计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 312-317.doi: 10.11896/jsjkx.190300104

• 信息安全 • 上一篇    下一篇

基于异构计算平台的规则处理器的设计与实现

陈孟东, 郭东升, 谢向辉, 吴东   

  1. 数学工程与先进计算国家重点实验室 江苏 无锡214125
  • 收稿日期:2019-03-21 出版日期:2020-04-15 发布日期:2020-04-15
  • 通讯作者: 谢向辉(xie.xianghui@meac-skl.cn)
  • 基金资助:
    国家自然科学基金(61732018)

Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform

CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong   

  1. State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi,Jiangsu 214125,China
  • Received:2019-03-21 Online:2020-04-15 Published:2020-04-15
  • Contact: XIE Xiang-hui,born in 1958,Ph.D,se-nior engineer,Ph.D supervisor.His main research interests include computer architecture.
  • About author:CHEN Meng-dong,born in 1984,postgraduate,engineer.His main research interests include computer architecture.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61732018).

摘要: 对于身份认证机制中的安全字符串恢复,字典结合变换规则是一种常用的方法。通过变换规则的处理,可以快速生成大量具有针对性的新字符串供验证使用。但是,规则的处理过程复杂,对处理性能、系统功耗等有很高的要求,现有的工具和研究都是基于软件方式进行处理,难以满足实际恢复系统的需求。为此,文中提出了基于异构计算平台的规则处理器技术,首次使用可重构FPGA硬件加速规则的处理过程,同时使用ARM通用计算核心进行规则处理过程的配置、管理、监控等工作,并在Xilinx Zynq XC7Z030芯片上进行了具体实现。实验结果表明,在典型情况下,该混合架构的规则处理器相比于单纯使用ARM通用计算核心,性能提升了214倍,规则处理器的运行性能优于Intel i7-6700 CPU,性能功耗比相比NVIDIA GeForce GTX 1080 Ti GPU有1.4~2.1倍的提升,相比CPU有70倍的提升,有效提升了规则处理的速率和能效。实验数据充分说明,基于异构计算平台,采用硬件加速的规则处理器有效解决了规则处理中的速率和能效问题,可以满足实际工程需求,为整个安全字符串恢复系统的设计奠定了基础。

关键词: 处理器, 规则, 身份认证, 异构, 字符串

Abstract: Using dictionaries and their transformation rules is a common method.In recovering the secure string in the identity authentication mechanism.Through the processing of the transformation rules,a large number of targeted new strings can be quickly generated for verification.The rule processing process is complex,and has high requirements on processing performance and system power consumption.The existing tools and research are processed based on software,which are difficult to meet the needs of the actual recovery system.To this end,a rule processor technology based on heterogeneous computing platform was proposed in this paper.For the first time,reconfigurable FPGA hardware is used to accelerate the process of rule processing.At the same time,the ARM universal computing core is used to configure,manage and monitor the process of rule processing.It is implemented on Xilinx Zynq XC7Z030 chip.The experimental results show that the performance of the rule processor based on the hybrid architecture is 214 times higher than that of the rule processor based on ARM only.Typically,the performance of rule processor is better than that of Intel i7-6700 CPU.Compared with NVIDIA GeForce GTX 1080 Ti GPU,the performance power ratio of rule processor is 1.4-2.1 times higher,70 times higher than that of CPU,which effectively improves the speed and efficiency of rule processing.The experimental data fully show that the speed and efficiency of rule processing can be effectively solved by using hardware-accelerated rule processor based on heterogeneous computing platform,which can meet the actual engineering requirements and provide a basis for the design of the whole secure string recovery system.

Key words: Character string, Heterogeneous, Identity authentication, Processor, Rule

中图分类号: 

  • TP391
[1]GUO X.The Scale-free Network of Passwords:Visualizationand Estimation of Empirical Passwords [EB/OL].[2019-03-18].http://arxiv.org/pdf/1511.08324v1.
[2]WU Z Y,CHIANG D L,LIN T C,et al.A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network [C]// International Conference on Advanced Information Networking & Applications Workshops.IEEE,2012.
[3]LIU J.Research and application of password cracking methodbased on special dictionary[D].Harbin:Harbin Institute of Technology,2015.
[4]STEUBE J.hashcat advanved password recovery [EB/OL].[2019-03-18].https://hashcat.net/hashcat/.
[5]Openwall.John the Ripper password cracker [EB/OL].[2019-03-18].http://www.openwall.com/john/doc/.
[6]DAS A,BONNEAU J,CAESAR M,et al.The Tangled Web of Password Reuse[C]// Network and Distributed System Security Symposium.2014.
[7]TATLI E I.Cracking More Password Hashes With Patterns[J].IEEE Transactions on Information Forensics & Security,2015,10(8):1656-1665.
[8]NSAKEY.Password cracking rules and masks for hashcat that igenerated from cracked passwords[EB/OL].https://github:com/NSAKEY/nsa-rules.
[9]GOODIN,D.Anatomy of a hack:How crackers ransack passwords like “qeadzcwrsfxv1331”[EB/OL].http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-yourpasswords/.
[10]UR B,SEGRETI S M,BAUER L,et al.Measuring real-worldaccuracies and biases in modeling password guessability[C]// Usenix Conference on Security Symposium.2015.
[11]VERAS R,THORPE J,COLLINS C.Visualizing semantics in passwords:The role of dates[C]// Proceedings of the Ninth International Symposium on Visualization for Cyber Security(VizSec ’12).New York,NY,USA:ACM,2012:88-95.
[12]MELICHER W,UR B,SEGRETI S M,et al.Fast,lean,and accurate:Modeling password guessability using neural networks[C]//25th USENIX Security Symposium (USENIX Security 16).Austin,TX:USENIX Association,2016:175-191.
[13]CHOU H C,LEE H C,YU H J,et al.Password cracking based on learned patterns from disclosed passwords[C]//IJICIC.2013.
[14]FAHL S,HARBACH M,ACAR Y,et al.On the ecological validity of a password study[C]// Symposium on Usable Privacy and Security.2013:1-13.
[15]DE CAMAVALET X C,MANNAN M.From very weak to very strong:Analyzing password—strength meters[C]//Proceedings of the Network and Distributed System Security Symposium.2014.
[16]HUH J H,OH S,KIM H,et al.Surpass:System-initiated Userreplaceable Passwords[C]// The 22nd ACM SIGSAC Confe-rence on Computer and Communications Security.2015:170-181.
[17]MILO F,BERNASCHI M,BISSON M.A fast,GPU based,dictionary attack to OpenPGP secret keyrings[J].Journal of Systems & Software,2011,84(12):2088-2096.
[18]XU L,GE C,QIU W,et al.Password Guessing Based on LSTM Recurrent Neural Networks[C]// IEEE International Confe-rence on Computational Science and Engineering.IEEE,2017:785-788.
[19]Xilinx.Zynq-7000 All Programmable SoC [EB/OL].[2019-03-18].https://www.xilinx.com/support/documentation/pro-duct-briefs/zynq-7000-product-brief.pdf.
[1] 胡安祥, 尹小康, 朱肖雅, 刘胜利.
基于数据流特征的比较类函数识别方法
Strcmp-like Function Identification Method Based on Data Flow Feature Matching
计算机科学, 2022, 49(9): 326-332. https://doi.org/10.11896/jsjkx.220200163
[2] 黄丽, 朱焱, 李春平.
基于异构网络表征学习的作者学术行为预测
Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning
计算机科学, 2022, 49(9): 76-82. https://doi.org/10.11896/jsjkx.210900078
[3] 李霞, 马茜, 白梅, 王习特, 李冠宇, 宁博.
RIIM:基于独立模型的在线缺失值填补
RIIM:Real-Time Imputation Based on Individual Models
计算机科学, 2022, 49(8): 56-63. https://doi.org/10.11896/jsjkx.210600180
[4] 陈晶, 吴玲玲.
多源异构环境下的车联网大数据混合属性特征检测方法
Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment
计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273
[5] 郭拯危, 付泽文, 李宁, 白澜.
高分辨率斜视聚束SAR回波仿真加速算法研究
Study on Acceleration Algorithm for Raw Data Simulation of High Resolution Squint Spotlight SAR
计算机科学, 2022, 49(8): 178-183. https://doi.org/10.11896/jsjkx.210600066
[6] 张露萍, 徐飞.
具有突触规则的脉冲神经膜系统综述
Survey on Spiking Neural P Systems with Rules on Synapses
计算机科学, 2022, 49(8): 217-224. https://doi.org/10.11896/jsjkx.220300078
[7] 李瑭, 秦小麟, 迟贺宇, 费珂.
面向多无人系统的安全协同模型
Secure Coordination Model for Multiple Unmanned Systems
计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107
[8] 刘云, 董守杰.
基于CUDA核函数的多路视频图像拼接加速算法
Acceleration Algorithm of Multi-channel Video Image Stitching Based on CUDA Kernel Function
计算机科学, 2022, 49(6A): 441-446. https://doi.org/10.11896/jsjkx.210600043
[9] 曹扬晨, 朱国胜, 孙文和, 吴善超.
未知网络攻击识别关键技术研究
Study on Key Technologies of Unknown Network Attack Identification
计算机科学, 2022, 49(6A): 581-587. https://doi.org/10.11896/jsjkx.210400044
[10] 陈鑫, 李芳, 丁海昕, 孙唯哲, 刘鑫, 陈德训, 叶跃进, 何香.
面向国产异构众核架构的CFD非结构网格计算并行优化方法
Parallel Optimization Method of Unstructured-grid Computing in CFD for DomesticHeterogeneous Many-core Architecture
计算机科学, 2022, 49(6): 99-107. https://doi.org/10.11896/jsjkx.210400157
[11] 赵罗成, 屈志昊, 谢在鹏.
面向多层无线边缘环境下的联邦学习通信优化的研究
Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment
计算机科学, 2022, 49(3): 39-45. https://doi.org/10.11896/jsjkx.210800054
[12] 张耕强, 谢钧, 杨章林.
FDSR:一种面向SD-MANET的快速转发规则下发方法
Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET
计算机科学, 2022, 49(2): 377-382. https://doi.org/10.11896/jsjkx.210800045
[13] 蒲实, 赵卫东.
一种面向动态科研网络的社区检测算法
Community Detection Algorithm for Dynamic Academic Network
计算机科学, 2022, 49(1): 89-94. https://doi.org/10.11896/jsjkx.210100023
[14] 杨林, 王永杰, 张俊.
FAWA:一种异构执行体的负反馈动态调度算法
FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor
计算机科学, 2021, 48(8): 284-290. https://doi.org/10.11896/jsjkx.200900059
[15] 瞿伟, 余飞鸿.
基于多核处理器的非对称嵌入式系统研究综述
Survey of Research on Asymmetric Embedded System Based on Multi-core Processor
计算机科学, 2021, 48(6A): 538-542. https://doi.org/10.11896/jsjkx.200900204
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!