On the accuracy of password strength meters

M Golla, M Dürmuth - Proceedings of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

“Taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …

Reasoning analytically about password-cracking software

E Liu, A Nakanishi, M Golla, D Cash… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
A rich literature has presented efficient techniques for estimating password strength by
modeling password-cracking algorithms. Unfortunately, these previous techniques only …

The annoying, the disturbing, and the weird: challenges with phone numbers as identifiers and phone number recycling

A McDonald, C Sugatan, T Guberek… - Proceedings of the 2021 …, 2021 - dl.acm.org
Phone numbers are intimately connected to our digital lives. People are increasingly
required to disclose their phone number in digital spaces, both commercial and personal …

A large-scale analysis of the semantic password model and linguistic patterns in passwords

R Veras, C Collins, J Thorpe - ACM Transactions on Privacy and …, 2021 - dl.acm.org
In this article, we present a thorough evaluation of semantic password grammars. We report
multifactorial experiments that test the impact of sample size, probability smoothing, and …

Investigating the Password Policy Practices of Website Administrators

S Sahin, S Al Roomi, T Poteat… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Passwords are the de facto standard for online authentication today, and will likely remain
so for the foreseeable future. As a consequence, the security community has extensively …

[HTML][HTML] Secret sharing in online communities: A comparative analysis of offender and non-offender password creation strategies

A Bergeron, TE Dearden - Journal of Economic Criminology, 2024 - Elsevier
Even though several authentication methods exist, passwords remain the most common
type of authentication. Researchers have demonstrated the influence of a person's …

From the quest to replace passwords towards supporting secure and usable password creation

V Zimmermann - 2021 - tuprints.ulb.tu-darmstadt.de
Authentication is an important measure for protecting personal and sensitive information
from unauthorised access. Password authentication still is the most widely used form of …

A Survey on Password Guessing

L Tran, T Nguyen, C Seo, H Kim, D Choi - arxiv preprint arxiv:2212.08796, 2022 - arxiv.org
Text password has served as the most popular method for user authentication so far, and is
not likely to be totally replaced in foreseeable future. Password authentication offers several …