·896· 智能系统学报 第13卷 参考文献: ity Symposium.Austin,USA,2016:175-191. [14]HOCHREITER S,SCHMIDHUBER J.Long short-term [1]CASTELLUCCIA C.DORMUTH M.PERITO D,et al. memory[J].Neural computation,1997,9(8):1735-1780. Adaptive password-strength meters from markov [15]CHUNG J,GULCEHRE C,CHO K,et al.Empirical eval- models[C]//Proceedings of the 19th Network Distrib- uation of gated recurrent neural networks on sequence uted System Security Symposium.San Diego,United modeling[J].arXiv:1412.3555,2014. States,2012. [16]KOLEN J,KREMER S.Gradient flow in recurrent nets: [2]HASHCAT[EB/OLl.[2017-10-121.https://hashcat.net. the difficulty of learning LongTerm dependencies[M]. [3]John the Ripper password cracker[EB/OL].[2017-10-15]. [S.1.]:Wiley-IEEE Press,2001. http://www.openwall.com/john/. [17]BENGIO Y,SIMARD P,FRASCONI P.Learning long- [4]WEIR M,AGGARWAL S,DE MEDEIROS B,et al.Pass- term dependencies with gradient descent is difficult[J]. word cracking using probabilistic context-free grammars IEEE transactions on neural networks,1994,5(2): [C]//Proceedings of the 30th IEEE Symposium on Secur- 157-166. ity and Privacy.Berkeley,USA,2009:391-405. [5]韩伟力,袁琅,李思斯,等.一种基于样本的模拟口令集 [18]ROCKYOU[OL/EB].[2017-10-13].http://downloads. skullsecurity.org/passwords/rockyou.txt.bz2 生成算法.计算机学报,2017,40(5):1151-1167. [19]YAHOO.Hackers expose 453,000 credentials allegedly HAN Weili,YUAN Lang,LI Sisi,et al.An efficient al- taken from Yahoo service (Updated)[EB/OL].[2012-07- gorithm to generate password sets based on samples[J]. 12].http://arstechnica.com/security/2012/07/yahoo-ser- Chinese journal of computers,2017,40(5):1151-1167. [6]MA J,YANG Weining,LUO Min,et al.A study of prob- vice-hacked/. abilistic password models[C]//Proceedings of 2014 IEEE [20]MYSPACE.Information of 427 million MySpace ac- Symposium on Security and Privacy.San Jose,USA,2014: counts leaked,selling as a package at the price of 2800 689704 dollars in black market[EB/OL].[2016-06-08].https:/ [7]AMICO M D,MICHIARDI P,ROUDIER Y,et al.Pass- www.wosign.com/english/News/myspace.html. word strength:an empirical analysis[C]//Proceedings of 作者简介: 2010 IEEE INFOCOM.San Diego,USA,2010:1-9. 滕南君,男,1992年生,硕士研究 [8]GRAVES A.Generating sequences with recurrent neural 生,主要研究方向为数字信号处理、机 networks[J].Computer science,arXiv:1308.0850,2013. 器学习。 [9]SUTSKEVER I,MARTENS J,HINTON G E,et al.Gen- erating text with recurrent neural networks[Cl//Proceed- ings of the 28th International Conference on Machine Learning.Bellevue,USA,2011:1017-1024. [10]Using neural networks for password cracking[OL/EB]. 鲁华祥,男,1965年生,研究员 [2017-10-15].https://0day.work/using-neural-networks- 博士生导师,主要研究方向为类神经 for-password-cracking/. 计算芯片、类脑神经计算技术和应用 系统、信息与信号处理。 [11]HITAJ B.GASTI P.ATENIESE G,et al.PassGAN:a deep learning approach for password guessing[J].arXiv: 1709.00440.2017. [12]GOODFELLOW I J,POUGET-ABADIE J,MIRZA M, et al.Generative adversarial nets[C]//Proceedings of the 金敏,女,1985年生,助理研究 员.主要研究方向为智能计算、模式识 27th International Conference on Neural Information Pro- 别与高性能计算。 cessing Systems.Montreal,Canada,2014:2672-2680. [13]MELICHER W,UR B,SEGRETI S M,et al.Fast,lean, and accurate:modeling password guessability using neur- al networks[Cl//Proceedings of the 23rd USENIX Secur-参考文献: CASTELLUCCIA C, DÖRMUTH M, PERITO D, et al. Adaptive password-strength meters from markov models[C]//Proceedings of the 19th Network & Distributed System Security Symposium. San Diego, United States, 2012. [1] [2] HASHCAT[EB/OL]. [2017-10-12]. https://hashcat.net. John the Ripper password cracker[EB/OL]. [2017-10-15]. http://www.openwall.com/john/. [3] WEIR M, AGGARWAL S, DE MEDEIROS B, et al. Password cracking using probabilistic context-free grammars [C]//Proceedings of the 30th IEEE Symposium on Security and Privacy. Berkeley, USA, 2009: 391–405. [4] 韩伟力, 袁琅, 李思斯, 等. 一种基于样本的模拟口令集 生成算法[J]. 计算机学报, 2017, 40(5): 1151–1167. HAN Weili, YUAN Lang, LI Sisi, et al. An efficient algorithm to generate password sets based on samples[J]. Chinese journal of computers, 2017, 40(5): 1151–1167. [5] MA J, YANG Weining, LUO Min, et al. A study of probabilistic password models[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy. San Jose, USA, 2014: 689–704. [6] AMICO M D, MICHIARDI P, ROUDIER Y, et al. Password strength: an empirical analysis[C]//Proceedings of 2010 IEEE INFOCOM. San Diego, USA, 2010: 1–9. [7] GRAVES A. Generating sequences with recurrent neural networks[J]. Computer science, arXiv: 1308. 0850, 2013. [8] SUTSKEVER I, MARTENS J, HINTON G E, et al. Generating text with recurrent neural networks[C]//Proceedings of the 28th International Conference on Machine Learning. Bellevue, USA, 2011: 1017–1024. [9] Using neural networks for password cracking[OL/EB]. [2017-10-15]. https://0day.work/using-neural-networksfor-password-cracking/. [10] HITAJ B, GASTI P, ATENIESE G, et al. PassGAN: a deep learning approach for password guessing[J]. arXiv: 1709.00440, 2017. [11] GOODFELLOW I J, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial nets[C]//Proceedings of the 27th International Conference on Neural Information Processing Systems. Montreal, Canada, 2014: 2672–2680. [12] MELICHER W, UR B, SEGRETI S M, et al. Fast, lean, and accurate: modeling password guessability using neural networks[C]//Proceedings of the 23rd USENIX Secur- [13] ity Symposium. Austin, USA, 2016: 175–191. HOCHREITER S, SCHMIDHUBER J. Long short-term memory[J]. Neural computation, 1997, 9(8): 1735–1780. [14] CHUNG J, GULCEHRE C, CHO K, et al. Empirical evaluation of gated recurrent neural networks on sequence modeling[J]. arXiv: 1412.3555, 2014. [15] KOLEN J, KREMER S. Gradient flow in recurrent nets: the difficulty of learning LongTerm dependencies[M]. [S.l.]: Wiley-IEEE Press, 2001. [16] BENGIO Y, SIMARD P, FRASCONI P. Learning longterm dependencies with gradient descent is difficult[J]. IEEE transactions on neural networks, 1994, 5(2): 157–166. [17] ROCKYOU[OL/EB]. [2017-10-13]. http://downloads. skullsecurity.org/passwords/rockyou.txt.bz2. [18] YAHOO. Hackers expose 453, 000 credentials allegedly taken from Yahoo service (Updated)[EB/OL]. [2012-07- 12]. http://arstechnica.com/security/2012/07/yahoo-service-hacked/. [19] MYSPACE. Information of 427 million MySpace accounts leaked, selling as a package at the price of 2800 dollars in black market[EB/OL]. [2016-06-08]. https:// www.wosign.com/english/News/myspace.html. [20] 作者简介: 滕南君,男,1992 年生,硕士研究 生,主要研究方向为数字信号处理、机 器学习。 鲁华祥,男,1965 年生,研究员, 博士生导师,主要研究方向为类神经 计算芯片、类脑神经计算技术和应用 系统、信息与信号处理。 金敏,女,1985 年生,助理研究 员,主要研究方向为智能计算、模式识 别与高性能计算。 ·896· 智 能 系 统 学 报 第 13 卷