Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

Improving real-world password guessing attacks via bi-directional transformers

M Xu, J Yu, X Zhang, C Wang, S Zhang, H Wu… - 32nd USENIX Security …, 2023 - usenix.org
Password guessing attacks, prevalent issues in the real world, can be conceptualized as
efforts to approximate the probability distribution of text tokens. Techniques in the natural …

Chemical unclonable functions based on operable random DNA pools

AM Luescher, AL Gimpel, WJ Stark, R Heckel… - Nature …, 2024 - nature.com
Physical unclonable functions (PUFs) based on unique tokens generated by random
manufacturing processes have been proposed as an alternative to mathematical one-way …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

Passgpt: Password modeling and (guided) generation with large language models

J Rando, F Perez-Cruz, B Hitaj - European Symposium on Research in …, 2023 - Springer
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

Reducing bias in modeling real-world password strength via deep learning and dynamic dictionaries

D Pasquini, M Cianfriglia, G Ateniese… - 30th USENIX Security …, 2021 - usenix.org
Password security hinges on an in-depth understanding of the techniques adopted by
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …

Honeyword-based authentication techniques for protecting passwords: A survey

N Chakraborty, J Li, VCM Leung, S Mondal… - ACM Computing …, 2022 - dl.acm.org
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …

GuessFuse: Hybrid Password Guessing with Multi-View

Z **e, F Shi, M Zhang, H Ma, H Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Password guessing is a primary method for password strength evaluation. Despite various
password guessing models have been proposed, there is still a significant gap between …