Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

On the accuracy of password strength meters

M Golla, M Dürmuth - Proceedings of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Improving password guessing via representation learning

D Pasquini, A Gangwal, G Ateniese… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Learning useful representations from unstructured data is one of the core challenges, as
well as a driving force, of modern data-driven approaches. Deep learning has demonstrated …

This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

Priming through persuasion: Towards secure password behavior

R Paudel, MN Al-Ameen - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
Users tend to create weak passwords even for the important accounts. The prior research
shed light on user's insecure password behavior, and why the interventions, including …

[HTML][HTML] Decoding developer password patterns: A comparative analysis of password extraction and selection practices

N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …