Gun violence results in a significant number of deaths in the United States. Starting in the 1960’s, the US Congress passed a series of gun control laws to regulate the sale and use of firearms. One of the most important but politically fraught gun control measures is a national gun registry. A US Senate office is currently drafting legislation that proposes the creation of a voluntary national gun registration system. At a high level, the bill envisions a decentralized system where local county officials would control and manage the registration data of their constituents. These local databases could then be queried by other officials and law enforcement to trace guns. Due to the sensitive nature of this data, however, these databases should guarantee the confidentiality of the data.In this work, we translate the high-level vision of the proposed legislation into technical requirements and design a crypto- graphic protocol that meets them. Roughly speaking, the protocol can be viewed as a decentralized system of locally-managed end-to-end encrypted databases. Our design relies on various cryptographic building blocks including structured encryption, secure multi-party computation and secret sharing. We propose a formal security definition and prove that our design meets it. We implemented our protocol and evaluated its performance empirically at the scale it would have to run if it were deployed in the United States. Our results show that a decentralized and end-to-end encrypted national gun registry is not only possible in theory but feasible in practice.
在美国,枪支暴力导致大量人员死亡。从20世纪60年代开始,美国国会通过了一系列枪支管制法来规范枪支的销售和使用。最重要但政治上充满争议的枪支管制措施之一是全国枪支登记。美国参议院办公室目前正在起草立法,建议建立一个自愿的国家枪支登记系统。在高层次上,该法案设想了一个分散的系统,地方县官员将控制和管理其选民的登记数据。然后,其他官员和执法部门可以查询这些本地数据库,以追踪枪支。然而,由于这些数据的敏感性,这些数据库应该保证数据的机密性。在这项工作中,我们将拟议立法的高层愿景转化为技术要求,并设计满足这些要求的加密协议。粗略地说,该协议可以被视为本地管理的端到端加密数据库的分散系统。我们的设计依赖于各种加密构建块,包括结构化加密,安全多方计算和秘密共享。我们提出了一个正式的安全定义,并证明我们的设计符合它。我们实现了我们的协议,并根据它在美国部署时必须运行的规模对其性能进行了经验评估。我们的研究结果表明,一个分散的端到端加密的国家枪支登记处不仅在理论上是可能的,而且在实践中是可行的。
{"title":"A Decentralized and Encrypted National Gun Registry","authors":"S. Kamara, Tarik Moataz, A. Park, Lucy Qin","doi":"10.1109/SP40001.2021.00072","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00072","url":null,"abstract":"Gun violence results in a significant number of deaths in the United States. Starting in the 1960’s, the US Congress passed a series of gun control laws to regulate the sale and use of firearms. One of the most important but politically fraught gun control measures is a national gun registry. A US Senate office is currently drafting legislation that proposes the creation of a voluntary national gun registration system. At a high level, the bill envisions a decentralized system where local county officials would control and manage the registration data of their constituents. These local databases could then be queried by other officials and law enforcement to trace guns. Due to the sensitive nature of this data, however, these databases should guarantee the confidentiality of the data.In this work, we translate the high-level vision of the proposed legislation into technical requirements and design a crypto- graphic protocol that meets them. Roughly speaking, the protocol can be viewed as a decentralized system of locally-managed end-to-end encrypted databases. Our design relies on various cryptographic building blocks including structured encryption, secure multi-party computation and secret sharing. We propose a formal security definition and prove that our design meets it. We implemented our protocol and evaluated its performance empirically at the scale it would have to run if it were deployed in the United States. Our results show that a decentralized and end-to-end encrypted national gun registry is not only possible in theory but feasible in practice.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"25 1","pages":"1520-1537"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91428329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting 你把我弄糊涂了吗?电子投票中可验证混合网的正式验证
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00033
Thomas Haines, R. Goré, Bhavesh Sharma
Verifiable mix nets, and specifically proofs of (correct) shuffle, are a fundamental building block in numerous applications: these zero-knowledge proofs allow the prover to produce a public transcript which can be perused by the verifier to confirm the purported shuffle. They are particularly vital to verifiable electronic voting, where they underpin almost all voting schemes with non-trivial tallying methods. These complicated pieces of cryptography are a prime location for critical errors which might allow undetected modification of the outcome.The best solution to preventing these errors is to machine-check the cryptographic properties of the design and implementation of the mix net. Particularly crucial for the integrity of the outcome is the soundness of the design and implementation of the verifier (software). Unfortunately, several different encryption schemes are used in many different slight variations which makes it infeasible to machine-check every single case individually. However, a particular optimised variant of the Terelius-Wikström mix net is, and has been, widely deployed in elections including national elections in Norway, Estonia and Switzerland, albeit with many slight variations and several different encryption schemes.In this work, we develop the logical theory and formal methods tools to machine-check the design and implementation of all these variants of Terelius-Wikström mix nets, for all the different encryption schemes used; resulting in provably correct mix nets for all these different variations. We do this carefully to ensure that we can extract a formally verified implementation of the verifier (software) which is compatible with existing deployed implementations of the Terelius-Wikström mix net. This gives us provably correct implementations of the verifiers for more than half of the national elections which have used verifiable mix nets.Our implementation of a proof of correct shuffle is the first to be machine-checked to be cryptographically correct and able to verify proof transcripts from national elections. We demonstrate the practicality of our implementation by verifying transcripts produced by the Verificatum mix net system and the CHVote e-voting system from Switzerland.
可验证的混合网络,特别是(正确的)洗牌证明,是许多应用程序中的基本构建块:这些零知识证明允许证明者生成一个公共记录,验证者可以阅读该记录来确认所谓的洗牌。它们对于可验证的电子投票尤其重要,在电子投票中,它们支持几乎所有具有重要计数方法的投票方案。这些复杂的密码学片段是发生关键错误的主要场所,这些错误可能允许对结果进行未被发现的修改。防止这些错误的最佳解决方案是对混合网络的设计和实现的加密特性进行机器检查。对于结果的完整性来说,特别重要的是验证器(软件)的设计和实现的可靠性。不幸的是,在许多不同的细微变化中使用了几种不同的加密方案,这使得单独对每种情况进行机器检查是不可行的。然而,Terelius-Wikström混合网络的一种特殊优化变体已经被广泛部署在选举中,包括挪威、爱沙尼亚和瑞士的全国选举,尽管有许多细微的变化和几种不同的加密方案。在这项工作中,我们开发了逻辑理论和形式化方法工具来机器检查Terelius-Wikström混合网络的所有这些变体的设计和实现,用于所有不同的加密方案;从而得到可证明正确的混合网,适用于所有这些不同的变化。我们仔细地这样做,以确保我们可以提取一个正式验证的验证器(软件)的实现,它与Terelius-Wikström mix网的现有部署实现兼容。这为我们提供了可以证明的验证器的正确实现,超过一半的国家选举使用了可验证的混合网络。我们实现的正确洗牌证明是第一个通过机器检查加密正确并能够验证国家选举证明副本的实现。我们通过验证Verificatum混合网络系统和瑞士CHVote电子投票系统产生的成绩单来证明我们实现的实用性。
{"title":"Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting","authors":"Thomas Haines, R. Goré, Bhavesh Sharma","doi":"10.1109/SP40001.2021.00033","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00033","url":null,"abstract":"Verifiable mix nets, and specifically proofs of (correct) shuffle, are a fundamental building block in numerous applications: these zero-knowledge proofs allow the prover to produce a public transcript which can be perused by the verifier to confirm the purported shuffle. They are particularly vital to verifiable electronic voting, where they underpin almost all voting schemes with non-trivial tallying methods. These complicated pieces of cryptography are a prime location for critical errors which might allow undetected modification of the outcome.The best solution to preventing these errors is to machine-check the cryptographic properties of the design and implementation of the mix net. Particularly crucial for the integrity of the outcome is the soundness of the design and implementation of the verifier (software). Unfortunately, several different encryption schemes are used in many different slight variations which makes it infeasible to machine-check every single case individually. However, a particular optimised variant of the Terelius-Wikström mix net is, and has been, widely deployed in elections including national elections in Norway, Estonia and Switzerland, albeit with many slight variations and several different encryption schemes.In this work, we develop the logical theory and formal methods tools to machine-check the design and implementation of all these variants of Terelius-Wikström mix nets, for all the different encryption schemes used; resulting in provably correct mix nets for all these different variations. We do this carefully to ensure that we can extract a formally verified implementation of the verifier (software) which is compatible with existing deployed implementations of the Terelius-Wikström mix net. This gives us provably correct implementations of the verifiers for more than half of the national elections which have used verifiable mix nets.Our implementation of a proof of correct shuffle is the first to be machine-checked to be cryptographically correct and able to verify proof transcripts from national elections. We demonstrate the practicality of our implementation by verifying transcripts produced by the Verificatum mix net system and the CHVote e-voting system from Switzerland.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"1 1","pages":"1748-1765"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90899736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Is Private Learning Possible with Instance Encoding? 实例编码可以实现私人学习吗?
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00099
Nicholas Carlini, Samuel Deng, Sanjam Garg, S. Jha, Saeed Mahloujifar, Mohammad Mahmoody, Florian Tramèr
A private machine learning algorithm hides as much as possible about its training data while still preserving accuracy. In this work, we study whether a non-private learning algorithm can be made private by relying on an instance-encoding mechanism that modifies the training inputs before feeding them to a normal learner. We formalize both the notion of instance encoding and its privacy by providing two attack models. We first prove impossibility results for achieving a (stronger) model. Next, we demonstrate practical attacks in the second (weaker) attack model on InstaHide, a recent proposal by Huang, Song, Li and Arora [ICML’20] that aims to use instance encoding for privacy.
一种私人机器学习算法在保持准确性的同时尽可能多地隐藏其训练数据。在这项工作中,我们研究了非私有学习算法是否可以通过依赖实例编码机制来实现私有,该机制在将训练输入输入馈送给正常学习者之前对其进行修改。我们通过提供两种攻击模型形式化了实例编码及其隐私的概念。我们首先证明了实现(更强)模型的不可能结果。接下来,我们在InstaHide上演示了第二种(较弱的)攻击模型中的实际攻击,这是Huang, Song, Li和Arora [ICML ' 20]最近提出的一种攻击模型,旨在使用实例编码来保护隐私。
{"title":"Is Private Learning Possible with Instance Encoding?","authors":"Nicholas Carlini, Samuel Deng, Sanjam Garg, S. Jha, Saeed Mahloujifar, Mohammad Mahmoody, Florian Tramèr","doi":"10.1109/SP40001.2021.00099","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00099","url":null,"abstract":"A private machine learning algorithm hides as much as possible about its training data while still preserving accuracy. In this work, we study whether a non-private learning algorithm can be made private by relying on an instance-encoding mechanism that modifies the training inputs before feeding them to a normal learner. We formalize both the notion of instance encoding and its privacy by providing two attack models. We first prove impossibility results for achieving a (stronger) model. Next, we demonstrate practical attacks in the second (weaker) attack model on InstaHide, a recent proposal by Huang, Song, Li and Arora [ICML’20] that aims to use instance encoding for privacy.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"76 1","pages":"410-427"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85520491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Good Bot, Bad Bot: Characterizing Automated Browsing Activity 好机器人,坏机器人:自动浏览活动的特征
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00079
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis
As the web keeps increasing in size, the number of vulnerable and poorly-managed websites increases commensurately. Attackers rely on armies of malicious bots to discover these vulnerable websites, compromising their servers, and exfiltrating sensitive user data. It is, therefore, crucial for the security of the web to understand the population and behavior of malicious bots.In this paper, we report on the design, implementation, and results of Aristaeus, a system for deploying large numbers of "honeysites", i.e., websites that exist for the sole purpose of attracting and recording bot traffic. Through a seven-month-long experiment with 100 dedicated honeysites, Aristaeus recorded 26.4 million requests sent by more than 287K unique IP addresses, with 76,396 of them belonging to clearly malicious bots. By analyzing the type of requests and payloads that these bots send, we discover that the average honeysite received more than 37K requests each month, with more than 50% of these requests attempting to brute-force credentials, fingerprint the deployed web applications, and exploit large numbers of different vulnerabilities. By comparing the declared identity of these bots with their TLS handshakes and HTTP headers, we uncover that more than 86.2% of bots are claiming to be Mozilla Firefox and Google Chrome, yet are built on simple HTTP libraries and command-line tools.
随着网络规模的不断扩大,易受攻击和管理不善的网站数量也相应增加。攻击者依靠恶意机器人大军来发现这些易受攻击的网站,破坏他们的服务器,并泄露敏感的用户数据。因此,了解恶意机器人的数量和行为对网络安全至关重要。在本文中,我们报告了Aristaeus的设计、实现和结果,Aristaeus是一个部署大量“蜜源网站”的系统,即仅为吸引和记录机器人流量而存在的网站。通过对100个专门的蜂蜜网站长达7个月的实验,Aristaeus记录了超过287K个唯一IP地址发送的2640万个请求,其中76396个属于明显的恶意机器人。通过分析这些机器人发送的请求类型和有效负载,我们发现蜂蜜网站平均每月收到超过37K个请求,其中超过50%的请求试图暴力破解凭据,指纹部署的web应用程序,并利用大量不同的漏洞。通过将这些机器人的声明身份与其TLS握手和HTTP头进行比较,我们发现超过86.2%的机器人声称是Mozilla Firefox和Google Chrome,但它们是基于简单的HTTP库和命令行工具构建的。
{"title":"Good Bot, Bad Bot: Characterizing Automated Browsing Activity","authors":"Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis","doi":"10.1109/SP40001.2021.00079","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00079","url":null,"abstract":"As the web keeps increasing in size, the number of vulnerable and poorly-managed websites increases commensurately. Attackers rely on armies of malicious bots to discover these vulnerable websites, compromising their servers, and exfiltrating sensitive user data. It is, therefore, crucial for the security of the web to understand the population and behavior of malicious bots.In this paper, we report on the design, implementation, and results of Aristaeus, a system for deploying large numbers of \"honeysites\", i.e., websites that exist for the sole purpose of attracting and recording bot traffic. Through a seven-month-long experiment with 100 dedicated honeysites, Aristaeus recorded 26.4 million requests sent by more than 287K unique IP addresses, with 76,396 of them belonging to clearly malicious bots. By analyzing the type of requests and payloads that these bots send, we discover that the average honeysite received more than 37K requests each month, with more than 50% of these requests attempting to brute-force credentials, fingerprint the deployed web applications, and exploit large numbers of different vulnerabilities. By comparing the declared identity of these bots with their TLS handshakes and HTTP headers, we uncover that more than 86.2% of bots are claiming to be Mozilla Firefox and Google Chrome, yet are built on simple HTTP libraries and command-line tools.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"16 1","pages":"1589-1605"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87874117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites 如果他们一起工作,他们会做得更好:密码管理器和网站之间的交互问题的案例
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00094
Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Y. Acar, S. Fahl
Password managers are tools to support users with the secure generation and storage of credentials and logins used in online accounts. Previous work illustrated that building password managers means facing various security and usability challenges. For strong security and good usability, the interaction between password managers and websites needs to be smooth and effortless. However, user reviews for popular password managers suggest interaction problems for some websites. Therefore, to the best of our knowledge, this work is the first to systematically identify these interaction problems and investigate how 15 desktop password managers, including the ten most popular ones, are affected. We use a qualitative analysis approach to identify 39 interaction problems from 2,947 user reviews and 372 GitHub issues for 30 password managers. Next, we implement minimal working examples (MWEs) for all interaction problems we found and evaluate them for all password managers in 585 test cases.Our results illustrate that a) password managers struggle to correctly implement authentication features such as HTTP Basic Authentication and modern standards such as the autocomplete-attribute and b) websites fail to implement clean and well-structured authentication forms. We conclude that some of our findings can be addressed by either PWM providers or web-developers by adhering to already existing standards, recommendations and best practices, while other cases are currently almost impossible to implement securely and require further research.
密码管理器是支持用户安全生成和存储在线帐户中使用的凭据和登录的工具。以前的工作表明,构建密码管理器意味着面临各种安全性和可用性挑战。为了获得较强的安全性和良好的可用性,密码管理器与网站之间的交互需要流畅和轻松。然而,用户对流行密码管理器的评论表明,一些网站存在交互问题。因此,据我们所知,这项工作是第一个系统地识别这些交互问题,并调查15个桌面密码管理器,包括10个最流行的,是如何受到影响的。我们使用定性分析方法从2947个用户评论和372个GitHub问题中确定了30个密码管理器的39个交互问题。接下来,我们为发现的所有交互问题实现最小工作示例(MWEs),并在585个测试用例中对所有密码管理器进行评估。我们的研究结果表明,a)密码管理器难以正确实现身份验证功能,如HTTP基本身份验证和现代标准,如自动完成属性;b)网站未能实现干净、结构良好的身份验证表单。我们的结论是,我们的一些发现可以由PWM提供商或web开发人员通过遵循现有的标准、建议和最佳实践来解决,而其他情况目前几乎不可能安全实现,需要进一步研究。
{"title":"They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites","authors":"Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Y. Acar, S. Fahl","doi":"10.1109/SP40001.2021.00094","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00094","url":null,"abstract":"Password managers are tools to support users with the secure generation and storage of credentials and logins used in online accounts. Previous work illustrated that building password managers means facing various security and usability challenges. For strong security and good usability, the interaction between password managers and websites needs to be smooth and effortless. However, user reviews for popular password managers suggest interaction problems for some websites. Therefore, to the best of our knowledge, this work is the first to systematically identify these interaction problems and investigate how 15 desktop password managers, including the ten most popular ones, are affected. We use a qualitative analysis approach to identify 39 interaction problems from 2,947 user reviews and 372 GitHub issues for 30 password managers. Next, we implement minimal working examples (MWEs) for all interaction problems we found and evaluate them for all password managers in 585 test cases.Our results illustrate that a) password managers struggle to correctly implement authentication features such as HTTP Basic Authentication and modern standards such as the autocomplete-attribute and b) websites fail to implement clean and well-structured authentication forms. We conclude that some of our findings can be addressed by either PWM providers or web-developers by adhering to already existing standards, recommendations and best practices, while other cases are currently almost impossible to implement securely and require further research.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"62 1","pages":"1367-1381"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89498728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices 当你醒来刷新:主动阈值钱包与离线设备
Pub Date : 2021-05-01 DOI: 10.1109/SP40001.2021.00067
Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
Proactive security is the notion of defending a distributed system against an attacker who compromises different devices through its lifetime, but no more than a threshold number of them at any given time. The emergence of threshold wallets for more secure cryptocurrency custody warrants an efficient proactivization protocol tailored to this setting. While many proactivization protocols have been devised and studied in the literature, none of them have communication patterns ideal for threshold wallets. In particular a (t, n) threshold wallet is designed to have t parties jointly sign a transaction (of which only one may be honest) whereas even the best current proactivization protocols require at least an additional t−1 honest parties to come online simultaneously to refresh the system.In this work we formulate the notion of refresh with offline devices, where any tρ parties may proactivize the system at any time and the remaining n−tρ offline parties can non-interactively "catch up" at their leisure. However, many subtle issues arise in realizing this pattern. We identify that this problem is divided into two settings: (2, n) and (t, n) where t > 2. We develop novel techniques to address both settings as follows:•We show that the (2, n) setting permits a tight tρ for refresh. In particular we give a highly efficient tρ = 2 protocol to upgrade a number of standard (2, n) threshold signature schemes to proactive security with offline refresh. This protocol can augment existing implementations of threshold wallets for immediate use– we show that proactivization does not have to interfere with their native mode of operation. This technique is compatible with Schnorr, EdDSA, and with some effort even sophisticated ECDSA protocols. By implementation we show that proactivizing two different recent (2, n) ECDSA protocols incurs only 14% and 24% computational overhead respectively, less than 200 bytes, and no extra round of communication.•For the general (t, n) setting we prove that it is impossible to construct an offline refresh protocol with tρ < 2(t−1), i.e. tolerating a dishonest majority of online parties. Our techniques are novel in reasoning about the message complexity of proactive security, and may be of independent interest.Our results are positive for small-scale decentralization (such as 2FA with threshold wallets), and negative for large-scale distributed systems with higher thresholds. We thus initiate the study of proactive security with offline refresh, with a comprehensive treatment of the dishonest majority case.
主动安全的概念是保护分布式系统免受攻击者的攻击,攻击者在其生命周期内危害不同的设备,但在任何给定时间内不超过阈值数量。为了更安全的加密货币托管而出现的阈值钱包,需要为这种设置量身定制有效的激活协议。虽然在文献中已经设计和研究了许多激活协议,但它们都没有适合阈值钱包的通信模式。特别是一个(t, n)阈值钱包被设计成让t方共同签署一笔交易(其中只有一方可能是诚实的),而即使是最好的当前激活协议也需要至少额外的t−1个诚实方同时在线以刷新系统。在这项工作中,我们制定了离线设备刷新的概念,其中任何tρ方都可以随时激活系统,而剩余的n- tρ离线方可以在空闲时非交互式地“赶上”。然而,在实现这种模式时出现了许多微妙的问题。我们确定这个问题分为两个设置:(2,n)和(t, n),其中t > 2。我们开发了新的技术来解决以下两种设置:•我们表明(2,n)设置允许严格的刷新ρ。特别是,我们给出了一个高效的ρ = 2协议,将许多标准(2,n)阈值签名方案升级为具有离线刷新的主动安全性。该协议可以增强阈值钱包的现有实现以立即使用-我们表明,激活不必干扰其原生操作模式。该技术与Schnorr、EdDSA甚至复杂的ECDSA协议兼容。通过实现,我们表明激活两个不同的最新(2,n) ECDSA协议分别只产生14%和24%的计算开销,小于200字节,并且没有额外的通信轮。•对于一般(t, n)设置,我们证明不可能构建tρ < 2(t−1)的离线刷新协议,即容忍大多数不诚实的在线各方。我们的技术在对主动安全的消息复杂性进行推理方面是新颖的,并且可能具有独立的兴趣。我们的结果对于小规模的去中心化(例如带有阈值钱包的2FA)是积极的,对于具有更高阈值的大规模分布式系统是消极的。因此,我们启动了具有离线刷新的主动安全研究,以全面处理不诚实的大多数情况。
{"title":"Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices","authors":"Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits","doi":"10.1109/SP40001.2021.00067","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00067","url":null,"abstract":"Proactive security is the notion of defending a distributed system against an attacker who compromises different devices through its lifetime, but no more than a threshold number of them at any given time. The emergence of threshold wallets for more secure cryptocurrency custody warrants an efficient proactivization protocol tailored to this setting. While many proactivization protocols have been devised and studied in the literature, none of them have communication patterns ideal for threshold wallets. In particular a (t, n) threshold wallet is designed to have t parties jointly sign a transaction (of which only one may be honest) whereas even the best current proactivization protocols require at least an additional t−1 honest parties to come online simultaneously to refresh the system.In this work we formulate the notion of refresh with offline devices, where any tρ parties may proactivize the system at any time and the remaining n−tρ offline parties can non-interactively \"catch up\" at their leisure. However, many subtle issues arise in realizing this pattern. We identify that this problem is divided into two settings: (2, n) and (t, n) where t > 2. We develop novel techniques to address both settings as follows:•We show that the (2, n) setting permits a tight tρ for refresh. In particular we give a highly efficient tρ = 2 protocol to upgrade a number of standard (2, n) threshold signature schemes to proactive security with offline refresh. This protocol can augment existing implementations of threshold wallets for immediate use– we show that proactivization does not have to interfere with their native mode of operation. This technique is compatible with Schnorr, EdDSA, and with some effort even sophisticated ECDSA protocols. By implementation we show that proactivizing two different recent (2, n) ECDSA protocols incurs only 14% and 24% computational overhead respectively, less than 200 bytes, and no extra round of communication.•For the general (t, n) setting we prove that it is impossible to construct an offline refresh protocol with tρ < 2(t−1), i.e. tolerating a dishonest majority of online parties. Our techniques are novel in reasoning about the message complexity of proactive security, and may be of independent interest.Our results are positive for small-scale decentralization (such as 2FA with threshold wallets), and negative for large-scale distributed systems with higher thresholds. We thus initiate the study of proactive security with offline refresh, with a comprehensive treatment of the dishonest majority case.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"66 1","pages":"608-625"},"PeriodicalIF":0.0,"publicationDate":"2021-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86066946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU CryptGPU:基于GPU的快速隐私保护机器学习
Pub Date : 2021-04-22 DOI: 10.1109/SP40001.2021.00098
Sijun Tan, Brian Knott, Yuan Tian, David J. Wu
We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing scalable privacy-preserving deep learning. In this work, we start by introducing a new interface to losslessly embed cryptographic operations over secret-shared values (in a discrete domain) into floating-point operations that can be processed by highly-optimized CUDA kernels for linear algebra. We then identify a sequence of "GPU-friendly" cryptographic protocols to enable privacy-preserving evaluation of both linear and non-linear operations on the GPU. Our microbenchmarks indicate that our private GPU-based convolution protocol is over 150× faster than the analogous CPU-based protocol; for non-linear operations like the ReLU activation function, our GPU-based protocol is around 10× faster than its CPU analog. With CryptGPU, we support private inference and training on convolutional neural networks with over 60 million parameters as well as handle large datasets like ImageNet. Compared to the previous state-of-the-art, our protocols achieve a 2× to 8× improvement in private inference for large networks and datasets. For private training, we achieve a 6× to 36× improvement over prior state-of-the-art. Our work not only showcases the viability of performing secure multiparty computation (MPC) entirely on the GPU to newly enable fast privacy-preserving machine learning, but also highlights the importance of designing new MPC primitives that can take full advantage of the GPU’s computing capabilities.
我们介绍CryptGPU,一个隐私保护机器学习系统,在GPU(图形处理单元)上实现所有操作。正如gpu在现代深度学习的成功中发挥了关键作用一样,它们对于实现可扩展的隐私保护深度学习也是必不可少的。在这项工作中,我们首先引入一个新的接口,将秘密共享值(在离散域)上的加密操作无损地嵌入到浮点操作中,浮点操作可以由高度优化的CUDA线性代数内核处理。然后,我们确定了一系列“GPU友好”加密协议,以便对GPU上的线性和非线性操作进行隐私保护评估。我们的微基准测试表明,我们基于gpu的私有卷积协议比类似的基于cpu的协议快150倍以上;对于像ReLU激活函数这样的非线性操作,我们基于gpu的协议比其CPU模拟快10倍左右。有了CryptGPU,我们支持超过6000万个参数的卷积神经网络的私人推理和训练,以及处理像ImageNet这样的大型数据集。与以前最先进的技术相比,我们的协议在大型网络和数据集的私有推理方面实现了2到8倍的改进。对于私人培训,我们实现了6到36倍的改进比以前的最先进的技术。我们的工作不仅展示了完全在GPU上执行安全多方计算(MPC)以实现快速保护隐私的机器学习的可行性,而且还强调了设计新的MPC原语的重要性,这些原语可以充分利用GPU的计算能力。
{"title":"CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU","authors":"Sijun Tan, Brian Knott, Yuan Tian, David J. Wu","doi":"10.1109/SP40001.2021.00098","DOIUrl":"https://doi.org/10.1109/SP40001.2021.00098","url":null,"abstract":"We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing scalable privacy-preserving deep learning. In this work, we start by introducing a new interface to losslessly embed cryptographic operations over secret-shared values (in a discrete domain) into floating-point operations that can be processed by highly-optimized CUDA kernels for linear algebra. We then identify a sequence of \"GPU-friendly\" cryptographic protocols to enable privacy-preserving evaluation of both linear and non-linear operations on the GPU. Our microbenchmarks indicate that our private GPU-based convolution protocol is over 150× faster than the analogous CPU-based protocol; for non-linear operations like the ReLU activation function, our GPU-based protocol is around 10× faster than its CPU analog. With CryptGPU, we support private inference and training on convolutional neural networks with over 60 million parameters as well as handle large datasets like ImageNet. Compared to the previous state-of-the-art, our protocols achieve a 2× to 8× improvement in private inference for large networks and datasets. For private training, we achieve a 6× to 36× improvement over prior state-of-the-art. Our work not only showcases the viability of performing secure multiparty computation (MPC) entirely on the GPU to newly enable fast privacy-preserving machine learning, but also highlights the importance of designing new MPC primitives that can take full advantage of the GPU’s computing capabilities.","PeriodicalId":6786,"journal":{"name":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"50 1","pages":"1021-1038"},"PeriodicalIF":0.0,"publicationDate":"2021-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86148493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
期刊
2021 IEEE Symposium on Security and Privacy (SP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1