计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 312-317.doi: 10.11896/jsjkx.190300104
陈孟东, 郭东升, 谢向辉, 吴东
CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong
摘要: 对于身份认证机制中的安全字符串恢复,字典结合变换规则是一种常用的方法。通过变换规则的处理,可以快速生成大量具有针对性的新字符串供验证使用。但是,规则的处理过程复杂,对处理性能、系统功耗等有很高的要求,现有的工具和研究都是基于软件方式进行处理,难以满足实际恢复系统的需求。为此,文中提出了基于异构计算平台的规则处理器技术,首次使用可重构FPGA硬件加速规则的处理过程,同时使用ARM通用计算核心进行规则处理过程的配置、管理、监控等工作,并在Xilinx Zynq XC7Z030芯片上进行了具体实现。实验结果表明,在典型情况下,该混合架构的规则处理器相比于单纯使用ARM通用计算核心,性能提升了214倍,规则处理器的运行性能优于Intel i7-6700 CPU,性能功耗比相比NVIDIA GeForce GTX 1080 Ti GPU有1.4~2.1倍的提升,相比CPU有70倍的提升,有效提升了规则处理的速率和能效。实验数据充分说明,基于异构计算平台,采用硬件加速的规则处理器有效解决了规则处理中的速率和能效问题,可以满足实际工程需求,为整个安全字符串恢复系统的设计奠定了基础。
中图分类号:
[1]GUO X.The Scale-free Network of Passwords:Visualizationand Estimation of Empirical Passwords [EB/OL].[2019-03-18].http://arxiv.org/pdf/1511.08324v1. [2]WU Z Y,CHIANG D L,LIN T C,et al.A Reliable Dynamic User-Remote Password Authentication Scheme over Insecure Network [C]// International Conference on Advanced Information Networking & Applications Workshops.IEEE,2012. [3]LIU J.Research and application of password cracking methodbased on special dictionary[D].Harbin:Harbin Institute of Technology,2015. [4]STEUBE J.hashcat advanved password recovery [EB/OL].[2019-03-18].https://hashcat.net/hashcat/. [5]Openwall.John the Ripper password cracker [EB/OL].[2019-03-18].http://www.openwall.com/john/doc/. [6]DAS A,BONNEAU J,CAESAR M,et al.The Tangled Web of Password Reuse[C]// Network and Distributed System Security Symposium.2014. [7]TATLI E I.Cracking More Password Hashes With Patterns[J].IEEE Transactions on Information Forensics & Security,2015,10(8):1656-1665. [8]NSAKEY.Password cracking rules and masks for hashcat that igenerated from cracked passwords[EB/OL].https://github:com/NSAKEY/nsa-rules. [9]GOODIN,D.Anatomy of a hack:How crackers ransack passwords like “qeadzcwrsfxv1331”[EB/OL].http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-yourpasswords/. [10]UR B,SEGRETI S M,BAUER L,et al.Measuring real-worldaccuracies and biases in modeling password guessability[C]// Usenix Conference on Security Symposium.2015. [11]VERAS R,THORPE J,COLLINS C.Visualizing semantics in passwords:The role of dates[C]// Proceedings of the Ninth International Symposium on Visualization for Cyber Security(VizSec ’12).New York,NY,USA:ACM,2012:88-95. [12]MELICHER W,UR B,SEGRETI S M,et al.Fast,lean,and accurate:Modeling password guessability using neural networks[C]//25th USENIX Security Symposium (USENIX Security 16).Austin,TX:USENIX Association,2016:175-191. [13]CHOU H C,LEE H C,YU H J,et al.Password cracking based on learned patterns from disclosed passwords[C]//IJICIC.2013. [14]FAHL S,HARBACH M,ACAR Y,et al.On the ecological validity of a password study[C]// Symposium on Usable Privacy and Security.2013:1-13. [15]DE CAMAVALET X C,MANNAN M.From very weak to very strong:Analyzing password—strength meters[C]//Proceedings of the Network and Distributed System Security Symposium.2014. [16]HUH J H,OH S,KIM H,et al.Surpass:System-initiated Userreplaceable Passwords[C]// The 22nd ACM SIGSAC Confe-rence on Computer and Communications Security.2015:170-181. [17]MILO F,BERNASCHI M,BISSON M.A fast,GPU based,dictionary attack to OpenPGP secret keyrings[J].Journal of Systems & Software,2011,84(12):2088-2096. [18]XU L,GE C,QIU W,et al.Password Guessing Based on LSTM Recurrent Neural Networks[C]// IEEE International Confe-rence on Computational Science and Engineering.IEEE,2017:785-788. [19]Xilinx.Zynq-7000 All Programmable SoC [EB/OL].[2019-03-18].https://www.xilinx.com/support/documentation/pro-duct-briefs/zynq-7000-product-brief.pdf. |
[1] | 胡安祥, 尹小康, 朱肖雅, 刘胜利. 基于数据流特征的比较类函数识别方法 Strcmp-like Function Identification Method Based on Data Flow Feature Matching 计算机科学, 2022, 49(9): 326-332. https://doi.org/10.11896/jsjkx.220200163 |
[2] | 黄丽, 朱焱, 李春平. 基于异构网络表征学习的作者学术行为预测 Author’s Academic Behavior Prediction Based on Heterogeneous Network Representation Learning 计算机科学, 2022, 49(9): 76-82. https://doi.org/10.11896/jsjkx.210900078 |
[3] | 李霞, 马茜, 白梅, 王习特, 李冠宇, 宁博. RIIM:基于独立模型的在线缺失值填补 RIIM:Real-Time Imputation Based on Individual Models 计算机科学, 2022, 49(8): 56-63. https://doi.org/10.11896/jsjkx.210600180 |
[4] | 陈晶, 吴玲玲. 多源异构环境下的车联网大数据混合属性特征检测方法 Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment 计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273 |
[5] | 郭拯危, 付泽文, 李宁, 白澜. 高分辨率斜视聚束SAR回波仿真加速算法研究 Study on Acceleration Algorithm for Raw Data Simulation of High Resolution Squint Spotlight SAR 计算机科学, 2022, 49(8): 178-183. https://doi.org/10.11896/jsjkx.210600066 |
[6] | 张露萍, 徐飞. 具有突触规则的脉冲神经膜系统综述 Survey on Spiking Neural P Systems with Rules on Synapses 计算机科学, 2022, 49(8): 217-224. https://doi.org/10.11896/jsjkx.220300078 |
[7] | 李瑭, 秦小麟, 迟贺宇, 费珂. 面向多无人系统的安全协同模型 Secure Coordination Model for Multiple Unmanned Systems 计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107 |
[8] | 刘云, 董守杰. 基于CUDA核函数的多路视频图像拼接加速算法 Acceleration Algorithm of Multi-channel Video Image Stitching Based on CUDA Kernel Function 计算机科学, 2022, 49(6A): 441-446. https://doi.org/10.11896/jsjkx.210600043 |
[9] | 曹扬晨, 朱国胜, 孙文和, 吴善超. 未知网络攻击识别关键技术研究 Study on Key Technologies of Unknown Network Attack Identification 计算机科学, 2022, 49(6A): 581-587. https://doi.org/10.11896/jsjkx.210400044 |
[10] | 陈鑫, 李芳, 丁海昕, 孙唯哲, 刘鑫, 陈德训, 叶跃进, 何香. 面向国产异构众核架构的CFD非结构网格计算并行优化方法 Parallel Optimization Method of Unstructured-grid Computing in CFD for DomesticHeterogeneous Many-core Architecture 计算机科学, 2022, 49(6): 99-107. https://doi.org/10.11896/jsjkx.210400157 |
[11] | 赵罗成, 屈志昊, 谢在鹏. 面向多层无线边缘环境下的联邦学习通信优化的研究 Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment 计算机科学, 2022, 49(3): 39-45. https://doi.org/10.11896/jsjkx.210800054 |
[12] | 张耕强, 谢钧, 杨章林. FDSR:一种面向SD-MANET的快速转发规则下发方法 Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET 计算机科学, 2022, 49(2): 377-382. https://doi.org/10.11896/jsjkx.210800045 |
[13] | 蒲实, 赵卫东. 一种面向动态科研网络的社区检测算法 Community Detection Algorithm for Dynamic Academic Network 计算机科学, 2022, 49(1): 89-94. https://doi.org/10.11896/jsjkx.210100023 |
[14] | 杨林, 王永杰, 张俊. FAWA:一种异构执行体的负反馈动态调度算法 FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor 计算机科学, 2021, 48(8): 284-290. https://doi.org/10.11896/jsjkx.200900059 |
[15] | 瞿伟, 余飞鸿. 基于多核处理器的非对称嵌入式系统研究综述 Survey of Research on Asymmetric Embedded System Based on Multi-core Processor 计算机科学, 2021, 48(6A): 538-542. https://doi.org/10.11896/jsjkx.200900204 |
|