Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2025, Vol. 51 ›› Issue (11): 22-34. doi: 10.19678/j.issn.1000-3428.0069794

• Research Hotspots and Reviews • Previous Articles    

Optimization Method of Credential Tweaking Attack Based on User Identity Information

YU Jitao, CHENG Luwei, HAN Weili   

  1. School of Computer Science, Fudan University, Shanghai 200433, China
  • Received:2024-04-28 Revised:2024-06-13 Published:2024-08-20

基于用户身份信息的凭证调整攻击优化方法

俞继涛, 程路维, 韩伟力   

  1. 复旦大学计算机科学技术学院, 上海 200433
  • 通讯作者: 俞继涛,E-mail:21210240046@m.fudan.edu.cn E-mail:21210240046@m.fudan.edu.cn
  • 基金资助:
    国家自然科学基金(62172100)。

Abstract: Password leakage incidents often involve the leakage of user passwords and identity information. Because users are accustomed to reusing passwords across multiple network services, attackers can tweak leaked passwords to accurately attack user accounts. This is called a credential tweaking attack. By analyzing large-scale leaked passwords and the corresponding user identity information, this study finds that user strategies for creating passwords are often associated with user identity information. However, current research on credential tweaking attacks relies only on leaked password structures and ignores leaked user identity information when predicting password tweaking strategies. To improve the accuracy of credential tweaking attacks, this study designs a credential tweaking attack optimization method based on user identity information. In the preprocessing phase, username and regional information is extracted from the user identity information and the probability of users' different password creation strategies in different regions is statistically calculated. In the training phase, regional information is combined to learn users' character-level editing operations on leaked passwords. In the password generation phase, a password generation method that integrates character-level editing operations, structure-level editing operations, and username information is designed. The experimental results show that in an attack with 103 guesses, the cracking rate of this method has a maximum improvement of 41.8% compared to the existing best method (PassBERT), highlighting the threat posed by credential tweaking attacks based on user identity information to password security.

Key words: password security, credential tweaking attack, targeted password guessing, user identity information, password reusing

摘要: 口令泄露事件常常涉及用户口令和用户身份信息的泄露。由于用户在多个网络服务中习惯于重用口令,这使得攻击者能够通过调整泄露的口令来针对性地攻击用户的账户,称为凭证调整攻击。通过分析大规模的泄露口令和相应的用户身份信息,发现用户创建口令的策略往往与用户身份信息相关联。然而,目前关于凭证调整攻击的研究在预测用户调整口令的策略时仅依据泄露口令的结构,而忽略了泄露的用户身份信息。为了提升凭证调整攻击的准确性,设计了一种基于用户身份信息的凭证调整攻击优化方法。在预处理阶段,从用户身份信息中提取用户名信息和地域信息,按照地域统计用户选择不同口令创建策略的概率。在训练阶段,结合地域信息学习用户在泄露口令上采取的字符级编辑操作。在口令生成阶段,设计了一种综合字符级编辑操作、结构级编辑操作和用户名信息的口令生成方法。实验结果表明,在猜测次数为103的攻击中,该方法的命中率和现有最优的方法(PassBERT)相比最高提升了41.8%,说明利用用户身份信息能扩大凭证调整攻击对口令安全带来的威胁。

关键词: 口令安全, 凭证调整攻击, 定向口令猜测, 用户身份信息, 口令重用

CLC Number: