메뉴 건너뛰기




Volumn , Issue , 2012, Pages 523-537

Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms

Author keywords

authentication; passwords; user study

Indexed keywords

CRACKS; HEURISTIC ALGORITHMS; HEURISTIC METHODS; NETWORK SECURITY;

EID: 84865012140     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.38     Document Type: Conference Paper
Times cited : (384)

References (51)
  • 3
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein, "Improving system security via proactive password checking," Computers & Security, vol. 14, no. 3, pp. 233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 8
    • 35248846782 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • S. Gaw and E. W. Felten, "Password management strategies for online accounts," in Proc. SOUPS, 2006.
    • Proc. SOUPS, 2006
    • Gaw, S.1    Felten, E.W.2
  • 13
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • M. Weir, S. Aggarwal, M. Collins, and H. Stern, "Testing metrics for password creation policies by attacking large sets of revealed passwords," in Proc. CCS, 2010.
    • Proc. CCS, 2010
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 16
    • 79960392344 scopus 로고    scopus 로고
    • Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data?
    • M. Buhrmester, T. Kwang, and S. D. Gosling, "Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data?" Perspectives on Psychological Science, vol. 6, no. 1, pp. 3-5, 2011.
    • (2011) Perspectives on Psychological Science , vol.6 , Issue.1 , pp. 3-5
    • Buhrmester, M.1    Kwang, T.2    Gosling, S.D.3
  • 17
  • 18
    • 67650081604 scopus 로고    scopus 로고
    • Crowdsourcing user studies with Mechanical Turk
    • A. Kittur, E. H. Chi, and B. Suh, "Crowdsourcing user studies with Mechanical Turk," in Proc. CHI, 2008.
    • Proc. CHI, 2008
    • Kittur, A.1    Chi, E.H.2    Suh, B.3
  • 19
    • 84878363047 scopus 로고    scopus 로고
    • Utility of human-computer interactions: Toward a science of preference measurement
    • M. Toomim, T. Kriplean, C. Pörtner, and J. Landay, "Utility of human-computer interactions: toward a science of preference measurement," in Proc. CHI, 2011.
    • Proc. CHI, 2011
    • Toomim, M.1    Kriplean, T.2    Pörtner, C.3    Landay, J.4
  • 24
    • 78650009077 scopus 로고    scopus 로고
    • If your password is 123456, just make it hackme
    • January
    • A. Vance, "If your password is 123456, just make it hackme," New York Times, http://nyti.ms/w8NNwD, January 2010.
    • (2010) New York Times
    • Vance, A.1
  • 26
    • 70350206950 scopus 로고    scopus 로고
    • Attitudes and practices of students towards password security
    • D. Hart, "Attitudes and practices of students towards password security," Journal of Computing Sciences in Colleges, vol. 23, no. 5, pp. 169-174, 2008.
    • (2008) Journal of Computing Sciences in Colleges , vol.23 , Issue.5 , pp. 169-174
    • Hart, D.1
  • 27
    • 33745788833 scopus 로고    scopus 로고
    • Fast dictionary attacks on passwords using time-space tradeoff
    • A. Narayanan and V. Shmatikov, "Fast dictionary attacks on passwords using time-space tradeoff," in Proc. CCS, 2005.
    • Proc. CCS, 2005
    • Narayanan, A.1    Shmatikov, V.2
  • 28
    • 0033277446 scopus 로고    scopus 로고
    • Password security: An empirical study
    • M. Zviran and W. J. Haga, "Password security: an empirical study," J. Mgt. Info. Sys., vol. 15, no. 4, 1999.
    • (1999) J. Mgt. Info. Sys. , vol.15 , Issue.4
    • Zviran, M.1    Haga, W.J.2
  • 30
    • 84856150067 scopus 로고    scopus 로고
    • What's in a name? Evaluating statistical attacks on personal knowledge questions
    • J. Bonneau, M. Just, and G. Matthews, "What's in a name? Evaluating statistical attacks on personal knowledge questions," in Proc. Financial Crypto. 2010, 2010.
    • (2010) Proc. Financial Crypto. 2010
    • Bonneau, J.1    Just, M.2    Matthews, G.3
  • 31
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, and M. K. Reiter, "The security of modern password expiration: an algorithmic framework and empirical analysis," in Proc. CCS, 2010.
    • Proc. CCS, 2010
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3
  • 33
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • A. Adams, M. A. Sasse, and P. Lunt, "Making passwords secure and usable," in HCI 97, 1997.
    • (1997) HCI 97
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 34
    • 77953963809 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • P. Inglesant and M. A. Sasse, "The true cost of unusable password policies: password use in the wild," in Proc. ACM CHI'10, 2010, pp. 383-392.
    • Proc. ACM CHI'10, 2010 , pp. 383-392
    • Inglesant, P.1    Sasse, M.A.2
  • 36
    • 68449088124 scopus 로고    scopus 로고
    • A comprehensive simulation tool for the analysis of password policies
    • R. Shay and E. Bertino, "A comprehensive simulation tool for the analysis of password policies," Int. J. Info. Sec., vol. 8, no. 4, pp. 275-289, 2009.
    • (2009) Int. J. Info. Sec. , vol.8 , Issue.4 , pp. 275-289
    • Shay, R.1    Bertino, E.2
  • 39
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • S. Schechter, C. Herley, and M. Mitzenmacher, "Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks," in Proc. HotSec'10, 2010.
    • Proc. HotSec'10, 2010
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3
  • 40
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, 1949.
    • (1949) Bell Syst. Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 43
    • 38849143105 scopus 로고    scopus 로고
    • Advances in password cracking
    • S. Marechal, "Advances in password cracking," Journal in Computer Virology, vol. 4, no. 1, pp. 73-81, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.1 , pp. 73-81
    • Marechal, S.1
  • 49
    • 85030321143 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," in Proc. OSDI, 2004.
    • Proc. OSDI, 2004
    • Dean, J.1    Ghemawat, S.2
  • 50
    • 84944486544 scopus 로고
    • Prediction and entropy of printed english
    • C. E. Shannon, "Prediction and entropy of printed english," Bell Systems Tech. J., vol. 30, 1951.
    • (1951) Bell Systems Tech. J. , vol.30
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.