Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Passgan: A deep learning approach for password guessing

B Hitaj, P Gasti, G Ateniese, F Perez-Cruz - Applied Cryptography and …, 2019 - Springer
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …

Label-only model inversion attacks: Attack with the least information

T Zhu, D Ye, S Zhou, B Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In a model inversion attack, an adversary attempts to reconstruct the training data records of
a target model using only the model's output. In launching a contemporary model inversion …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Password guessing using random forest

D Wang, Y Zou, Z Zhang, K **u - 32nd USENIX Security Symposium …, 2023 - usenix.org
Passwords are the most widely used authentication method, and guessing attacks are the
most effective method for password strength evaluation. However, existing password …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …