메뉴 건너뛰기




Volumn , Issue , 2009, Pages 391-405

Password cracking using probabilistic context-free grammars

Author keywords

Computer crime; Computer security; Data security

Indexed keywords

COMPUTER SECURITY; DATA SECURITY; PASSWORD CRACKING; PROBABILISTIC CONTEXT FREE GRAMMARS; PROBABILITY ORDER; TOOLS AND TECHNIQUES; TRAINING SETS;

EID: 70449688216     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.8     Document Type: Conference Paper
Times cited : (467)

References (16)
  • 1
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way functions much harder to crack
    • Elsevier
    • U. Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers & Security Journal, Volume 15, Issue 2, 1996, Pages 171-176. Elsevier.
    • (1996) Computers & Security Journal , vol.15 , Issue.2 , pp. 171-176
    • Manber, U.1
  • 4
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • Elsevier
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security Journal, Volume 14, Issue 3, 1995, Pages 233-249. Elsevier.
    • (1995) Computers & Security Journal , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 7
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • M. Hellman. A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, Volume 26, Issue 4, pages 401-406, 1980.
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.4 , pp. 401-406
    • Hellman, M.1
  • 9
    • 78649991520 scopus 로고    scopus 로고
    • [Online Document] [cited 2008 Oct 07] Available HTTP
    • A list of popular password cracking wordlists, 2005, [Online Document] [cited 2008 Oct 07] Available HTTP http://www.outpost9.com/files/WordLists.html.
    • (2005) A List of Popular Password Cracking Wordlists
  • 10
    • 33745788833 scopus 로고    scopus 로고
    • Fast dictionary attacks on passwords using time-space tradeoff
    • November 7-11, Alexandria, Virginia
    • A. Narayanan and V. Shmatikov, Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff, CCS'05, November 7-11, 2005, Alexandria, Virginia.
    • (2005) CCS'05
    • Narayanan, A.1    Shmatikov, V.2
  • 11
    • 84872105856 scopus 로고    scopus 로고
    • [Online Document] [cited, Oct 07] Available HTTP
    • John the Ripper password cracker, [Online Document] [cited 2008 Oct 07] Available HTTP http://www.openwall.com.
    • (2008) John the Ripper Password Cracker
  • 13
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • February
    • L. R. Rabiner, A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition, Proceedings of the IEEE, Volume 77, No. 2, February 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2
    • Rabiner, L.R.1
  • 14
    • 0004449398 scopus 로고
    • Three models for the description of language
    • Sep
    • N. Chomsky. Three models for the description of language. Information Theory, IEEE Transactions on, 2(3):113-124, Sep 1956.
    • (1956) Information Theory, IEEE Transactions , vol.2 , Issue.3 , pp. 113-124
    • Chomsky, N.1
  • 15
    • 70449694703 scopus 로고    scopus 로고
    • [Online Document] [cited 2008 Oct 07] Available HTTP
    • Robert McMillan, Phishing attack targets Myspace users, 2006, [Online Document] [cited 2008 Oct 07] Available HTTP http://www.infoworld.com/infoworld/ article/06/10/27/HNphishingmyspace1.html.
    • (2006) Phishing Attack Targets Myspace Users
    • Mcmillan, R.1
  • 16
    • 70449648965 scopus 로고    scopus 로고
    • October, [Online Document] [cited 2008 Oct 07] Available HTTP
    • Bulletin Board Announcement of the Finnish Password List, October 2007, [Online Document] [cited 2008 Oct 07] Available HTTP http://www.bat.org/news/ view-post?postid=40546&page=1&group.
    • (2007) Bulletin Board Announcement of the Finnish Password List


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.