Password security hinges on an in-depth understanding of the techniques adopted by attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such as dictionary attacks that are inherently difficult to model in password security studies. In order to be representative of the actual threat, dictionary attacks must be thoughtfully configured and tuned. However, this process requires a domain-knowledge and expertise that cannot be easily replicated. The consequence of inaccurately calibrating dictionary attacks is the unreliability of password security analyses, impaired by a severe measurement bias. In the present work, we introduce a new generation of dictionary attacks that is consistently more resilient to inadequate configurations. Requiring no supervision or domain-knowledge, this technique automatically approximates the advanced guessing strategies adopted by real-world attackers. To achieve this: (1) We use deep neural networks to model the proficiency of adversaries in building attack configurations. (2) Then, we introduce dynamic guessing strategies within dictionary attacks. These mimic experts' ability to adapt their guessing strategies on the fly by incorporating knowledge on their targets. Our techniques enable more robust and sound password strength estimates within dictionary attacks, eventually reducing overestimation in modeling real-world threats in password security. Code available: https://github.com/TheAdamProject/adams
翻译:密码安全取决于对攻击者采用的技术的深入理解。 不幸的是,真实世界的对手采用实用的猜测策略,如本难于在密码安全研究中进行模拟的字典攻击等。为了能够代表实际威胁,必须周密地配置和调整字典攻击。然而,这一过程需要一个无法轻易复制的域知识和专门知识。不准确校准字典攻击的后果是密码安全分析不可靠,受到严重测量偏差的损害。在目前的工作中,我们引进新一代字典攻击,这种攻击始终更能适应不适当的配置。不要求监督或域知识,这种技术自动接近现实世界攻击者采用的先进猜测策略。为了做到这一点:(1) 我们使用深神经网络来模拟对手建立攻击配置的能力。(2) 然后,我们在字典攻击中引入动态猜想策略。这些模拟专家有能力通过吸收对目标的了解来调整自己的策略。我们的技术使得在字典攻击中能够进行更有力和可靠的密码强度估计,最终减少对真实世界威胁的模型的过分估计。代码可以使用: http://gimbas/commroom。