首页 > 最新文献

Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium最新文献

英文 中文
Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation 不太坏的TLS:重新设计安全协议规范和实现的经验教训
David Kaloper-Mersinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell
Transport Layer Security (TLS) implementations have a history of security flaws. The immediate causes of these are often programming errors, e.g. in memory management, but the root causes are more fundamental: the challenges of interpreting the ambiguous prose specification, the complexities inherent in large APIs and code bases, inherently unsafe programming choices, and the impossibility of directly testing conformance between implementations and the specification. We present nqsb-TLS, the result of our re-engineered approach to security protocol specification and implementation that addresses these root causes. The same code serves two roles: it is both a specification of TLS, executable as a test oracle to check conformance of traces from arbitrary implementations, and a usable implementation of TLS; a modular and declarative programming style provides clean separation between its components. Many security flaws are thus excluded by construction. nqsb-TLS can be used in standalone Unix applications, which we demonstrate with a messaging client, and can also be compiled into Xen unikernels (specialised virtual machine image) with a trusted computing base (TCB) that is 4% of a standalone system running a standard Linux/OpenSSL stack, with all network traffic being handled in a memory-safe language; this supports applications including HTTPS, IMAP, Git, and Websocket clients and servers. Despite the dual-role design, the high-level implementation style, and the functional programming language we still achieve reasonable performance, with the same handshake performance as OpenSSL and 73% - 84% for bulk throughput.
传输层安全(TLS)的实现具有安全缺陷的历史。这些问题的直接原因通常是编程错误,例如内存管理,但根本原因是更根本的:解释模糊的散文规范的挑战,大型api和代码库中固有的复杂性,固有的不安全编程选择,以及不可能直接测试实现和规范之间的一致性。我们提出了nqsb-TLS,这是我们重新设计安全协议规范和实现方法的结果,解决了这些根本原因。相同的代码有两个角色:它既是TLS的规范,可执行的测试oracle,以检查来自任意实现的跟踪的一致性,也是TLS的可用实现;模块化和声明式编程风格在组件之间提供了清晰的分离。因此,许多安全漏洞被结构排除在外。nqsb-TLS可以在独立的Unix应用程序中使用,我们用一个消息传递客户端来演示,也可以用可信计算基础(TCB)编译成Xen unikernels(专用虚拟机映像),TCB是运行标准Linux/OpenSSL堆栈的独立系统的4%,所有网络流量都用内存安全语言处理;它支持包括HTTPS、IMAP、Git和Websocket客户端和服务器在内的应用程序。尽管采用了双角色设计、高级实现风格和函数式编程语言,我们仍然实现了合理的性能,握手性能与OpenSSL相同,批量吞吐量为73% - 84%。
{"title":"Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation","authors":"David Kaloper-Mersinjak, Hannes Mehnert, Anil Madhavapeddy, Peter Sewell","doi":"10.17863/CAM.41243","DOIUrl":"https://doi.org/10.17863/CAM.41243","url":null,"abstract":"Transport Layer Security (TLS) implementations have a history of security flaws. The immediate causes of these are often programming errors, e.g. in memory management, but the root causes are more fundamental: the challenges of interpreting the ambiguous prose specification, the complexities inherent in large APIs and code bases, inherently unsafe programming choices, and the impossibility of directly testing conformance between implementations and the specification. \u0000 \u0000We present nqsb-TLS, the result of our re-engineered approach to security protocol specification and implementation that addresses these root causes. The same code serves two roles: it is both a specification of TLS, executable as a test oracle to check conformance of traces from arbitrary implementations, and a usable implementation of TLS; a modular and declarative programming style provides clean separation between its components. Many security flaws are thus excluded by construction. \u0000 \u0000nqsb-TLS can be used in standalone Unix applications, which we demonstrate with a messaging client, and can also be compiled into Xen unikernels (specialised virtual machine image) with a trusted computing base (TCB) that is 4% of a standalone system running a standard Linux/OpenSSL stack, with all network traffic being handled in a memory-safe language; this supports applications including HTTPS, IMAP, Git, and Websocket clients and servers. Despite the dual-role design, the high-level implementation style, and the functional programming language we still achieve reasonable performance, with the same handshake performance as OpenSSL and 73% - 84% for bulk throughput.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"1 1","pages":"223-238"},"PeriodicalIF":0.0,"publicationDate":"2015-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80728478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
The Emperor's New Password Manager: Security Analysis of Web-based Password Managers 皇帝的新密码管理器:基于web的密码管理器的安全性分析
Zhiwei Li, Warren He, Devdatta Akhawe, D. Song
We conduct a security analysis of five popular web-based password managers. Unlike "local" password managers, web-based password managers run in the browser. We identify four key security concerns for web-based password managers and, for each, identify representative vulnerabilities through our case studies. Our attacks are severe: in four out of the five password managers we studied, an attacker can learn a user's credentials for arbitrary websites. We find vulnerabilities in diverse features like one-time passwords, bookmarklets, and shared passwords. The root-causes of the vulnerabilities are also diverse: ranging from logic and authorization mistakes to misunderstandings about the web security model, in addition to the typical vulnerabilities like CSRF and XSS. Our study suggests that it remains to be a challenge for the password managers to be secure. To guide future development of password managers, we provide guidance for password managers. Given the diversity of vulnerabilities we identified, we advocate a defense-in-depth approach to ensure security of password managers.
我们对五种流行的基于网络的密码管理器进行了安全分析。与“本地”密码管理器不同,基于web的密码管理器在浏览器中运行。我们确定了基于web的密码管理器的四个关键安全问题,并通过案例研究确定了每个问题的代表性漏洞。我们的攻击很严重:在我们研究的五个密码管理器中,有四个攻击者可以了解任意网站的用户凭据。我们在一次性密码、bookmarklet和共享密码等多种功能中发现了漏洞。漏洞的根源也是多种多样的:从逻辑和授权错误到对web安全模型的误解,以及典型的漏洞,如CSRF和XSS。我们的研究表明,密码管理器的安全仍然是一个挑战。为了指导密码管理器的未来发展,我们为密码管理器提供指导。鉴于我们发现的漏洞的多样性,我们提倡采用纵深防御的方法来确保密码管理器的安全性。
{"title":"The Emperor's New Password Manager: Security Analysis of Web-based Password Managers","authors":"Zhiwei Li, Warren He, Devdatta Akhawe, D. Song","doi":"10.21236/ada614474","DOIUrl":"https://doi.org/10.21236/ada614474","url":null,"abstract":"We conduct a security analysis of five popular web-based password managers. Unlike \"local\" password managers, web-based password managers run in the browser. We identify four key security concerns for web-based password managers and, for each, identify representative vulnerabilities through our case studies. Our attacks are severe: in four out of the five password managers we studied, an attacker can learn a user's credentials for arbitrary websites. We find vulnerabilities in diverse features like one-time passwords, bookmarklets, and shared passwords. The root-causes of the vulnerabilities are also diverse: ranging from logic and authorization mistakes to misunderstandings about the web security model, in addition to the typical vulnerabilities like CSRF and XSS. Our study suggests that it remains to be a challenge for the password managers to be secure. To guide future development of password managers, we provide guidance for password managers. Given the diversity of vulnerabilities we identified, we advocate a defense-in-depth approach to ensure security of password managers.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"12 1","pages":"465-479"},"PeriodicalIF":0.0,"publicationDate":"2014-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81910122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing. 药物遗传学中的隐私:个体化华法林剂量的端到端案例研究。
Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart

We initiate the study of privacy in pharmacogenetics, wherein machine learning models are used to guide medical treatments based on a patient's genotype and background. Performing an in-depth case study on privacy in personalized warfarin dosing, we show that suggested models carry privacy risks, in particular because attackers can perform what we call model inversion: an attacker, given the model and some demographic information about a patient, can predict the patient's genetic markers. As differential privacy (DP) is an oft-proposed solution for medical settings such as this, we evaluate its effectiveness for building private versions of pharmacogenetic models. We show that DP mechanisms prevent our model inversion attacks when the privacy budget is carefully selected. We go on to analyze the impact on utility by performing simulated clinical trials with DP dosing models. We find that for privacy budgets effective at preventing attacks, patients would be exposed to increased risk of stroke, bleeding events, and mortality. We conclude that current DP mechanisms do not simultaneously improve genomic privacy while retaining desirable clinical efficacy, highlighting the need for new mechanisms that should be evaluated in situ using the general methodology introduced by our work.

我们发起了药物遗传学中的隐私研究,其中机器学习模型用于根据患者的基因型和背景指导医疗。对个性化华法林剂量的隐私进行了深入的案例研究,我们表明,建议的模型存在隐私风险,特别是因为攻击者可以执行我们所谓的模型反转:攻击者,给定模型和一些关于患者的人口统计信息,可以预测患者的遗传标记。由于差分隐私(DP)是医疗环境中经常提出的解决方案,因此我们评估了其在构建私人版本药物遗传模型方面的有效性。我们表明,当隐私预算被仔细选择时,DP机制可以防止我们的模型反转攻击。我们继续通过使用DP给药模型进行模拟临床试验来分析对效用的影响。我们发现,如果隐私预算能够有效地预防攻击,患者将面临中风、出血事件和死亡的风险增加。我们得出的结论是,目前的DP机制不能同时改善基因组隐私,同时保持理想的临床疗效,强调需要新的机制,应该使用我们工作中介绍的一般方法进行原位评估。
{"title":"Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.","authors":"Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>We initiate the study of privacy in pharmacogenetics, wherein machine learning models are used to guide medical treatments based on a patient's genotype and background. Performing an in-depth case study on privacy in personalized warfarin dosing, we show that suggested models carry privacy risks, in particular because attackers can perform what we call <i>model inversion</i>: an attacker, given the model and some demographic information about a patient, can predict the patient's genetic markers. As differential privacy (DP) is an oft-proposed solution for medical settings such as this, we evaluate its effectiveness for building private versions of pharmacogenetic models. We show that <i>DP mechanisms prevent our model inversion attacks when the privacy budget is carefully selected</i>. We go on to analyze the impact on utility by performing simulated clinical trials with DP dosing models. We find that for privacy budgets effective at preventing attacks, <i>patients would be exposed to increased risk of stroke, bleeding events, and mortality</i>. We conclude that <i>current</i> DP mechanisms do not simultaneously improve genomic privacy while retaining desirable clinical efficacy, highlighting the need for new mechanisms that should be evaluated <i>in situ</i> using the general methodology introduced by our work.</p>","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"2014 ","pages":"17-32"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4827719/pdf/nihms612853.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"34314336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory 数据节点加密文件系统:高效安全删除闪存
Pub Date : 2012-08-08 DOI: 10.3929/ETHZ-A-007593083
Joel Reardon, Srdjan Capkun, D. Basin
We propose the Data Node Encrypted File System (DNEFS), which uses on-the-fly encryption and decryption of file system data nodes to efficiently and securely delete data on flash memory systems. DNEFS is a generic modification of existing flash file systems or controllers that enables secure data deletion while preserving the underlying systems' desirable properties: application-independence, fine-grained data access, wear-levelling, and efficiency. We describe DNEFS both abstractly and in the context of the flash file system UBIFS. We propose UBIFSec, which integrates DNEFS into UBIFS. We implement UBIFSec by extending UBIFS's Linux implementation and we integrate UBIFSec in the Android operating system running on a Google Nexus One smartphone. We show that it is efficient and usable; Android OS and applications (including video and audio playback) run normally on top of UBIFSec. To the best of our knowledge, this work presents the first comprehensive and fully-implemented secure deletion solution that works within the specification of flash memory.
我们提出了数据节点加密文件系统(DNEFS),它利用文件系统数据节点的动态加密和解密来高效安全地删除闪存系统上的数据。DNEFS是对现有flash文件系统或控制器的一种通用修改,可以在保留底层系统所需属性的同时安全删除数据:应用程序独立性、细粒度数据访问、损耗均衡和效率。我们既抽象地描述DNEFS,也在flash文件系统uifs的上下文中描述DNEFS。我们提出了uifsec,它将DNEFS集成到uifs中。我们通过扩展uifs的Linux实现来实现uifsec,我们将uifsec集成到运行在Google Nexus One智能手机上的Android操作系统中。我们证明了它是高效和可用的;Android操作系统和应用程序(包括视频和音频播放)在uifsec上正常运行。据我们所知,这项工作提出了第一个全面和完全实现的安全删除解决方案,在闪存规范内工作。
{"title":"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory","authors":"Joel Reardon, Srdjan Capkun, D. Basin","doi":"10.3929/ETHZ-A-007593083","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007593083","url":null,"abstract":"We propose the Data Node Encrypted File System (DNEFS), which uses on-the-fly encryption and decryption of file system data nodes to efficiently and securely delete data on flash memory systems. DNEFS is a generic modification of existing flash file systems or controllers that enables secure data deletion while preserving the underlying systems' desirable properties: application-independence, fine-grained data access, wear-levelling, and efficiency. \u0000 \u0000We describe DNEFS both abstractly and in the context of the flash file system UBIFS. We propose UBIFSec, which integrates DNEFS into UBIFS. We implement UBIFSec by extending UBIFS's Linux implementation and we integrate UBIFSec in the Android operating system running on a Google Nexus One smartphone. We show that it is efficient and usable; Android OS and applications (including video and audio playback) run normally on top of UBIFSec. To the best of our knowledge, this work presents the first comprehensive and fully-implemented secure deletion solution that works within the specification of flash memory.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"20 1","pages":"333-348"},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78887167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Jamming-resistant Broadcast Communication without Shared Keys 无共享密钥的抗干扰广播通信
Pub Date : 2009-08-10 DOI: 10.3929/ETHZ-A-006824907
C. Pöpper, M. Strasser, Srdjan Capkun
Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common techniques to counter jamming attacks such as Direct-Sequence Spread Spectrum (DSSS) and Frequency Hopping are based on secrets that need to be shared between the sender and the receivers before the start of the communication. However, broadcast antijamming communication that relies on either secret pairwise or group keys is likely to be subject to scalability and key-setup problems or provides weak jammingresistance, respectively. In this work, we therefore propose a solution called Uncoordinated DSSS (UDSSS) that enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. It is applicable to broadcast scenarios in which receivers hold an authentic public key of the sender but do not share a secret key with it. UDSSS can handle an unlimited amount of receivers while being secure against malicious receivers. We analyze the security and latency of UDSSS and complete our work with an experimental evaluation on a prototype implementation.
抗干扰广播通信对于紧急警报广播或敌对环境中导航信号的传播等安全关键应用至关重要。这些应用程序都需要保证消息的真实性和可用性,这些消息由基站广播给大量未知的(可能不受信任的)接收器。对抗干扰攻击的常用技术,如直接序列扩频(DSSS)和跳频,是基于在通信开始前需要在发送方和接收方之间共享的秘密。然而,依赖于密钥对或组密钥的广播抗干扰通信可能会受到可伸缩性和密钥设置问题的影响,或者分别提供较弱的抗干扰性。因此,在这项工作中,我们提出了一种称为非协调DSSS (UDSSS)的解决方案,该解决方案可以在不需要共享秘密的情况下实现扩频抗干扰广播通信。它适用于接收方持有发送方的真实公钥,但不与发送方共享密钥的广播场景。UDSSS可以处理无限数量的接收器,同时防止恶意接收器。我们分析了UDSSS的安全性和延迟,并通过对原型实现的实验评估来完成我们的工作。
{"title":"Jamming-resistant Broadcast Communication without Shared Keys","authors":"C. Pöpper, M. Strasser, Srdjan Capkun","doi":"10.3929/ETHZ-A-006824907","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006824907","url":null,"abstract":"Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common techniques to counter jamming attacks such as Direct-Sequence Spread Spectrum (DSSS) and Frequency Hopping are based on secrets that need to be shared between the sender and the receivers before the start of the communication. However, broadcast antijamming communication that relies on either secret pairwise or group keys is likely to be subject to scalability and key-setup problems or provides weak jammingresistance, respectively. In this work, we therefore propose a solution called Uncoordinated DSSS (UDSSS) that enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. It is applicable to broadcast scenarios in which receivers hold an authentic public key of the sender but do not share a secret key with it. UDSSS can handle an unlimited amount of receivers while being secure against malicious receivers. We analyze the security and latency of UDSSS and complete our work with an experimental evaluation on a prototype implementation.","PeriodicalId":91597,"journal":{"name":"Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium","volume":"12 1","pages":"231-248"},"PeriodicalIF":0.0,"publicationDate":"2009-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89009615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 170
期刊
Proceedings of the ... USENIX Security Symposium. UNIX Security Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1