Force script
In fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
The types of chips that provide computing power for AI include GPU, FPGA and ASIC
GPU is a kind of microprocessor specialized in image operation on personal computers, workstations, game machines and some mobile devices (such as tablet computers, smart phones, etc.). It is similar to Cu, except that GPU is designed to perform complex mathematical and geometric calculations, which are necessary for graphics rendering
FPGA can complete any digital device function chip, even high-performance CPU can be implemented with FPGA. In 2015, Intel acquired the FPGA long alter head with us $16.1 billion. One of its purposes is to focus on the development of FPGA's special computing power in the field of artificial intelligence in the future
ASIC refers to the integrated circuits designed and manufactured according to the requirements of specific users or the needs of specific electronic systems. Strictly speaking, ASIC is a special chip, which is different from the traditional general chip. It's a chip specially designed for a specific need. The TPU that Google recently exposed for AI deep learning computing is also an ASIC
extended data:
chips are also called integrated circuits. According to different functions, they can be divided into many kinds, including those responsible for power supply voltage output control, audio and video processing, and complex operation processing. The algorithm can only run with the help of chips, and because each chip has different computing power in different scenarios, the processing speed and energy consumption of the algorithm are also different. Today, with the rapid development of the artificial intelligence market, people are looking for chips that can make the deep learning algorithm perform faster and with lower energy consumption
for application, you can pay attention to their VW public computing cat. There should be a tutorial in it, and you can also consult their customer service. Someone can help you solve the problem online
but do you think the miner will come to support the calculation
it seems that all mining machines have GPU acceleration, which is certainly helpful for Computing ~
once compared with single CPU and GPU + CPU computing, GPU brushing is completed, but the fever is severe
the first level is source code level confusion. Use AST and Astor, and then write a confusion device by yourself. Three or five hundred lines of script can be directly confused to tens of thousands of lines, and the whole file is beyond recognition. Basically, you can do it even if you directly put the script to you, Unless you write a script to reverse the previous obfuscation algorithm (it takes a few days when you are familiar with Python, not to mention the principle of program construction), it is almost impossible to debug the script manually (the call time is multiplied by 2)
the second level is personalized pyinstall, which will package all the required libraries, The script is also included in the packaged exe. However, pyinstaler has a stub, which is equivalent to an initiator. The initiator needs to decrypt the script and import the mole. There is a tool to directly export the script. However, it is designed for the starter of pyinstaler. You can completely modify the initiator and compile it yourself, In this way, the reverser must manually debug to find the main mole. With the first level encryption, ha ha, even the top reverse experts in China need to spend a week or two to crack our program logic. As far as I know, there is not much reverse research on py program in China
the third level is the next level, which translates py into C and then directly compiles C into DLL. With the first stage of obfuscation, then C is converted to compile. After the first stage of obfuscation, a lot of garbage (middle layer) functions will be generated. These middle layer functions will be called each other with py interpreter in C, and the script and binary will cross run, It's very difficult to recover the source code after it's confused. It's hard to mix this layer again if you want to reverse it
the fourth level is to make use of the dynamic characteristics of py. The vast majority of reversers are C. they come from assembly. The first intuition of a program is that a program is one instruction after another, and the latter instruction must be behind this instruction. However, the dynamic characteristics of Py can make the code logic not be in the program at all, It involves deep encryption in one of my projects
the fifth level is mathematics. Those who have understood the principle of bitcoin know that if they want to dig bitcoin, they have to provide a lot of computing power to help the network calculate hash. This is called pow. Now that py has been adopted, it is estimated that too much CPU utilization is not taken into account. Then pow (and other means) can be used to ensure that the program has a lot of computing power when it runs. If the program is debugged step by step, ha ha, You can't run out a few hashes in a second and directly pull the Black IP (this statement may be more difficult to understand, because I didn't explain layer 4 encryption, but it means to refuse to execute)
