Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion
The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the fi...
Saved in:
| Published in: | Applied sciences Vol. 14; no. 5; p. 1855 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Basel
MDPI AG
01.03.2024
|
| Subjects: | |
| ISSN: | 2076-3417, 2076-3417 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the field is dedicated to abstract loop or iterative patterns and fuzzing the entire application to discover algorithm complexity vulnerabilities, but they still face efficiency and effectiveness issues. Our research focuses on: (1) proposing a representation and extraction method for code features related to algorithmic complexity vulnerabilities, helping analysts quickly understand program logic; (2) providing a new ACV detecting model, focusing on the spatial complexity anomalies caused by deep recursion structures, and proposing a new filtering method; and (3) aiming at the difficulty of efficiently generating complex-data-type-related payloads using existing symbol execution techniques, a call-chain-guided payload construction method is proposed. We tested third-party components in the open-source Java Maven Repository, identified many unexposed vulnerabilities, and eight of them received Common Vulnerabilities and Exposures (CVE) identifiers, and demonstrated that our method can discover more algorithmic complexity vulnerabilities compared to existing tools with better performance. |
|---|---|
| AbstractList | The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the software supply chain. The existing work in the field is dedicated to abstract loop or iterative patterns and fuzzing the entire application to discover algorithm complexity vulnerabilities, but they still face efficiency and effectiveness issues. Our research focuses on: (1) proposing a representation and extraction method for code features related to algorithmic complexity vulnerabilities, helping analysts quickly understand program logic; (2) providing a new ACV detecting model, focusing on the spatial complexity anomalies caused by deep recursion structures, and proposing a new filtering method; and (3) aiming at the difficulty of efficiently generating complex-data-type-related payloads using existing symbol execution techniques, a call-chain-guided payload construction method is proposed. We tested third-party components in the open-source Java Maven Repository, identified many unexposed vulnerabilities, and eight of them received Common Vulnerabilities and Exposures (CVE) identifiers, and demonstrated that our method can discover more algorithmic complexity vulnerabilities compared to existing tools with better performance. |
| Audience | Academic |
| Author | Bu, Debao Tian, Weihan Cui, Baojiang Wang, Ziqi |
| Author_xml | – sequence: 1 givenname: Ziqi orcidid: 0000-0002-5089-8918 surname: Wang fullname: Wang, Ziqi – sequence: 2 givenname: Debao surname: Bu fullname: Bu, Debao – sequence: 3 givenname: Weihan orcidid: 0000-0002-9302-8525 surname: Tian fullname: Tian, Weihan – sequence: 4 givenname: Baojiang surname: Cui fullname: Cui, Baojiang |
| BookMark | eNpNUU1vEzEQtVCRKKUn_sBKHFGKvf4-RgFKpUpIlPZqzXrHwdHGXuwNIv31uAShzhzmQ_PejOa9JmcpJyTkLaNXnFv6AeaZCSqZkfIFOe-pVisumD57lr8il7XuaDPLuGH0nNytE0zHx5i2HaSx-xirz7-wPNV3MywRpm49bXOJy499t8n7ecLfcTl2D4cpYYEhTnGJWLuYum_oD6XGnN6QlwGmipf_4gW5__zp--bL6vbr9c1mfbvyXLFlZZX1g7ecsQGQKduPPDA5GBG0EaBGGrQceEBroZc6GCHQKNSo-wGMoCO_IDcn3jHDzs0l7qEcXYbo_jZy2TooS_QTOq6kAk4HIYwSpudGWmFHrXUAY0aFjevdiWsu-ecB6-J2-VDab6rrrZSCtwNNm7o6TW2hkcYU8lLANx9xH32TI8TWX-u2pBdM8QZ4fwL4kmstGP6fyah7Us09U43_AZCdiqc |
| Cites_doi | 10.1145/3548606.3559337 10.1145/3510003.3510047 10.1145/3213846.3213868 10.1145/3238147.3238159 10.1145/3532184 10.1145/1925805.1925818 10.1145/3338906.3341177 10.1007/978-3-031-10363-6 10.1145/3236024.3236039 10.1007/978-3-319-46586-9 10.1109/ICSE.2009.5070545 10.1145/2950290.2950340 10.1007/978-3-662-49674-9 10.1109/SCAM.2016.23 10.1109/SP40001.2021.00062 10.1109/ICST.2017.13 10.1145/3236024.3236027 10.1109/SP46215.2023.10179328 10.1145/3179541.3168830 10.1145/3416507.3423189 10.1016/j.future.2021.09.006 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI DOA |
| DOI | 10.3390/app14051855 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest Central ProQuest One Academic Middle East (New) ProQuest One Academic UKI Edition ProQuest Central Essentials ProQuest Central Korea ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Sciences (General) |
| EISSN | 2076-3417 |
| ExternalDocumentID | oai_doaj_org_article_3656a30b4486482385949d777fa88d6e A786424163 10_3390_app14051855 |
| GeographicLocations | Germany |
| GeographicLocations_xml | – name: Germany |
| GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI |
| ID | FETCH-LOGICAL-c361t-969cbc9311bae1692d3f15b84f784a6d0f75b3fe99a257f844e86e7e72ba840d3 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001182608700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2076-3417 |
| IngestDate | Tue Oct 14 19:05:16 EDT 2025 Mon Jun 30 14:36:57 EDT 2025 Tue Nov 04 18:27:24 EST 2025 Sat Nov 29 07:09:02 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c361t-969cbc9311bae1692d3f15b84f784a6d0f75b3fe99a257f844e86e7e72ba840d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5089-8918 0000-0002-9302-8525 |
| OpenAccessLink | https://doaj.org/article/3656a30b4486482385949d777fa88d6e |
| PQID | 2955431698 |
| PQPubID | 2032433 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_3656a30b4486482385949d777fa88d6e proquest_journals_2955431698 gale_infotracacademiconefile_A786424163 crossref_primary_10_3390_app14051855 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-03-01 |
| PublicationDateYYYYMMDD | 2024-03-01 |
| PublicationDate_xml | – month: 03 year: 2024 text: 2024-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Applied sciences |
| PublicationYear | 2024 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | ref_35 ref_12 ref_34 ref_11 ref_33 (ref_36) 2017; Volume 74 ref_10 ref_32 ref_31 ref_30 ref_19 ref_18 ref_17 ref_39 ref_16 ref_38 ref_15 ref_37 Li (ref_14) 2022; 127 ref_25 ref_47 ref_24 ref_46 ref_23 ref_45 ref_22 ref_44 ref_21 ref_43 ref_20 ref_42 ref_41 ref_40 ref_1 ref_3 ref_2 ref_29 ref_28 ref_27 ref_26 ref_48 ref_9 ref_8 Blair (ref_13) 2022; 25 ref_5 ref_4 Olivo (ref_6) 2017; Volume 10206 ref_7 |
| References_xml | – ident: ref_28 – ident: ref_9 – ident: ref_30 – volume: Volume 74 start-page: 10:1 year: 2017 ident: ref_36 article-title: Evil Pickles: DoS Attacks Based on Object-Graph Engineering publication-title: Proceedings of the 31st European Conference on Object-Oriented Programming (ECOOP 2017), Barcelona, Spain, 19–23 June 2017 – ident: ref_5 – ident: ref_32 – ident: ref_3 – ident: ref_11 doi: 10.1145/3548606.3559337 – ident: ref_26 – ident: ref_31 doi: 10.1145/3510003.3510047 – ident: ref_47 – ident: ref_17 doi: 10.1145/3213846.3213868 – ident: ref_23 doi: 10.1145/3238147.3238159 – volume: 25 start-page: 1 year: 2022 ident: ref_13 article-title: HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing publication-title: ACM Trans. Priv. Secur. doi: 10.1145/3532184 – ident: ref_34 doi: 10.1145/1925805.1925818 – ident: ref_40 – ident: ref_12 doi: 10.1145/3338906.3341177 – ident: ref_42 – ident: ref_1 – ident: ref_20 doi: 10.1007/978-3-031-10363-6 – ident: ref_35 – ident: ref_44 – ident: ref_16 doi: 10.1145/3236024.3236039 – ident: ref_29 doi: 10.1007/978-3-319-46586-9 – ident: ref_37 doi: 10.1109/ICSE.2009.5070545 – ident: ref_19 doi: 10.1145/2950290.2950340 – ident: ref_39 doi: 10.1007/978-3-662-49674-9 – ident: ref_24 doi: 10.1109/SCAM.2016.23 – ident: ref_25 – ident: ref_4 – ident: ref_18 doi: 10.1109/SP40001.2021.00062 – ident: ref_33 – ident: ref_27 – ident: ref_2 – ident: ref_46 – ident: ref_48 – ident: ref_10 – ident: ref_38 doi: 10.1109/ICST.2017.13 – ident: ref_41 – ident: ref_15 – volume: Volume 10206 start-page: 3 year: 2017 ident: ref_6 article-title: Static Detection of DoS Vulnerabilities in Programs That Use Regular Expressions publication-title: Proceedings of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 22–29 April 2017, Proceedings, Part II – ident: ref_45 – ident: ref_7 doi: 10.1145/3236024.3236027 – ident: ref_43 – ident: ref_8 doi: 10.1109/SP46215.2023.10179328 – ident: ref_21 doi: 10.1145/3179541.3168830 – ident: ref_22 doi: 10.1145/3416507.3423189 – volume: 127 start-page: 384 year: 2022 ident: ref_14 article-title: CVFuzz: Detecting Complexity Vulnerabilities in OpenCL Kernels via Automated Pathological Input Generation publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2021.09.006 |
| SSID | ssj0000913810 |
| Score | 2.2763715 |
| Snippet | The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and... |
| SourceID | doaj proquest gale crossref |
| SourceType | Open Website Aggregation Database Index Database |
| StartPage | 1855 |
| SubjectTerms | Algorithms Analysis Automation call chain Computational linguistics Critical path Denial of service attacks Efficiency Java Language processing Logistics Methods Natural language interfaces recursion structure Safety and security measures Software spatial algorithm complexity vulnerability Third party Web applications |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Nb9QwEB3RlkN7AFpALBTkQyXoISKJ7dg-oRZacVpV5UO9WXZsl5VKtt2kSPDrmcl6S3uAC8ckjuNoPOM34_EbgD0qSuhiXRWO16kQPpjCNU4UVfKIroWUMeix2ISaTvXZmTnJAbc-p1WubOJoqMO8pRj529rI8di20e8urwqqGkW7q7mExhpsEFMZzvONw6PpyelNlIVYL3VVLg_mcfTvaV8YfQqJy5S8sxSNjP1_s8vjYnP88H-H-QgeZJjJDpbzYhvuxW4Htm6RD-7Adlbrnr3J3NP7j-HTSFLyCxsw1wX2Yda3lONJ11S8eEZ9XpzjB4dv3xnZEuLTHH6yr9cX1MWYaYu-N5t17JQi-RSLewJfjo8-v_9Y5LoLRcubaihMY1rfGl5V3kX8lTrwVEmvRVJauCaUSUnPUzTGocInLUTUTVRR1d6hvxj4U1jv5l18BsyXyaBHE4zXSWjvPCKCJLnQCPvKsk0T2FuJwF4u6TUsuiUkKXtLUhM4JPHcNCFO7PHGfHFus4pZjtDU8dKjw9kIjVBEGmGCUio5rUMTJ_CahGtJc4eFa10-gIAjJQ4se6DwvZoA6gR2V8K1WaV7-0eyz__9-AVs1oh8lolqu7A-LK7jS7jf_hhm_eJVnqG_AQoI8Bk priority: 102 providerName: ProQuest |
| Title | Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion |
| URI | https://www.proquest.com/docview/2955431698 https://doaj.org/article/3656a30b4486482385949d777fa88d6e |
| Volume | 14 |
| WOSCitedRecordID | wos001182608700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: PIMPY dateStart: 20110101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6hlgMcqraAWPqQD5WAQ0QS27F9bEsrOLBalYfKybJju0QqKdpNkeDXM-OkaDkgLhwdOZY1k3l8zvgbgCNqSuhiXRWO16kQPpjCNU4UVfKYXQspY9C52YSaz_XlpVmstfqimrCRHngU3CuOCYfjpUcY0QiNAUYaYYJSKjmtQxPJ-5bKrIGp7INNRdRV44U8jrie_gcjlpAYnuQfISgz9f_NH-cgc74NW1N2yI7HXe3AvdjvwsM1zsBd2JmsccVeTJTRLx_B-8wt8hMnMNcH9rpbtVSaSWPqOdzRmtdXN8tu-PKVkQsgGszhB_t0e01L5AJZhMys69kFHcDTEdpj-Hh-9uH0TTG1Syha3lRDYRrT-tbwqvIuVo2pA0-V9FokpYVrQpmU9DxFYxzaadJCRN1EFVXtHcK8wJ_ARn_Tx6fAfJkMApFgvE5Ce-cxkCfJhcZsrSzbNIOjOwnabyMrhkU0QYK2a4KewQlJ9_cUorLOD1DBdlKw_ZeCZ_CcdGPJ4Iala910bwB3StRV9ljhezXllTPYv1OfnSxxZWsj83V_o5_9j93swYMa05qxCm0fNoblbTyA--33oVstD2Hz5Gy-uDjMHyOOFm_fLT7_AiSC4mI |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJwAFpALBTIoQg4RCSxk9gHhAql6qrtagUFlZOxY7tEKtmySUHlR_EbmcmjlAPceuCYxBnFyZeZb-x5AKxTU0LtkjjULPEhN1aGOtM8jL1Bds3T1FnRNpvIp1NxcCBnS_BzyIWhsMpBJ7aK2s4LWiN_nsi0TduW4uXx15C6RtHu6tBCo4PFjjv9ji5b_WKyid_3cZJsvdl_vR32XQXCgmVxE8pMFqaQLI6NdigvsczHqRHc54LrzEY-Tw3zTkqNcPaCcycyl7s8MRq9IctQ7iVY5gT2ESzPJnuzj2erOlRlU8RRlwjImIxoHxp9mBTNYvqH6Ws7BPzNDrTGbevG__ZabsL1nkYHGx3uV2DJVatw7VxxxVVY6dVWHTzta2s_uwXv2iIsP3BAoCsbbJZ1QTGsdEzNmUuSeXSIE2w-fwlIV1K90OY0-HByRCLaSOISRZZV8JZ2Kmit8Ta8v5Cp3oFRNa_cXQhM5CV6bFYa4bkw2iDj8SnjAmltFBV-DOvDJ1fHXfkQhW4XIUOdQ8YYXhEczoZQze_2xHxxqHoVohhSb80igw51xgVSrVRyafM891oIm7kxPCEwKdJMzUIXuk-wwCelGl9qI8f7EiLgY1gbwKR6lVWr30i69-_Lj-DK9v7ertqdTHfuw9UEWV4XlLcGo2Zx4h7A5eJbU9aLh_3fEcCni0beL9QATVQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLUJwAFpAXSiQQxFwiJrETmIfECosK1aF1YqX2pOxY7uNVLJlk4LKT-PXMZNkSznArQeOSZxRHH8ef2PPA2CLihJql8ShZokPubEy1JnmYewNsmueps6KtthEPp2KvT05W4Gfy1gYcqtc6sRWUdt5QXvk24lM27BtKbZ97xYxG42fH38NqYIUnbQuy2l0ENl1p9_RfKufTUY41o-SZPzqw8vXYV9hICxYFjehzGRhCsni2GiHshPLfJwawX0uuM5s5PPUMO-k1AhtLzh3InO5yxOj0TKyDOVeglWk5DwZwOps8na2f7bDQxk3RRx1QYGMyYjOpNGeSXGJTP9YBttqAX9bE9qFbnzjf_5FN-F6T6-DnW4-rMGKq9bh2rmki-uw1quzOnjS59x-egvet8lZfmCDQFc2GJV1Qb6tdE1Fm0uSeXSAHWwOvwSkQymPaHMafDo5IhGth3GJIssqeEcnGLQHeRs-XkhX78CgmlduAwITeYmWnJVGeC6MNsiEfMq4QLobRYUfwtZy-NVxl1ZEoTlGKFHnUDKEFwSNsyaUC7y9MV8cqF61KIaUXLPIoKGdcYEULJVc2jzPvRbCZm4IjwlYijRWs9CF7gMv8Esp95fayfG9hIj5EDaXwFK9KqvVb1Td_ffjh3AF4abeTKa79-BqguSv89XbhEGzOHH34XLxrSnrxYN-ogTw-aKB9wtLjlYU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analyzing+and+Discovering+Spatial+Algorithm+Complexity+Vulnerabilities+in+Recursion&rft.jtitle=Applied+sciences&rft.au=Ziqi+Wang&rft.au=Debao+Bu&rft.au=Weihan+Tian&rft.au=Baojiang+Cui&rft.date=2024-03-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=14&rft.issue=5&rft.spage=1855&rft_id=info:doi/10.3390%2Fapp14051855&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_3656a30b4486482385949d777fa88d6e |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |