arXiv - CS - Cryptography and Security最新文献

筛选
英文 中文
Decentralized Biometric Authentication based on Fuzzy Commitments and Blockchain 基于模糊承诺和区块链的去中心化生物鉴别技术
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.11303
Nibras Abo Alzahab, Giulia Rafaiani, Massimo Battaglioni, Franco Chiaraluce, Marco Baldi
{"title":"Decentralized Biometric Authentication based on Fuzzy Commitments and Blockchain","authors":"Nibras Abo Alzahab, Giulia Rafaiani, Massimo Battaglioni, Franco Chiaraluce, Marco Baldi","doi":"arxiv-2409.11303","DOIUrl":"https://doi.org/arxiv-2409.11303","url":null,"abstract":"Blockchain technology, which was introduced for supporting cryptocurrencies,\u0000today provides a decentralized infrastructure for general information storage\u0000and execution of algorithms, thus enabling the conversion of many applications\u0000and services from a centralized and intermediated model to a decentralized and\u0000disintermediated one. In this paper we focus on biometric authentication, which\u0000is classically performed using centralized systems, and could hence benefit\u0000from decentralization. For such a purpose, however, an inherent contradiction\u0000between biometric applications and blockchain technology must be overcome, as\u0000the former require keeping biometric features private, while blockchain is a\u0000public infrastructure. We propose a blockchain-based biometric authentication\u0000protocol that enables decentralization and resilience while protecting the\u0000privacy, personal data, and, in particular, biometric features of users. The\u0000protocol we propose leverages fuzzy commitment schemes to allow biometric\u0000authentication to be performed without disclosing biometric data. We also\u0000analyze the security of the protocol we propose by considering some relevant\u0000attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jailbreaking Large Language Models with Symbolic Mathematics 用符号数学破解大型语言模型
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.11445
Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores, Sumit Kumar Jha, Peyman Najafirad
{"title":"Jailbreaking Large Language Models with Symbolic Mathematics","authors":"Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores, Sumit Kumar Jha, Peyman Najafirad","doi":"arxiv-2409.11445","DOIUrl":"https://doi.org/arxiv-2409.11445","url":null,"abstract":"Recent advancements in AI safety have led to increased efforts in training\u0000and red-teaming large language models (LLMs) to mitigate unsafe content\u0000generation. However, these safety mechanisms may not be comprehensive, leaving\u0000potential vulnerabilities unexplored. This paper introduces MathPrompt, a novel\u0000jailbreaking technique that exploits LLMs' advanced capabilities in symbolic\u0000mathematics to bypass their safety mechanisms. By encoding harmful natural\u0000language prompts into mathematical problems, we demonstrate a critical\u0000vulnerability in current AI safety measures. Our experiments across 13\u0000state-of-the-art LLMs reveal an average attack success rate of 73.6%,\u0000highlighting the inability of existing safety training mechanisms to generalize\u0000to mathematically encoded inputs. Analysis of embedding vectors shows a\u0000substantial semantic shift between original and encoded prompts, helping\u0000explain the attack's success. This work emphasizes the importance of a holistic\u0000approach to AI safety, calling for expanded red-teaming efforts to develop\u0000robust safeguards across all potential input types and their associated risks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking Slicing Network via Side-channel Reinforcement Learning Attack 通过侧信道强化学习攻击切片网络
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.11258
Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe
{"title":"Attacking Slicing Network via Side-channel Reinforcement Learning Attack","authors":"Wei Shao, Chandra Thapa, Rayne Holland, Sarah Ali Siddiqui, Seyit Camtepe","doi":"arxiv-2409.11258","DOIUrl":"https://doi.org/arxiv-2409.11258","url":null,"abstract":"Network slicing in 5G and the future 6G networks will enable the creation of\u0000multiple virtualized networks on a shared physical infrastructure. This\u0000innovative approach enables the provision of tailored networks to accommodate\u0000specific business types or industry users, thus delivering more customized and\u0000efficient services. However, the shared memory and cache in network slicing\u0000introduce security vulnerabilities that have yet to be fully addressed. In this\u0000paper, we introduce a reinforcement learning-based side-channel cache attack\u0000framework specifically designed for network slicing environments. Unlike\u0000traditional cache attack methods, our framework leverages reinforcement\u0000learning to dynamically identify and exploit cache locations storing sensitive\u0000information, such as authentication keys and user registration data. We assume\u0000that one slice network is compromised and demonstrate how the attacker can\u0000induce another shared slice to send registration requests, thereby estimating\u0000the cache locations of critical data. By formulating the cache timing channel\u0000attack as a reinforcement learning-driven guessing game between the attack\u0000slice and the victim slice, our model efficiently explores possible actions to\u0000pinpoint memory blocks containing sensitive information. Experimental results\u0000showcase the superiority of our approach, achieving a success rate of\u0000approximately 95% to 98% in accurately identifying the storage locations of\u0000sensitive data. This high level of accuracy underscores the potential risks in\u0000shared network slicing environments and highlights the need for robust security\u0000measures to safeguard against such advanced side-channel attacks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System 用于智能电网和储能系统公钥基础设施的增强型在线证书状态协议
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10929
Hong-Sheng Huang, Cheng-Che Chuang, Jhih-Zen Shih, Hsuan-Tung Chen, Hung-Min Sun
{"title":"An Enhanced Online Certificate Status Protocol for Public Key Infrastructure with Smart Grid and Energy Storage System","authors":"Hong-Sheng Huang, Cheng-Che Chuang, Jhih-Zen Shih, Hsuan-Tung Chen, Hung-Min Sun","doi":"arxiv-2409.10929","DOIUrl":"https://doi.org/arxiv-2409.10929","url":null,"abstract":"The efficiency of checking certificate status is one of the key indicators in\u0000the public key infrastructure (PKI). This prompted researchers to design the\u0000Online Certificate Status Protocol (OCSP) standard, defined in RFC 6960, to\u0000guide developers in implementing OCSP components. However, as the environment\u0000increasingly relies on PKI for identity authentication, it is essential to\u0000protect the communication between clients and servers from rogue elements. This\u0000can be achieved by using SSL/TLS techniques to establish a secure channel,\u0000allowing Certificate Authorities (CAs) to safely transfer certificate status\u0000information. In this work, we introduce the OCSP Stapling approach to optimize\u0000OCSP query costs in our smart grid environment. This approach reduces the\u0000number of queries from the Device Language Message Specification (DLMS) server\u0000to the OCSP server. Our experimental results show that OCSP stapling increases\u0000both efficiency and security, creating a more robust architecture for the smart\u0000grid.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-ESIA: Analyzing and Mitigating Impacts of Electromagnetic Signal Injection Attacks 反电磁干扰:分析和减轻电磁信号注入攻击的影响
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10922
Denglin Kang, Youqian Zhang, Wai Cheong Tam, Eugene Y. Fu
{"title":"Anti-ESIA: Analyzing and Mitigating Impacts of Electromagnetic Signal Injection Attacks","authors":"Denglin Kang, Youqian Zhang, Wai Cheong Tam, Eugene Y. Fu","doi":"arxiv-2409.10922","DOIUrl":"https://doi.org/arxiv-2409.10922","url":null,"abstract":"Cameras are integral components of many critical intelligent systems.\u0000However, a growing threat, known as Electromagnetic Signal Injection Attacks\u0000(ESIA), poses a significant risk to these systems, where ESIA enables attackers\u0000to remotely manipulate images captured by cameras, potentially leading to\u0000malicious actions and catastrophic consequences. Despite the severity of this\u0000threat, the underlying reasons for ESIA's effectiveness remain poorly\u0000understood, and effective countermeasures are lacking. This paper aims to\u0000address these gaps by investigating ESIA from two distinct aspects: pixel loss\u0000and color strips. By analyzing these aspects separately on image classification\u0000tasks, we gain a deeper understanding of how ESIA can compromise intelligent\u0000systems. Additionally, we explore a lightweight solution to mitigate the\u0000effects of ESIA while acknowledging its limitations. Our findings provide\u0000valuable insights for future research and development in the field of camera\u0000security and intelligent systems.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees AutoCRAT:自动累积重建警报树
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10828
Eric Ficke, Raymond M. Bateman, Shouhuai Xu
{"title":"AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees","authors":"Eric Ficke, Raymond M. Bateman, Shouhuai Xu","doi":"arxiv-2409.10828","DOIUrl":"https://doi.org/arxiv-2409.10828","url":null,"abstract":"When a network is attacked, cyber defenders need to precisely identify which\u0000systems (i.e., computers or devices) were compromised and what damage may have\u0000been inflicted. This process is sometimes referred to as cyber triage and is an\u0000important part of the incident response procedure. Cyber triage is challenging\u0000because the impacts of a network breach can be far-reaching with unpredictable\u0000consequences. This highlights the importance of automating this process. In\u0000this paper we propose AutoCRAT, a system for quantifying the breadth and\u0000severity of threats posed by a network exposure, and for prioritizing cyber\u0000triage activities during incident response. Specifically, AutoCRAT\u0000automatically reconstructs what we call alert trees, which track network\u0000security events emanating from, or leading to, a particular computer on the\u0000network. We validate the usefulness of AutoCRAT using a real-world dataset.\u0000Experimental results show that our prototype system can reconstruct alert trees\u0000efficiently and can facilitate data visualization in both incident response and\u0000threat intelligence analysis.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical Upgrades to and Enhancements of a System Vulnerability Analysis Tool Based on the Blackboard Architecture 对基于黑板架构的系统漏洞分析工具进行技术升级和改进
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10892
Matthew Tassava, Cameron Kolodjski, Jeremy Straub
{"title":"Technical Upgrades to and Enhancements of a System Vulnerability Analysis Tool Based on the Blackboard Architecture","authors":"Matthew Tassava, Cameron Kolodjski, Jeremy Straub","doi":"arxiv-2409.10892","DOIUrl":"https://doi.org/arxiv-2409.10892","url":null,"abstract":"A system vulnerability analysis technique (SVAT) for the analysis of complex\u0000mission critical systems (CMCS) that cannot be taken offline or subjected to\u0000the risks posed by traditional penetration testing was previously developed.\u0000This system uses path-based analysis of vulnerabilities to identify potential\u0000threats to system security. Generalization logic building on the Blackboard\u0000Architecture's rule-fact paradigm was implemented in this system, the software\u0000for operation and network attack results review (SONARR). This paper presents\u0000an overview of additional functionality that has been added to this tool and\u0000the experimentation that was conducted to analyze their efficacy and the\u0000performance benefits of the new in-memory processing capabilities of the SONARR\u0000algorithm. The results of the performance tests and their relation to networks'\u0000architecture are discussed. The paper concludes with a discussion of avenues of\u0000future work, including the implementation of multithreading, additional\u0000analysis metrics like confidentiality, integrity, and availability, and\u0000improved heuristic development.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse 元宇宙中使用头像第一印象的反伪装认证系统
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10850
Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma
{"title":"An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse","authors":"Zhenyong Zhang, Kedi Yang, Youliang Tian, Jianfeng Ma","doi":"arxiv-2409.10850","DOIUrl":"https://doi.org/arxiv-2409.10850","url":null,"abstract":"Metaverse is a vast virtual world parallel to the physical world, where the\u0000user acts as an avatar to enjoy various services that break through the\u0000temporal and spatial limitations of the physical world. Metaverse allows users\u0000to create arbitrary digital appearances as their own avatars by which an\u0000adversary may disguise his/her avatar to fraud others. In this paper, we\u0000propose an anti-disguise authentication method that draws on the idea of the\u0000first impression from the physical world to recognize an old friend.\u0000Specifically, the first meeting scenario in the metaverse is stored and\u0000recalled to help the authentication between avatars. To prevent the adversary\u0000from replacing and forging the first impression, we construct a chameleon-based\u0000signcryption mechanism and design a ciphertext authentication protocol to\u0000ensure the public verifiability of encrypted identities. The security analysis\u0000shows that the proposed signcryption mechanism meets not only the security\u0000requirement but also the public verifiability. Besides, the ciphertext\u0000authentication protocol has the capability of defending against the replacing\u0000and forging attacks on the first impression. Extensive experiments show that\u0000the proposed avatar authentication system is able to achieve anti-disguise\u0000authentication at a low storage consumption on the blockchain.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"212 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments Hackphyr:用于网络安全环境的本地微调 LLM 代理
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.11276
Maria Rigaki, Carlos Catania, Sebastian Garcia
{"title":"Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments","authors":"Maria Rigaki, Carlos Catania, Sebastian Garcia","doi":"arxiv-2409.11276","DOIUrl":"https://doi.org/arxiv-2409.11276","url":null,"abstract":"Large Language Models (LLMs) have shown remarkable potential across various\u0000domains, including cybersecurity. Using commercial cloud-based LLMs may be\u0000undesirable due to privacy concerns, costs, and network connectivity\u0000constraints. In this paper, we present Hackphyr, a locally fine-tuned LLM to be\u0000used as a red-team agent within network security environments. Our fine-tuned 7\u0000billion parameter model can run on a single GPU card and achieves performance\u0000comparable with much larger and more powerful commercial models such as GPT-4.\u0000Hackphyr clearly outperforms other models, including GPT-3.5-turbo, and\u0000baselines, such as Q-learning agents in complex, previously unseen scenarios.\u0000To achieve this performance, we generated a new task-specific cybersecurity\u0000dataset to enhance the base model's capabilities. Finally, we conducted a\u0000comprehensive analysis of the agents' behaviors that provides insights into the\u0000planning abilities and potential shortcomings of such agents, contributing to\u0000the broader understanding of LLM-based agents in cybersecurity contexts","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security Testing Software for Systems that Cannot be Subjected to the Risks of Penetration Testing Through the Incorporation of Multi-threading and and Other Capabilities 通过纳入多线程和其他功能,为无法承受渗透测试风险的系统增强安全测试软件
arXiv - CS - Cryptography and Security Pub Date : 2024-09-17 DOI: arxiv-2409.10893
Matthew Tassava, Cameron Kolodjski, Jordan Milbrath, Jeremy Straub
{"title":"Enhancing Security Testing Software for Systems that Cannot be Subjected to the Risks of Penetration Testing Through the Incorporation of Multi-threading and and Other Capabilities","authors":"Matthew Tassava, Cameron Kolodjski, Jordan Milbrath, Jeremy Straub","doi":"arxiv-2409.10893","DOIUrl":"https://doi.org/arxiv-2409.10893","url":null,"abstract":"The development of a system vulnerability analysis tool (SVAT) for complex\u0000mission critical systems (CMCS) produced the software for operation and network\u0000attack results review (SONARR). This software builds upon the Blackboard\u0000Architecture and uses its a rule-fact logic to assess model networks to\u0000identify potential pathways that an attacker might take through them via the\u0000exploitation of vulnerabilities within the network. The SONARR objects and\u0000algorithm were developed previously; however, performance was insufficient for\u0000analyzing large networks. This paper describes and analyzes the performance of\u0000a multi-threaded SONARR algorithm and other enhancements which were developed\u0000to increase SONARR's performance and facilitate the analysis of large networks.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"188 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信