메뉴 건너뛰기




Volumn , Issue , 2012, Pages 538-552

The science of guessing: Analyzing an anonymized corpus of 70 million passwords

Author keywords

authentication; computer security; data mining; information theory; statistics

Indexed keywords

DATA MINING; FISHERIES; INFORMATION THEORY; POPULATION STATISTICS; SAMPLING;

EID: 84878356177     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.49     Document Type: Conference Paper
Times cited : (595)

References (50)
  • 2
    • 0016081584 scopus 로고
    • Protection and the Control of Information Sharing in Multics
    • J. H. Saltzer, "Protection and the Control of Information Sharing in Multics," Commun. ACM, vol. 17, pp. 388-402, 1974.
    • (1974) Commun. ACM , vol.17 , pp. 388-402
    • Saltzer, J.H.1
  • 3
    • 0018543411 scopus 로고
    • Password Security: A Case History
    • R. Morris and K. Thompson, "Password Security: A Case History," Commun. ACM, vol. 22, no. 11, pp. 594-597, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 6
    • 77955329590 scopus 로고    scopus 로고
    • December [Online]. Available
    • B. Schneier, "Real-World Passwords," December 2006. [Online]. Available: www.schneier.com/blog/archives/2006/12/realworld-passw.html
    • (2006) Real-World Passwords
    • Schneier, B.1
  • 9
    • 0024683697 scopus 로고
    • Password Cracking: A Game of Wits
    • D. Seeley, "Password Cracking: A Game of Wits," Commun. ACM, vol. 32, pp. 700-703, 1989.
    • (1989) Commun. ACM , vol.32 , pp. 700-703
    • Seeley, D.1
  • 10
    • 84877943706 scopus 로고    scopus 로고
    • "John the Ripper," http://www.openwall.com/john/.
    • John the Ripper
  • 14
    • 85001728633 scopus 로고    scopus 로고
    • Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times
    • J. A. Cazier and B. D. Medlin, "Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times." Information Systems Security, vol. 15, no. 6, pp. 45-55, 2006.
    • (2006) Information Systems Security , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, B.D.2
  • 15
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • B. L. Riddle, M. S. Miron, and J. A. Semo, "Passwords in use in a university timesharing environment," Computers and Security, vol. 8, no. 7, pp. 569-578, 1989.
    • (1989) Computers and Security , vol.8 , Issue.7 , pp. 569-578
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 26
    • 84940644968 scopus 로고
    • A Mathematical Theory of Communication
    • C. E. Shannon, "A Mathematical Theory of Communication," in Bell System Technical Journal, vol. 7, 1948, pp. 379-423.
    • (1948) Bell System Technical Journal , vol.7 , pp. 379-423
    • Shannon, C.E.1
  • 28
    • 35048812577 scopus 로고    scopus 로고
    • On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
    • J. O. Pliam, "On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks," in Progress in Cryptology-INDOCRYPT 2000, 2000.
    • (2000) Progress in Cryptology-INDOCRYPT 2000
    • Pliam, J.O.1
  • 29
    • 77955315457 scopus 로고    scopus 로고
    • Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep. 6
    • S. Boztas, "Entropies, Guessing, and Cryptography," Department of Mathematics, Royal Melbourne Institute of Technology, Tech. Rep. 6, 1999.
    • (1999) Entropies, Guessing, and Cryptography
    • Boztas, S.1
  • 32
    • 84980082105 scopus 로고
    • Transmission of Information
    • R. V. Hartley, "Transmission of Information," Bell System Technical Journal, vol. 7, no. 3, pp. 535-563, 1928.
    • (1928) Bell System Technical Journal , vol.7 , Issue.3 , pp. 535-563
    • Hartley, R.V.1
  • 35
    • 2342553334 scopus 로고    scopus 로고
    • "Ten strikes and you're out": Increasing the number of login attempts can improve password usability
    • John Wiley
    • S. Brostoff and A. Sasse, ""Ten strikes and you're out": Increasing the number of login attempts can improve password usability," in Proceedings of CHI 2003 Workshop on HCI and Security Systems. John Wiley, 2003.
    • (2003) Proceedings of CHI 2003 Workshop on HCI and Security Systems
    • Brostoff, S.1    Sasse, A.2
  • 44
    • 65549085067 scopus 로고    scopus 로고
    • Power-Law Distributions in Empirical Data
    • A. Clauset, C. R. Shalizi, and M. E. J. Newman, "Power-Law Distributions in Empirical Data," SIAM Rev., vol. 51, pp. 661-703, 2009.
    • (2009) SIAM Rev. , vol.51 , pp. 661-703
    • Clauset, A.1    Shalizi, C.R.2    Newman, M.E.J.3
  • 48
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
    • S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, "PassPoints: design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies, vol. 63, pp. 102-127, 2005. (Pubitemid 40753495)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.