首页 > 最新文献

ACM Transactions on Cyber-Physical Systems最新文献

英文 中文
SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors SchedGuard++:在多核处理器上使用Linux容器防止调度泄漏
Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-31 DOI: 10.1145/3565974
Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo, Lui Sha
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system’s real-time nature. This article presents “ SchedGuard++ ”: a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is “ SchedGuard++ ” able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.
在多临界实时系统(如自动驾驶系统)中,时间正确性至关重要。最近的研究表明,这些系统容易受到时间推理攻击,主要是由于它们的可预测行为模式。现有的解决方案,如调度随机化,往往受到系统实时性的限制,无法抵御这种攻击。本文介绍了“SchedGuard++”:一个用于基于linux的实时系统的临时保护框架,它通过防止在特定时间间隔内执行不受信任的任务来防止基于调度的后向攻击。SchedGuard++支持多核平台,并使用Linux容器和定制的Linux内核实时调度器实现。我们提供假设逻辑执行时间(LET)范式的可调度性分析,该范式强制I/O可预测性。提出的响应时间分析考虑了可信任务和不可信任务的干扰以及保护机制的影响。我们用一个真实的无线电控制漫游者平台证明了我们系统的有效性。“SchedGuard++”不仅能够防止后端基于调度的攻击,而且还能确保实时任务/容器满足它们的时间需求。
{"title":"SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors","authors":"Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo, Lui Sha","doi":"10.1145/3565974","DOIUrl":"https://doi.org/10.1145/3565974","url":null,"abstract":"Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system’s real-time nature. This article presents “ SchedGuard++ ”: a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is “ SchedGuard++ ” able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135202259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DT-DS: CAN Intrusion Detection with Decision Tree Ensembles DT-DS:基于决策树集成的CAN入侵检测
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-21 DOI: 10.1145/3566132
Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, B. Meyer
The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-device communications, is known to have cybersecurity vulnerabilities, putting passengers at risk for data exfiltration and control system sabotage. To address this issue, researchers have proposed to utilize security measures based on cryptography and message authentication; unfortunately, such approaches are often too computationally expensive to be deployed in real time on CAN devices. Additionally, they have developed machine learning (ML) techniques to detect anomalies in CAN traffic and thereby prevent attacks. The main disadvantage of existing ML-based techniques is that they either depend on additional computational hardware or they heuristically assume that all communication anomalies are malicious. In this article, we show that tree-based learning ensembles outperform anomaly-based techniques like AutoRegressive Integrated Moving Average (ARIMA) and Z-Score when used to detect attacks that result in increased bus utilization. We evaluated the detection capacity of three tree-based ensembles, Adaboost, gradient boosting, and random forests, and collectively refer to these as DT-DS. We conclude that the decision tree ensemble with Adaboost performs best with an area under curve (AUC) score of 0.999, closely followed by gradient boosting and random forests with 0.997 and 0.991 AUC scores, respectively, when trained using message profiles. We observe that with an increase in the observation window, the DT-DS models present an average AUC score of 0.999, and offer a nearly perfect detection of attacks, at the cost of increased latency in detection of attacked messages. We evaluate the performance of the IDS for Aeronautical Radio, Incorporated– (ARINC) encoded CAN communication traffic in avionic systems, generated using an aerospace testbench, ARINC-825TBv2. The IDS has been evaluated against the active attacks of a state-of-the-art predictive attacker model. Additionally, we observed that the performance of IDS approaches such as ARIMA and Z-Score degrade considerably with a decrease in the size of the observation time window. In contrast, the performance of DT-DS models is consistent, with only an average drop of 0.005 in the AUC score.
控制器区域网络(CAN)协议用于许多现代车辆的实时设备间通信,已知存在网络安全漏洞,使乘客面临数据泄露和控制系统破坏的风险。为了解决这个问题,研究人员提出了利用基于加密和消息认证的安全措施;不幸的是,这种方法通常在计算上过于昂贵,无法在CAN设备上实时部署。此外,他们还开发了机器学习(ML)技术来检测CAN流量中的异常情况,从而防止攻击。现有的基于机器学习的技术的主要缺点是,它们要么依赖于额外的计算硬件,要么启发式地假设所有通信异常都是恶意的。在本文中,我们表明,当用于检测导致总线利用率增加的攻击时,基于树的学习集成优于基于异常的技术,如自回归集成移动平均(ARIMA)和Z-Score。我们评估了三种基于树的系统,Adaboost,梯度增强和随机森林的检测能力,并将它们统称为DT-DS。我们得出结论,当使用消息概要进行训练时,Adaboost的决策树集成表现最佳,曲线下面积(AUC)得分为0.999,紧随其后的是梯度增强和随机森林,AUC得分分别为0.997和0.991。我们观察到,随着观察窗口的增加,DT-DS模型的平均AUC得分为0.999,并且提供了近乎完美的攻击检测,但代价是检测被攻击消息的延迟增加。我们评估了航空电子系统中航空无线电公司(ARINC)编码CAN通信流量的IDS的性能,使用ARINC- 825tbv2航空航天试验台生成。IDS已经针对最先进的预测攻击者模型的主动攻击进行了评估。此外,我们观察到,IDS方法(如ARIMA和Z-Score)的性能随着观测时间窗口大小的减小而显著下降。相比之下,DT-DS模型的表现较为一致,AUC得分平均仅下降0.005。
{"title":"DT-DS: CAN Intrusion Detection with Decision Tree Ensembles","authors":"Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, B. Meyer","doi":"10.1145/3566132","DOIUrl":"https://doi.org/10.1145/3566132","url":null,"abstract":"The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-device communications, is known to have cybersecurity vulnerabilities, putting passengers at risk for data exfiltration and control system sabotage. To address this issue, researchers have proposed to utilize security measures based on cryptography and message authentication; unfortunately, such approaches are often too computationally expensive to be deployed in real time on CAN devices. Additionally, they have developed machine learning (ML) techniques to detect anomalies in CAN traffic and thereby prevent attacks. The main disadvantage of existing ML-based techniques is that they either depend on additional computational hardware or they heuristically assume that all communication anomalies are malicious. In this article, we show that tree-based learning ensembles outperform anomaly-based techniques like AutoRegressive Integrated Moving Average (ARIMA) and Z-Score when used to detect attacks that result in increased bus utilization. We evaluated the detection capacity of three tree-based ensembles, Adaboost, gradient boosting, and random forests, and collectively refer to these as DT-DS. We conclude that the decision tree ensemble with Adaboost performs best with an area under curve (AUC) score of 0.999, closely followed by gradient boosting and random forests with 0.997 and 0.991 AUC scores, respectively, when trained using message profiles. We observe that with an increase in the observation window, the DT-DS models present an average AUC score of 0.999, and offer a nearly perfect detection of attacks, at the cost of increased latency in detection of attacked messages. We evaluate the performance of the IDS for Aeronautical Radio, Incorporated– (ARINC) encoded CAN communication traffic in avionic systems, generated using an aerospace testbench, ARINC-825TBv2. The IDS has been evaluated against the active attacks of a state-of-the-art predictive attacker model. Additionally, we observed that the performance of IDS approaches such as ARIMA and Z-Score degrade considerably with a decrease in the size of the observation time window. In contrast, the performance of DT-DS models is consistent, with only an average drop of 0.005 in the AUC score.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"7 1","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2023-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47361185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving 数据驱动的参数化拐角合成用于自动驾驶感知系统的有效验证
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-20 DOI: 10.1145/3571286
Handi Yu, Xin Li
Today's automotive cyber-physical systems for autonomous driving aim to enhance driving safety by replacing the uncertainties posed by human drivers with standard procedures of automated systems. However, the accuracy of in-vehicle perception systems may significantly vary under different operational conditions (e.g., fog density, light condition, etc.) and consequently degrade the reliability of autonomous driving. A perception system for autonomous driving must be carefully validated with an extremely large dataset collected under all possible operational conditions in order to ensure its robustness. The aforementioned dataset required for validation, however, is expensive or even impossible to acquire in practice, since most operational corners rarely occur in a real-world environment. In this paper, we propose to generate synthetic datasets at a variety of operational corners by using a parameterized cycle-consistent generative adversarial network (PCGAN). The proposed PCGAN is able to learn from an image dataset recorded at real-world operational conditions with only a few samples at corners and synthesize a large dataset at a given operational corner. By taking STOP sign detection as an example, our numerical experiments demonstrate that the proposed approach is able to generate high-quality synthetic datasets to facilitate accurate validation.
今天用于自动驾驶的汽车网络物理系统旨在通过用自动化系统的标准程序取代人类驾驶员带来的不确定性来提高驾驶安全性。然而,车载感知系统的准确性在不同的操作条件下(例如,雾密度、光线条件等)可能会显著变化,从而降低自动驾驶的可靠性。自动驾驶感知系统必须通过在所有可能的操作条件下收集的超大数据集进行仔细验证,以确保其稳健性。然而,上述验证所需的数据集在实践中成本高昂,甚至不可能获得,因为大多数操作角落很少发生在现实世界的环境中。在本文中,我们建议使用参数化循环一致生成对抗性网络(PCGAN)在各种操作角生成合成数据集。所提出的PCGAN能够从在真实世界的操作条件下记录的图像数据集中学习,在拐角处只有几个样本,并在给定的操作拐角处合成大型数据集。以STOP符号检测为例,我们的数值实验表明,所提出的方法能够生成高质量的合成数据集,以便于准确验证。
{"title":"Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving","authors":"Handi Yu, Xin Li","doi":"10.1145/3571286","DOIUrl":"https://doi.org/10.1145/3571286","url":null,"abstract":"Today's automotive cyber-physical systems for autonomous driving aim to enhance driving safety by replacing the uncertainties posed by human drivers with standard procedures of automated systems. However, the accuracy of in-vehicle perception systems may significantly vary under different operational conditions (e.g., fog density, light condition, etc.) and consequently degrade the reliability of autonomous driving. A perception system for autonomous driving must be carefully validated with an extremely large dataset collected under all possible operational conditions in order to ensure its robustness. The aforementioned dataset required for validation, however, is expensive or even impossible to acquire in practice, since most operational corners rarely occur in a real-world environment. In this paper, we propose to generate synthetic datasets at a variety of operational corners by using a parameterized cycle-consistent generative adversarial network (PCGAN). The proposed PCGAN is able to learn from an image dataset recorded at real-world operational conditions with only a few samples at corners and synthesize a large dataset at a given operational corner. By taking STOP sign detection as an example, our numerical experiments demonstrate that the proposed approach is able to generate high-quality synthetic datasets to facilitate accurate validation.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"7 1","pages":"1 - 24"},"PeriodicalIF":2.3,"publicationDate":"2023-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42881393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics 基于视频流特性的入侵无人机入侵检测框架
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-17 DOI: 10.1145/3579999
Anas Alsoliman, Giulio Rigoni, Davide Callegaro, M. Levorato, C. Pinotti, M. Conti
Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the presence of unknown and non-cooperating drones within a restricted area are highly demanded. Approaches based on detection of drones based on emitted video stream have been proposed, but were not yet shown to work against other similar benign traffic, such as that generated by wireless security cameras. Most importantly, these approaches were not studied in the context of detecting new unprofiled drone types. In this work, we propose a novel drone detection framework, which leverages specific patterns in video traffic transmitted by drones. The patterns consist of repetitive synchronization packets (we call pivots), which we use as features for a machine learning classifier. We show that our framework can achieve up to 99% in detection accuracy over an encrypted WiFi channel using only 170 packets originated from the drone within 820ms time period. Our framework is able to identify drone transmissions even among very similar WiFi transmissions (such as video streams originated from security cameras) as well as in noisy scenarios with background traffic. Furthermore, the design of our pivot features enables the classifier to detect unprofiled drones in which the classifier has never trained on and is refined using a novel feature selection strategy that selects the features that have the discriminative power of detecting new unprofiled drones.
近年来,廉价的商用现货(COTS)第一人称视角(FPV)无人机已广泛为消费者所用。不幸的是,它们还为恶意用户提供了低成本的攻击机会。因此,迫切需要有效的方法来检测禁区内未知和不合作的无人机的存在。已经提出了基于发射的视频流检测无人机的方法,但尚未证明可以对抗其他类似的良性交通,例如无线安全摄像头产生的交通。最重要的是,这些方法没有在检测新的未盈利无人机类型的背景下进行研究。在这项工作中,我们提出了一种新的无人机检测框架,该框架利用了无人机传输的视频流量中的特定模式。这些模式由重复的同步数据包(我们称之为枢轴)组成,我们将其用作机器学习分类器的特征。我们表明,在820ms的时间段内,仅使用来自无人机的170个数据包,我们的框架就可以在加密WiFi信道上实现高达99%的检测准确率。我们的框架能够识别无人机的传输,即使是在非常相似的WiFi传输(例如源自安全摄像头的视频流)中,以及在有背景交通的嘈杂场景中。此外,我们的中枢特征的设计使分类器能够检测到分类器从未训练过的未盈利无人机,并使用一种新的特征选择策略进行改进,该策略选择具有检测新的未盈利无人人机的辨别能力的特征。
{"title":"Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics","authors":"Anas Alsoliman, Giulio Rigoni, Davide Callegaro, M. Levorato, C. Pinotti, M. Conti","doi":"10.1145/3579999","DOIUrl":"https://doi.org/10.1145/3579999","url":null,"abstract":"Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the presence of unknown and non-cooperating drones within a restricted area are highly demanded. Approaches based on detection of drones based on emitted video stream have been proposed, but were not yet shown to work against other similar benign traffic, such as that generated by wireless security cameras. Most importantly, these approaches were not studied in the context of detecting new unprofiled drone types. In this work, we propose a novel drone detection framework, which leverages specific patterns in video traffic transmitted by drones. The patterns consist of repetitive synchronization packets (we call pivots), which we use as features for a machine learning classifier. We show that our framework can achieve up to 99% in detection accuracy over an encrypted WiFi channel using only 170 packets originated from the drone within 820ms time period. Our framework is able to identify drone transmissions even among very similar WiFi transmissions (such as video streams originated from security cameras) as well as in noisy scenarios with background traffic. Furthermore, the design of our pivot features enables the classifier to detect unprofiled drones in which the classifier has never trained on and is refined using a novel feature selection strategy that selects the features that have the discriminative power of detecting new unprofiled drones.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"7 1","pages":"1 - 29"},"PeriodicalIF":2.3,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49235077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey 基于机器学习的智能网格入侵检测研究综述
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-01-11 DOI: 10.1145/3578366
Nitasha Sahani, Ruoxi Zhu, Jinny Cho, Chen-Ching Liu
Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been significantly increased as shared networks are commonly used, along with the associated vulnerabilities. However, compared to other network environments, ML-based IDS research in a smart grid is relatively unexplored, although the smart grid environment is facing serious security threats due to its unique environmental vulnerabilities. In this article, we conducted an extensive survey on ML-based IDS in smart grids based on the following key aspects: (1) The applications of the ML-based IDS in transmission and distribution side power components of a smart power grid by addressing its security vulnerabilities; (2) dataset generation process and its usage in applying ML-based IDSs in the smart grid; (3) a wide range of ML-based IDSs used by the surveyed papers in the smart grid environment; (4) metrics, complexity analysis, and evaluation testbeds of the IDSs applied in the smart grid; and (5) lessons learned, insights, and future research directions.
基于机器学习(ML)的入侵检测系统(IDS)方法已经得到了显著的应用,并推进了最先进的系统安全和防御机制。在智能网格计算环境中,由于共享网络的普遍使用,安全威胁以及相关的漏洞显著增加。然而,与其他网络环境相比,智能电网中基于ML的IDS研究相对未被探索,尽管智能电网环境由于其独特的环境漏洞而面临严重的安全威胁。在本文中,我们基于以下关键方面对智能电网中基于ML的IDS进行了广泛的调查:(1)通过解决其安全漏洞,介绍了基于ML的入侵检测系统在智能电网输配电侧电力元件中的应用;(2) 数据集生成过程及其在智能电网中应用基于ML的IDS中的使用;(3) 被调查论文在智能电网环境中使用的广泛的基于ML的IDS;(4) 智能电网中应用的IDS的度量、复杂性分析和评估试验台;以及(5)经验教训、见解和未来的研究方向。
{"title":"Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey","authors":"Nitasha Sahani, Ruoxi Zhu, Jinny Cho, Chen-Ching Liu","doi":"10.1145/3578366","DOIUrl":"https://doi.org/10.1145/3578366","url":null,"abstract":"Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been significantly increased as shared networks are commonly used, along with the associated vulnerabilities. However, compared to other network environments, ML-based IDS research in a smart grid is relatively unexplored, although the smart grid environment is facing serious security threats due to its unique environmental vulnerabilities. In this article, we conducted an extensive survey on ML-based IDS in smart grids based on the following key aspects: (1) The applications of the ML-based IDS in transmission and distribution side power components of a smart power grid by addressing its security vulnerabilities; (2) dataset generation process and its usage in applying ML-based IDSs in the smart grid; (3) a wide range of ML-based IDSs used by the surveyed papers in the smart grid environment; (4) metrics, complexity analysis, and evaluation testbeds of the IDSs applied in the smart grid; and (5) lessons learned, insights, and future research directions.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 31"},"PeriodicalIF":2.3,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46531489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Control Performance Analysis of Automotive Cyber-Physical Systems: A Study on Efficient Formal Verification 汽车网络物理系统的控制性能分析——一种有效的形式化验证方法研究
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-12-14 DOI: 10.1145/3576046
V. Panahi, M. Kargahi, Fathiyeh Faghih
Automotive cyber-physical systems consist of multiple control subsystems working under resource limitations, and the trend is to run the corresponding control tasks on a shared platform. The resource requirements of the tasks are usually variable at runtime due to the uncertainties in the environment, necessitating some kinds of adaptation to deal with the resource limitations. Such adaptations may positively or negatively affect the control performance of several subsystems. Since there might be some thresholds on the control performances as quality constraints, this matter should be considered carefully to avoid any quality attribute constraint violation. This paper proposes a scalable control performance constraint verification method for such a system that works based on a feedback scheduler. The scalability is the result of a control-aware pruning method. In case of a constraint violation, the designer may change the system configuration and perform re-verification. Our evaluations show that the proposed method scales well while preserving the verification soundness.
汽车网络物理系统由多个在资源限制下工作的控制子系统组成,其趋势是在共享平台上运行相应的控制任务。由于环境的不确定性,任务的资源需求在运行时通常是可变的,因此需要进行某种调整来应对资源限制。这种适应可能对几个子系统的控制性能产生积极或消极的影响。由于控制性能可能存在一些阈值作为质量约束,因此应仔细考虑这一问题,以避免违反任何质量属性约束。针对这种基于反馈调度器的系统,本文提出了一种可伸缩控制性能约束验证方法。可伸缩性是控制感知修剪方法的结果。在违反约束的情况下,设计者可以更改系统配置并执行重新验证。我们的评估表明,所提出的方法在保持验证合理性的同时,具有良好的规模。
{"title":"Control Performance Analysis of Automotive Cyber-Physical Systems: A Study on Efficient Formal Verification","authors":"V. Panahi, M. Kargahi, Fathiyeh Faghih","doi":"10.1145/3576046","DOIUrl":"https://doi.org/10.1145/3576046","url":null,"abstract":"Automotive cyber-physical systems consist of multiple control subsystems working under resource limitations, and the trend is to run the corresponding control tasks on a shared platform. The resource requirements of the tasks are usually variable at runtime due to the uncertainties in the environment, necessitating some kinds of adaptation to deal with the resource limitations. Such adaptations may positively or negatively affect the control performance of several subsystems. Since there might be some thresholds on the control performances as quality constraints, this matter should be considered carefully to avoid any quality attribute constraint violation. This paper proposes a scalable control performance constraint verification method for such a system that works based on a feedback scheduler. The scalability is the result of a control-aware pruning method. In case of a constraint violation, the designer may change the system configuration and perform re-verification. Our evaluations show that the proposed method scales well while preserving the verification soundness.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"1 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42137204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Security of EV Charging Mobile Applications As an Attack Surface 作为攻击面的电动汽车充电移动应用安全性研究
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-19 DOI: 10.1145/3609508
Khaled Sarieddine, M. Sayed, Sadegh Torabi, Ribal Atallah, C. Assi
The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this paper, we study the security posture of the EV charging ecosystem against a new type of remote which exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as the cloud management systems. The attack, scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.
近年来,电动汽车的采用率在多种因素的推动下显著提高,其中最主要的是充电基础设施的灵活性和易用性的提高。为了改善用户体验和增加系统灵活性,移动应用程序已被纳入电动汽车充电生态系统。电动汽车充电移动应用程序允许消费者远程触发充电站的操作,并使用诸如开始/停止充电会话、支付使用费用和定位充电站等功能。在本文中,我们研究了针对一种新型远程攻击的电动汽车充电生态系统的安全态势,这种远程攻击利用电动汽车充电移动应用程序中的漏洞作为攻击面。我们利用静态和动态分析技术的结合来分析广泛使用的电动汽车充电移动应用程序的安全性。我们对31个最广泛使用的移动应用程序进行了分析,包括它们与各种组件(如云管理系统)的交互。利用这些漏洞的攻击场景在实时联合模拟测试台上进行了验证。我们的发现表明,关键功能缺乏用户/车辆验证和不当授权,这使得攻击者能够远程劫持充电会话并对连接的关键基础设施发起攻击。使用EVCS移动应用程序演示了这些攻击,显示了我们的攻击的可行性和适用性。实际上,我们讨论了特定的远程攻击场景及其对EV用户的影响。更重要的是,我们的分析结果证明了利用各种电动汽车充电移动应用程序的现有漏洞对连接的关键基础设施(例如电网)进行大规模协调远程充电/放电攻击的可行性,具有重大的经济和运营影响。最后,我们提出了保护基础设施并阻止对手使用受损帐户进行侦察和发起远程攻击的对策。
{"title":"Investigating the Security of EV Charging Mobile Applications As an Attack Surface","authors":"Khaled Sarieddine, M. Sayed, Sadegh Torabi, Ribal Atallah, C. Assi","doi":"10.1145/3609508","DOIUrl":"https://doi.org/10.1145/3609508","url":null,"abstract":"The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system flexibility, mobile applications have been incorporated into the EV charging ecosystem. EV charging mobile applications allow consumers to remotely trigger actions on charging stations and use functionalities such as start/stop charging sessions, pay for usage, and locate charging stations, to name a few. In this paper, we study the security posture of the EV charging ecosystem against a new type of remote which exploits vulnerabilities in the EV charging mobile applications as an attack surface. We leverage a combination of static and dynamic analysis techniques to analyze the security of widely used EV charging mobile applications. Our analysis was performed on 31 of the most widely used mobile applications including their interactions with various components such as the cloud management systems. The attack, scenarios that exploit these vulnerabilities were verified on a real-time co-simulation test bed. Our discoveries indicate the lack of user/vehicle verification and improper authorization for critical functions, which allow adversaries to remotely hijack charging sessions and launch attacks against the connected critical infrastructure. The attacks were demonstrated using the EVCS mobile applications showing the feasibility and the applicability of our attacks. Indeed, we discuss specific remote attack scenarios and their impact on EV users. More importantly, our analysis results demonstrate the feasibility of leveraging existing vulnerabilities across various EV charging mobile applications to perform wide-scale coordinated remote charging/discharging attacks against the connected critical infrastructure (e.g., power grid), with significant economical and operational implications. Finally, we propose countermeasures to secure the infrastructure and impede adversaries from performing reconnaissance and launching remote attacks using compromised accounts.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":""},"PeriodicalIF":2.3,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48935364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software 安全关键型汽车软件安全性和鲁棒性分析的CAD支持
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-18 DOI: 10.1145/3571287
Ipsita Koley, Soumyajit Dey, Debdeep Mukhopadhyay, Sachin Kumar Singh, Lavanya Lokesh, Shantaram Vishwanath Ghotgalkar
Modern vehicles contain a multitude of electronic control units that implement software features controlling most of the operational, entertainment, connectivity, and safety aspects of the vehicle. However, with security requirements often being an afterthought in automotive software development, incorporation of such software features with intra- and inter-vehicular connectivity requirements often opens up new attack surfaces. Demonstrations of such security vulnerabilities in past reports and literature bring in the necessity to formally analyze how secure automotive control systems really are against adversarial attacks. Modern vehicles often incorporate onboard monitoring systems that test the sanctity of data samples communicated among controllers and detect possible attack/noise insertion scenarios. The performance of such monitors against security threats also needs to be verified. In this work, we outline a rigorous methodology for estimating the vulnerability of automotive CPSs. We provide a computer-aided design framework that considers the model-based representation of safety-critical automotive controllers and monitoring systems working in a closed loop with vehicle dynamics and verifies their safety and robustness w.r.t. false data injection attacks. Symbolically exploring all possible combinations of attack points of the input automotive CPS, the proposed framework tries to find out which sensor and/or actuation signal is vulnerable by generating stealthy and successful attacks using a formal method-based counter-example guided abstract refinement process. We also validate the efficacy of the proposed framework using a case study performed in an industry-scale simulator.
现代车辆包含大量电子控制单元,这些电子控制单元实现软件功能,控制车辆的大部分操作、娱乐、连接和安全方面。然而,在汽车软件开发中,安全要求往往是事后考虑的问题,将此类软件功能与车内和车间连接要求相结合往往会开辟新的攻击面。在过去的报告和文献中对此类安全漏洞的演示使得有必要正式分析汽车控制系统在对抗性攻击中的安全性。现代车辆通常包含车载监测系统,该系统测试控制器之间通信的数据样本的神圣性,并检测可能的攻击/噪声插入场景。还需要验证此类监控器对安全威胁的性能。在这项工作中,我们概述了一种评估汽车消费品安全漏洞的严格方法。我们提供了一个计算机辅助设计框架,该框架考虑了与车辆动力学闭环工作的安全关键型汽车控制器和监控系统的基于模型的表示,并验证了它们的安全性和稳健性。该框架象征性地探索了输入汽车CPS的攻击点的所有可能组合,试图通过使用基于形式方法的反例引导的抽象细化过程生成隐蔽和成功的攻击,找出哪个传感器和/或驱动信号是易受攻击的。我们还通过在行业规模的模拟器中进行的案例研究验证了所提出的框架的有效性。
{"title":"CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software","authors":"Ipsita Koley, Soumyajit Dey, Debdeep Mukhopadhyay, Sachin Kumar Singh, Lavanya Lokesh, Shantaram Vishwanath Ghotgalkar","doi":"10.1145/3571287","DOIUrl":"https://doi.org/10.1145/3571287","url":null,"abstract":"Modern vehicles contain a multitude of electronic control units that implement software features controlling most of the operational, entertainment, connectivity, and safety aspects of the vehicle. However, with security requirements often being an afterthought in automotive software development, incorporation of such software features with intra- and inter-vehicular connectivity requirements often opens up new attack surfaces. Demonstrations of such security vulnerabilities in past reports and literature bring in the necessity to formally analyze how secure automotive control systems really are against adversarial attacks. Modern vehicles often incorporate onboard monitoring systems that test the sanctity of data samples communicated among controllers and detect possible attack/noise insertion scenarios. The performance of such monitors against security threats also needs to be verified. In this work, we outline a rigorous methodology for estimating the vulnerability of automotive CPSs. We provide a computer-aided design framework that considers the model-based representation of safety-critical automotive controllers and monitoring systems working in a closed loop with vehicle dynamics and verifies their safety and robustness w.r.t. false data injection attacks. Symbolically exploring all possible combinations of attack points of the input automotive CPS, the proposed framework tries to find out which sensor and/or actuation signal is vulnerable by generating stealthy and successful attacks using a formal method-based counter-example guided abstract refinement process. We also validate the efficacy of the proposed framework using a case study performed in an industry-scale simulator.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"7 1","pages":"1 - 26"},"PeriodicalIF":2.3,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44210288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing 智能交叉口的双速同步交通协议:从单车到排式交叉口
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-18 DOI: 10.1145/3571289
Daniel Markert, Alejandro Masrur
With progress in cooperative and autonomous driving, there is an increasing interest in intelligent intersections to replace conventional traffic lights and, thereby, improve traffic efficiency. To avoid accidents in such safety-critical systems, a traffic protocol needs to be implemented. In this article, we are concerned with synchronous traffic protocols, i.e., those that synchronize the arrival time of vehicles at the intersection. In particular, such protocols are normally conceived for homogeneous vehicles of approximately the same size/length. However, these do not extend well to heterogeneous vehicles, i.e., they lead to unviable requirements on the road infrastructure. To overcome this limitation, based on the observation that large/overlength vehicles like buses and trams are less frequent than passenger vehicles, we propose an approach that treats them as exceptions (rather than the rule) leading to a much more efficient design. In contrast to approaches from the literature, we implement a two-speed policy—with a high speed for drive-through and a low speed for turn maneuvers—and analyze both single-vehicle as well as fairness-based platoon crossing. To conclude, we perform detailed comparisons illustrating the benefits by the proposed approach.
随着合作驾驶和自动驾驶技术的进步,人们对智能十字路口的兴趣越来越大,以取代传统的交通信号灯,从而提高交通效率。为了避免在这些安全关键系统中发生事故,需要实现一个交通协议。在本文中,我们关注的是同步交通协议,即同步车辆到达十字路口时间的协议。特别是,这种协议通常是为大约相同尺寸/长度的同质车辆设计的。然而,这些不能很好地扩展到异构车辆,也就是说,它们导致对道路基础设施的不可行的要求。为了克服这一限制,基于对大型/超长车辆(如公共汽车和有轨电车)比客运车辆更少的观察,我们提出了一种将其视为例外(而不是规则)的方法,从而实现更有效的设计。与文献中的方法相比,我们实现了一种双速策略——高速通过,低速转弯——并分析了单车辆和基于公平性的队列穿越。最后,我们进行了详细的比较,说明了所提出的方法的好处。
{"title":"A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing","authors":"Daniel Markert, Alejandro Masrur","doi":"10.1145/3571289","DOIUrl":"https://doi.org/10.1145/3571289","url":null,"abstract":"With progress in cooperative and autonomous driving, there is an increasing interest in intelligent intersections to replace conventional traffic lights and, thereby, improve traffic efficiency. To avoid accidents in such safety-critical systems, a traffic protocol needs to be implemented. In this article, we are concerned with synchronous traffic protocols, i.e., those that synchronize the arrival time of vehicles at the intersection. In particular, such protocols are normally conceived for homogeneous vehicles of approximately the same size/length. However, these do not extend well to heterogeneous vehicles, i.e., they lead to unviable requirements on the road infrastructure. To overcome this limitation, based on the observation that large/overlength vehicles like buses and trams are less frequent than passenger vehicles, we propose an approach that treats them as exceptions (rather than the rule) leading to a much more efficient design. In contrast to approaches from the literature, we implement a two-speed policy—with a high speed for drive-through and a low speed for turn maneuvers—and analyze both single-vehicle as well as fairness-based platoon crossing. To conclude, we perform detailed comparisons illustrating the benefits by the proposed approach.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"7 1","pages":"1 - 21"},"PeriodicalIF":2.3,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42594375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems CASCADE:建立汽车系统安全保障案例的资产驱动方法
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2022-11-16 DOI: 10.1145/3569459
Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, R. Scandariato
Security Assurance Cases (SAC) are structured arguments and evidence bodies used to reason about the security of a certain system. SACs are gaining focus in the automotive industry, as the needs for security assurance are growing in this domain. However, the state-of-the-arts lack a mature approach able to suit the needs of the automotive industry. In this article, we present CASCADE, an asset-driven approach for creating SAC, which is inspired by the upcoming security standard ISO/SAE-21434 as well as the internal needs of automotive Original Equipment Manufacturers (OEMs). CASCADE also differentiates itself from the state-of-the-art by incorporating a way to reason about the quality of the constructed security assurance case. We created the approach by conducting an iterative design science research study. We illustrate the results using the example case of the road vehicle’s headlamp provided in the ISO standard. We also illustrate how our approach aligns well with the structure and content of the ISO/SAE-21434 standard, hence demonstrating the practical applicability of CASCADE in an industrial context.
安全保证案例(SAC)是用于对某个系统的安全性进行推理的结构化论点和证据机构。随着汽车行业对安全保障的需求不断增长,SAC在汽车行业越来越受到关注。然而,现有技术缺乏能够满足汽车行业需求的成熟方法。在本文中,我们介绍了CASCADE,这是一种创建SAC的资产驱动方法,其灵感来自即将推出的安全标准ISO/SAE-21434以及汽车原始设备制造商(OEM)的内部需求。CASCADE还通过引入一种对构建的安全保证案例的质量进行推理的方式,将自己与最先进的技术区分开来。我们通过进行迭代设计科学研究创造了这种方法。我们使用ISO标准中提供的道路车辆前照灯的示例案例来说明结果。我们还说明了我们的方法如何与ISO/SAE-21434标准的结构和内容保持一致,从而证明了CASCADE在工业环境中的实际适用性。
{"title":"CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems","authors":"Mazen Mohamad, Rodi Jolak, Örjan Askerdal, Jan-Philipp Steghöfer, R. Scandariato","doi":"10.1145/3569459","DOIUrl":"https://doi.org/10.1145/3569459","url":null,"abstract":"Security Assurance Cases (SAC) are structured arguments and evidence bodies used to reason about the security of a certain system. SACs are gaining focus in the automotive industry, as the needs for security assurance are growing in this domain. However, the state-of-the-arts lack a mature approach able to suit the needs of the automotive industry. In this article, we present CASCADE, an asset-driven approach for creating SAC, which is inspired by the upcoming security standard ISO/SAE-21434 as well as the internal needs of automotive Original Equipment Manufacturers (OEMs). CASCADE also differentiates itself from the state-of-the-art by incorporating a way to reason about the quality of the constructed security assurance case. We created the approach by conducting an iterative design science research study. We illustrate the results using the example case of the road vehicle’s headlamp provided in the ISO standard. We also illustrate how our approach aligns well with the structure and content of the ISO/SAE-21434 standard, hence demonstrating the practical applicability of CASCADE in an industrial context.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 26"},"PeriodicalIF":2.3,"publicationDate":"2022-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45140128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ACM Transactions on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1