Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

zxcvbn:{Low-Budget} password strength estimation

DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

A comprehensive comparison of multiparty secure additions with differential privacy

S Goryczka, L **ong - IEEE transactions on dependable and …, 2015 - ieeexplore.ieee.org
This paper considers the problem of secure data aggregation (mainly summation) in a
distributed setting, while ensuring differential privacy of the result. We study secure …

OMEN: Faster password guessing using an ordered markov enumerator

M Dürmuth, F Angelstorf, C Castelluccia… - … Secure Software and …, 2015 - Springer
Passwords are widely used for user authentication, and will likely remain in use in the
foreseeable future, despite several weaknesses. One important weakness is that human …

Code coverage and test suite effectiveness: Empirical study with real bugs in large systems

PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program
code as it evolves over time. With the increasing size and complexity of software, adequate …

A study of personal information in human-chosen passwords and its security implications

Y Li, H Wang, K Sun - IEEE INFOCOM 2016-The 35th Annual …, 2016 - ieeexplore.ieee.org
Though not recommended, Internet users often include parts of personal information in their
passwords for easy memorization. However, the use of personal information in passwords …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …