메뉴 건너뛰기




Volumn , Issue , 2013, Pages 145-159

Honeywords: Making password-cracking detectable

Author keywords

authentication; chaffing; honeywords; login; password cracking; password hashes; passwords

Indexed keywords

CHAFFING; HONEYWORDS; LOGIN; PASSWORD CRACKING; PASSWORD HASHES; PASSWORDS;

EID: 84888997573     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516671     Document Type: Conference Paper
Times cited : (249)

References (43)
  • 1
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • August
    • A. Evans, Jr., W. Kantrowitz, and E. Weiss. A user authentication scheme not requiring secrecy in the computer. Commun. ACM, 17(8):437-442, August 1974.
    • (1974) Commun. ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans Jr., A.1    Kantrowitz, W.2    Weiss, E.3
  • 2
    • 0028446389 scopus 로고
    • On fortifying key negotiation schemes with poorly chosen passwords
    • R. J. Anderson and T.M.A. Lomas. On fortifying key negotiation schemes with poorly chosen passwords. Electronics Letters, 30(13):1040-1041, 1994.
    • (1994) Electronics Letters , vol.30 , Issue.13 , pp. 1040-1041
    • Anderson, R.J.1    Lomas, T.M.A.2
  • 6
    • 78049362318 scopus 로고    scopus 로고
    • Kamouflage: Loss-resistant password management
    • H. Bojinov, E. Bursztein, X. Boyen, and D. Boneh. Kamouflage: loss-resistant password management. In ESORICS, pages 286-302, 2010.
    • (2010) ESORICS , pp. 286-302
    • Bojinov, H.1    Bursztein, E.2    Boyen, X.3    Boneh, D.4
  • 8
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • J. Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, pages 538-552, 2012.
    • (2012) IEEE Symposium on Security and Privacy , pp. 538-552
    • Bonneau, J.1
  • 11
    • 33646717563 scopus 로고    scopus 로고
    • A new two-server approach for authentication with short secrets
    • J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. A new two-server approach for authentication with short secrets. In USENIX Security, pages 201-214, 2003.
    • (2003) USENIX Security , pp. 201-214
    • Brainard, J.1    Juels, A.2    Kaliski, B.3    Szydlo, M.4
  • 12
    • 84869417078 scopus 로고    scopus 로고
    • Practical yet universally composable two-server password-authenticated secret sharing
    • J. Camenisch, A. Lysyanskaya, and G. Neven. Practical yet universally composable two-server password-authenticated secret sharing. In ACM CCS, pages 525-536, 2012.
    • (2012) ACM CCS , pp. 525-536
    • Camenisch, J.1    Lysyanskaya, A.2    Neven, G.3
  • 13
    • 84873691773 scopus 로고    scopus 로고
    • Rethinking passwords
    • Feb.
    • William Cheswick. Rethinking passwords. Comm. ACM, 56(2):40-44, Feb. 2013.
    • (2013) Comm. ACM , vol.56 , Issue.2 , pp. 40-44
    • Cheswick, W.1
  • 14
    • 77952108748 scopus 로고    scopus 로고
    • The use of deception techniques: Honeypots and decoys
    • H. Bidgoli, editor, Wiley and Sons
    • F. Cohen. The use of deception techniques: Honeypots and decoys. In H. Bidgoli, editor, Handbook of Information Security, volume 3, pages 646-655. Wiley and Sons, 2006.
    • (2006) Handbook of Information Security , vol.3 , pp. 646-655
    • Cohen, F.1
  • 15
    • 84888986727 scopus 로고    scopus 로고
    • EMC Corp.
    • EMC Corp. RSA Distributed Credential Protection. http://www.emc.com/ security/rsa-distributed-credential-protection.htm, 2013.
    • (2013) RSA Distributed Credential Protection.
  • 16
    • 84869430752 scopus 로고    scopus 로고
    • Strengthening user authentication through opportunistic cryptographic identity assertions
    • A. Czeskis, M. Dietz, T. Kohno, D. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In ACM CCS, pages 404-414, 2012.
    • (2012) ACM CCS , pp. 404-414
    • Czeskis, A.1    Dietz, M.2    Kohno, T.3    Wallach, D.4    Balfanz, D.5
  • 19
    • 84889004499 scopus 로고    scopus 로고
    • LinkedIn, Last.Fm, now Yahoo? Don't ignore news of a password breach
    • 13 July
    • C. Gaylord. LinkedIn, Last.fm, now Yahoo? don't ignore news of a password breach. Christian Science Monitor, 13 July 2012.
    • (2012) Christian Science Monitor
    • Gaylord, C.1
  • 20
    • 84889051838 scopus 로고    scopus 로고
    • 50 million compromised in Evernote hack
    • 4 March
    • D. Gross. 50 million compromised in Evernote hack. CNN, 4 March 2013.
    • (2013) CNN
    • Gross, D.1
  • 21
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley and P. Van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
    • (2012) IEEE Security & Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.2
  • 22
    • 84872105946 scopus 로고    scopus 로고
    • Building better passwords using probabilistic techniques
    • S. Houshmand and S. Aggarwal. Building better passwords using probabilistic techniques. In ACSAC, pages 109-118, 2012.
    • (2012) ACSAC , pp. 109-118
    • Houshmand, S.1    Aggarwal, S.2
  • 24
    • 84889050539 scopus 로고    scopus 로고
    • Innovator: Ramesh Kesanupalli's biometric passwords stored on devices
    • 28 March
    • O. Kharif. Innovator: Ramesh Kesanupalli's biometric passwords stored on devices. Bloomberg Businessweek, 28 March 2013.
    • (2013) Bloomberg Businessweek
    • Kharif, O.1
  • 25
    • 84888994336 scopus 로고    scopus 로고
    • Microsoft TechNet Library. Referenced March 2012 at
    • Microsoft TechNet Library. Password must meet complexity requirements. Referenced March 2012 at http://bit.ly/YAsGiZ.
    • Password Must Meet Complexity Requirements.
  • 26
    • 0018543411 scopus 로고
    • Password security: A case history
    • November
    • R. Morris and K. Thompson. Password security: a case history. Commun. ACM, 22(11):594-597, November 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 28
    • 84889054857 scopus 로고    scopus 로고
    • H.R. 624: The Cyber Intelligence Sharing and Protection Act of 2013
    • U.S. House of Representatives.
    • U.S. House of Representatives. H.R. 624: The Cyber Intelligence Sharing and Protection Act of 2013. 113th Cong., 2013.
    • (2013) 113th Cong
  • 29
    • 84888994121 scopus 로고    scopus 로고
    • LinkedIn admits site hack, adds pinch of salt to passwords
    • 7 June
    • B.-A. Parnell. LinkedIn admits site hack, adds pinch of salt to passwords. The Register, 7 June 2012.
    • (2012) The Register
    • Parnell, B.-A.1
  • 30
    • 84888999085 scopus 로고    scopus 로고
    • Update: LinkedIn confirms account passwords hacked
    • 6 June
    • I. Paul. Update: LinkedIn confirms account passwords hacked. PC World, 6 June 2012.
    • (2012) PC World
    • Paul, I.1
  • 32
    • 84902231625 scopus 로고    scopus 로고
    • Hackers in China attacked The Times for last 4 months
    • 31 January
    • N. Perlroth. Hackers in China attacked The Times for last 4 months. New York Times, page A1, 31 January 2013.
    • (2013) New York Times
    • Perlroth, N.1
  • 33
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • August
    • G. B. Purdy. A high security log-in procedure. Commun. ACM, 17(8):442-445, August 1974.
    • (1974) Commun. ACM , vol.17 , Issue.8 , pp. 442-445
    • Purdy, G.B.1
  • 34
    • 84889074953 scopus 로고    scopus 로고
    • Data and system security with failwords
    • U.S. Patent Application US2006/0161786A1, U.S. Patent Office, July 20
    • Shrisha Rao. Data and system security with failwords. U.S. Patent Application US2006/0161786A1, U.S. Patent Office, July 20, 2006. http://www.google.com/patents/US20060161786.
    • (2006)
    • Rao, S.1
  • 36
    • 70449688213 scopus 로고    scopus 로고
    • It's no secret. Measuring the security and reliability of authentication "secret" questions
    • S. Schechter, A. J. B. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication "secret" questions. In IEEE Symposium on Security and Privacy (SP), pages 375-390, 2009.
    • (2009) IEEE Symposium on Security and Privacy (SP) , pp. 375-390
    • Schechter, S.1    Brush, A.J.B.2    Egelman, S.3
  • 37
    • 85071080463 scopus 로고    scopus 로고
    • Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks
    • S. Schechter, C. Herley, and M. Mitzenmacher. Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. In USENIX HotSec, pages 1-8, 2010.
    • (2010) USENIX HotSec , pp. 1-8
    • Schechter, S.1    Herley, C.2    Mitzenmacher, M.3
  • 38
    • 0013197874 scopus 로고
    • Observations on reusable password choices
    • E. Spafford. Observations on reusable password choices. In USENIX Security, 1992.
    • (1992) USENIX Security
    • Spafford, E.1
  • 40
    • 84889075958 scopus 로고    scopus 로고
    • Why your next phone will include fingerprint, facial, and voice recognition
    • March
    • T. Wadhwa. Why your next phone will include fingerprint, facial, and voice recognition. Forbes, 29 March 2013.
    • (2013) Forbes , pp. 29
    • Wadhwa, T.1
  • 43
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, and M. K. Reiter. The security of modern password expiration: an algorithmic framework and empirical analysis. In ACM CCS, pages 176-186, 2010.
    • (2010) ACM CCS , pp. 176-186
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.