On the economics of offline password cracking

J Blocki, B Harsha, S Zhou - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

T/key: Second-factor authentication from secure hash chains

D Kogan, N Manohar, D Boneh - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Time-based one-time password (TOTP) systems in use today require storing secrets on both
the client and the server. As a result, an attack on the server can expose all second factors …

An empirical study of mnemonic sentence-based password generation strategies

W Yang, N Li, O Chowdhury, A **ong… - Proceedings of the 2016 …, 2016 - dl.acm.org
Mnemonic strategy has been recommended to help users generate secure and memorable
passwords. We evaluated the security of 6 mnemonic strategy variants in a series of online …

Spaced repetition and mnemonics enable recall of multiple strong passwords

J Blocki, S Komanduri, L Cranor, A Datta - arxiv preprint arxiv:1410.1490, 2014 - arxiv.org
We report on a user study that provides evidence that spaced repetition and a specific
mnemonic technique enable users to successfully recall multiple strong passwords over …

Method and system of providing a picture password proof of knowledge as a web service

RH Thibadeau, JD Donnell - US Patent 9,813,411, 2017 - Google Patents
6, 249, 868 B16/2001 Sherman et al. 6, 411, 283 B1 6/2002 Murphy 6, 658, 328 B1 12/2003
Alrabady et al. 6, 934, 860 B1 8/2005 Goldstein 6, 983, 065 B1 1/2006 Akgul et al. 7, 243 …

CASH: A cost asymmetric secure hash algorithm for optimal password protection

J Blocki, A Datta - 2016 IEEE 29th Computer Security …, 2016 - ieeexplore.ieee.org
An adversary who has obtained the cryptographic hash of a user's password can mount an
offline attack to crack the password by comparing this hash value with the cryptographic …

Changing users' security behaviour towards security questions: A game based learning approach

N Micallef, NAG Arachchilage - 2017 Military Communications …, 2017 - ieeexplore.ieee.org
Fallback authentication is used to retrieve forgotten passwords. Security questions are one
of the main techniques used to conduct fallback authentication. In this paper, we propose a …

A Gamified Approach to Improve Users' Memorability of Fall-back Authentication.

N Micallef, NAG Arachchilage - SOUPS, 2017 - usenix.org
Security questions are one of the techniques used in fall-back authentication to retrieve
forgotten passwords. This paper proposes a game design which aims to improve usability of …

Publishable humanly usable secure password creation schemas

M Blum, S Vempala - Proceedings of the AAAI Conference on Human …, 2015 - ojs.aaai.org
What can a human compute in his/her head that a powerful adversary cannot infer? To
answer this question, we define a model of human computation and a measure of security …