-
2
-
-
84889010365
-
The Gawker hack: How a million passwords were lost
-
December
-
BONNEAU, J. The Gawker hack: How a million passwords were lost. Light Blue Touchpaper Blog, December 2010. http://www.lightbluetouchpaper.org/2010/12/15/thegawker-hack-how-a-million-passwords-were-lost/.
-
(2010)
Light Blue Touchpaper Blog
-
-
Bonneau, J.1
-
3
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
BONNEAU, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symp. Security & Privacy (2012).
-
(2012)
Proc. IEEE Symp. Security & Privacy
-
-
Bonneau, J.1
-
4
-
-
85076288259
-
Statistical metrics for individual password strength
-
BONNEAU, J. Statistical metrics for individual password strength. In Proc. WPS (2012).
-
(2012)
Proc. WPS
-
-
Bonneau, J.1
-
5
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes
-
BONNEAU, J., HERLEY, C., VAN OORSCHOT, P. C., AND STAJANO, F. The quest to replace passwords: A framework for comparative evaluation of Web authentication schemes. In Proc. IEEE Symp. Security & Privacy (2012).
-
(2012)
Proc. IEEE Symp. Security & Privacy
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
6
-
-
84879755136
-
Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords
-
BONNEAU, J., AND XU, R. Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords. In Proc. W2SP (2012).
-
(2012)
Proc. W2SP
-
-
Bonneau, J.1
Xu, R.2
-
7
-
-
85014995774
-
10 (or so) of the worst passwords exposed by the LinkedIn hack
-
June
-
BRODKIN, J. 10 (or so) of the worst passwords exposed by the LinkedIn hack. Ars Technica, June 2012.
-
(2012)
Ars Technica
-
-
Brodkin, J.1
-
8
-
-
27544477471
-
-
Tech. rep., NIST
-
BURR, W. E., DODSON, D. F., AND POLK, W. T. Electronic authentication guideline. Tech. rep., NIST, 2006.
-
(2006)
Electronic Authentication Guideline
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
-
9
-
-
85013836600
-
-
CARNEGIE MELLON UNIVERSITY. Password guessability service. https://pgs.ece.cmu.edu, 2015.
-
(2015)
CARNEGIE MELLON UNIVERSITY
-
-
-
11
-
-
84877824862
-
Password cracking based on learned patterns from disclosed passwords
-
CHOU, H.-C., LEE, H.-C., YU, H.-J., LAI, F.-P., HUANG, K.H., AND HSUEH, C.-W. Password cracking based on learned patterns from disclosed passwords. IJICIC (2013).
-
(2013)
IJICIC
-
-
Chou, H.-C.1
Lee, H.-C.2
Yu, H.-J.3
Lai, F.-P.4
Huang, K.H.5
Hsueh, C.-W.6
-
13
-
-
85076317432
-
-
CURLYBOI. Hashtopus. http://hashtopus.nech.me/manual.html, 2009-.
-
(2009)
Hashtopus
-
-
-
14
-
-
85133463240
-
The tangled web of password reuse
-
DAS, A., BONNEAU, J., CAESAR, M., BORISOV, N., AND WANG, X. The tangled web of password reuse. In Proc. NDSS (2014).
-
(2014)
Proc. NDSS
-
-
Das, A.1
Bonneau, J.2
Caesar, M.3
Borisov, N.4
Wang, X.5
-
15
-
-
85104527602
-
From very weak to very strong: Analyzing password-strength meters
-
DE CARNÉ DE CARNAVALET, X., AND MANNAN, M. From very weak to very strong: Analyzing password-strength meters. In Proc. NDSS (2014).
-
(2014)
Proc. NDSS
-
-
De Carné De Carnavalet, X.1
Mannan, M.2
-
17
-
-
84891136737
-
Usage of botnets for high speed md5 hash cracking
-
DEV, J. A. Usage of botnets for high speed md5 hash cracking. In INTECH (2013).
-
(2013)
INTECH
-
-
Dev, J.A.1
-
18
-
-
84954156538
-
Omen: Faster password guessing using an ordered markov enumerator
-
DÜRMUTH, M., ANGELSTORF, F., CASTELLUCCIA, C., PERITO, D., AND CHAABANE, A. OMEN: Faster password guessing using an ordered markov enumerator. In Proc. ESSoS (2015).
-
(2015)
Proc. ESSoS
-
-
Dürmuth, M.1
Angelstorf, F.2
Castelluccia, C.3
Perito, D.4
Chaabane, A.5
-
19
-
-
84977833880
-
When privacy meets security: Leveraging personal information for password cracking
-
DÜRMUTH, M., CHAABANE, A., PERITO, D., AND CASTELLUCCIA, C. When privacy meets security: Leveraging personal information for password cracking. CoRR (2013).
-
(2013)
CoRR
-
-
Dürmuth, M.1
Chaabane, A.2
Perito, D.3
Castelluccia, C.4
-
20
-
-
84883103217
-
On the ecological validity of a password study
-
FAHL, S., HARBACH, M., ACAR, Y., AND SMITH, M. On The Ecological Validity of a Password Study. In Proc. SOUPS (2013).
-
(2013)
Proc. SOUPS
-
-
Fahl, S.1
Harbach, M.2
Acar, Y.3
Smith, M.4
-
21
-
-
65449177711
-
Improving text passwords through persuasion
-
FORGET, A., CHIASSON, S., VAN OORSCHOT, P., AND BIDDLE, R. Improving text passwords through persuasion. In Proc. SOUPS (2008).
-
(2008)
Proc. SOUPS
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.3
Biddle, R.4
-
23
-
-
84893121194
-
Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331
-
May
-
GOODIN, D. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”. Ars Technica, May 2013.
-
(2013)
Ars Technica
-
-
Goodin, D.1
-
24
-
-
84959277527
-
Thereisnofatebutwhatwemake”-turbo-charged cracking comes to long passwords
-
August
-
GOODIN, D. “thereisnofatebutwhatwemake”-turbo-charged cracking comes to long passwords. Ars Technica, August 2013.
-
(2013)
Ars Technica
-
-
Goodin, D.1
-
25
-
-
85076314190
-
Meet wordhound, the tool that puts a personal touch on password cracking
-
August
-
GOODIN, D. Meet wordhound, the tool that puts a personal touch on password cracking. Ars Technica, August 2014.
-
(2014)
Ars Technica
-
-
Goodin, D.1
-
26
-
-
47749103248
-
-
GOOGLE. Web 1T 5-gram version 1, 2006. http://www.ldc.upenn.edu/Catalog/CatalogEntry.jsp? catalogId=LDC2006T13.
-
(2006)
Web 1T 5-Gram Version 1
-
-
-
27
-
-
85076303339
-
-
HAIBLE. gperf. https://www.gnu.org/software/gperf/, 2010-.
-
Gperf
-
-
-
28
-
-
84874906715
-
A study of user password strategy for multiple accounts
-
HAQUE, S. T., WRIGHT, M., AND SCIELZO, S. A study of user password strategy for multiple accounts. In Proc. CODASPY (2013).
-
(2013)
Proc. CODASPY
-
-
Haque, S.T.1
Wright, M.2
Scielzo, S.3
-
29
-
-
79952018667
-
-
IMPERVA. Consumer password worst practices, 2010. http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf.
-
(2010)
Consumer Password Worst Practices
-
-
-
30
-
-
85076306126
-
-
INSIDEPRO. PasswordsPro. http://www.insidepro.com/eng/passwordspro.shtml, 2003-.
-
(2003)
PasswordsPro
-
-
-
31
-
-
84865012140
-
Guess Again (and Again and Again): Measuring password strength by simulating password-cracking algorithms
-
KELLEY, P. G., KOMANDURI, S., MAZUREK, M. L., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L. F., AND LOPEZ, J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In Proc. IEEE Symp. Security & Privacy (2012).
-
(2012)
Proc. IEEE Symp. Security & Privacy
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
Shay, R.4
Vidas, T.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
Lopez, J.9
-
33
-
-
84959262694
-
Telepathwords: Preventing weak passwords by reading users’ minds
-
KOMANDURI, S., SHAY, R., CRANOR, L. F., HERLEY, C., AND SCHECHTER, S. Telepathwords: Preventing weak passwords by reading users’ minds. In Proc. USENIX Security (2014).
-
(2014)
Proc. USENIX Security
-
-
Komanduri, S.1
Shay, R.2
Cranor, L.F.3
Herley, C.4
Schechter, S.5
-
34
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
KOMANDURI, S., SHAY, R., KELLEY, P. G., MAZUREK, M. L., BAUER, L., CHRISTIN, N., CRANOR, L. F., AND EGELMAN, S. Of passwords and people: Measuring the effect of password-composition policies. In Proc. CHI (2011).
-
(2011)
Proc. CHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
35
-
-
85015023451
-
-
2010
-
KORELOGIC.”Crack Me If You Can” - DEFCON 2010. http://contest-2010.korelogic.com/rules.html, 2010-.
-
(2010)
Crack Me If You Can” - DEFCON
-
-
-
37
-
-
85076278063
-
Pathwell topologies
-
KORELOGIC. Pathwell topologies. KoreLogic Blog, 2014. https://blog.korelogic.com/blog/2014/04/04/ pathwell_topologies.
-
(2014)
KoreLogic Blog
-
-
-
39
-
-
85015032845
-
Apple on iCloud breach: It’s not our fault hackers guessed celebrity passwords
-
September
-
LOVE, D. Apple on iCloud breach: It’s not our fault hackers guessed celebrity passwords. International Business Times, September 2014.
-
(2014)
International Business Times
-
-
Love, D.1
-
40
-
-
84914107564
-
A study of probabilistic password models
-
MA, J., YANG, W., LUO, M., AND LI, N. A study of probabilistic password models. In Proc. IEEE Symp. Security & Privacy (2014).
-
(2014)
Proc. IEEE Symp. Security & Privacy
-
-
Ma, J.1
Yang, W.2
Luo, M.3
Li, N.4
-
41
-
-
85076307127
-
Automatic wordlist mangling rule generation
-
MARECHAL, S. Automatic wordlist mangling rule generation. Openwall Blog, 2012. http://www.openwall.com/presentations/Passwords12-Mangling-RulesGeneration/.
-
(2012)
Openwall Blog
-
-
Marechal, S.1
-
42
-
-
84889053137
-
Measuring password guessability for an entire university
-
MAZUREK, M. L., KOMANDURI, S., VIDAS, T., BAUER, L., CHRISTIN, N., CRANOR, L. F., KELLEY, P. G., SHAY, R., AND UR, B. Measuring password guessability for an entire university. In Proc. CCS (2013).
-
(2013)
Proc. CCS
-
-
Mazurek, M.L.1
Komanduri, S.2
Vidas, T.3
Bauer, L.4
Christin, N.5
Cranor, L.F.6
Kelley, P.G.7
Shay, R.8
Ur, B.9
-
43
-
-
0018543411
-
Password security: A case history
-
MORRIS, R., AND THOMPSON, K. Password security: A case history. CACM 22, 11 (1979).
-
(1979)
CACM
, vol.22
, pp. 11
-
-
Morris, R.1
Thompson, K.2
-
44
-
-
85076316359
-
-
MWR INFOSECURITY. MWR InfoSecurity, 2014. https://www.mwrinfosecurity.com/.
-
(2014)
MWR InfoSecurity
-
-
-
45
-
-
33745788833
-
Fast dictionary attacks on passwords using time-space tradeoff
-
NARAYANAN, A., AND SHMATIKOV, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proc. CCS (2005).
-
(2005)
Proc. CCS
-
-
Narayanan, A.1
Shmatikov, V.2
-
46
-
-
85076324331
-
-
OPENWALL. Wordlists. http://download.openwall.net/pub/wordlists/, 2015.
-
(2015)
Wordlists
-
-
-
47
-
-
84868349605
-
Stronger key derivation via sequential memory-hard function
-
PERCIVAL, C. Stronger key derivation via sequential memory-hard function. In Proc. BSD Conference (2009).
-
(2009)
Proc. BSD Conference
-
-
Percival, C.1
-
48
-
-
84897432730
-
Adobe hacking attack was bigger than previously thought
-
October
-
PERLROTH, N. Adobe hacking attack was bigger than previously thought. The New York Times Bits Blog, October 2013.
-
(2013)
The New York Times Bits Blog
-
-
Perlroth, N.1
-
52
-
-
55449109246
-
A future-adaptable password scheme
-
PROVOS, N., AND MAZIERES, D. A future-adaptable password scheme. In Proc. USENIX (1999).
-
(1999)
Proc. USENIX
-
-
Provos, N.1
Mazieres, D.2
-
53
-
-
84874910866
-
Effect of grammar on security of long passwords
-
RAO, A., JHA, B., AND KINI, G. Effect of grammar on security of long passwords. In Proc. CODASPY (2013).
-
(2013)
Proc. CODASPY
-
-
Rao, A.1
Jha, B.2
Kini, G.3
-
54
-
-
85076273872
-
MySpace passwords aren’t so dumb
-
December
-
SCHNEIER, B. MySpace passwords aren’t so dumb. Wired, December 2012.
-
(2012)
Wired
-
-
Schneier, B.1
-
56
-
-
84969927703
-
Can long passwords be secure and usable?
-
SHAY, R., KOMANDURI, S., DURITY, A. L., HUH, P. S., MAZUREK, M. L., SEGRETI, S. M., UR, B., BAUER, L., CRANOR, L. F., AND CHRISTIN, N. Can long passwords be secure and usable? In Proc. CHI (2014).
-
(2014)
Proc. CHI
-
-
Shay, R.1
Komanduri, S.2
Durity, A.L.3
Huh, P.S.4
Mazurek, M.L.5
Segreti, S.M.6
Ur, B.7
Bauer, L.8
Cranor, L.F.9
Christin, N.10
-
57
-
-
85076308593
-
-
STEUBE, J. Hashcat. https://hashcat.net/oclhashcat/, 2009-.
-
Hashcat
-
-
Steube, J.1
-
58
-
-
85076307750
-
-
STEUBE, J. Mask Attack. https://hashcat.net/wiki/doku.php?id=mask_attack, 2009-.
-
(2009)
Mask Attack
-
-
Steube, J.1
-
59
-
-
85076280220
-
-
STEUBE, J. Rule-based Attack. https://hashcat.net/wiki/doku.php?id=rule_based_attack, 2009-.
-
(2009)
Rule-Based Attack
-
-
Steube, J.1
-
60
-
-
84959159726
-
The password life cycle: User behaviour in managing passwords
-
STOBERT, E., AND BIDDLE, R. The password life cycle: User behaviour in managing passwords. In Proc. SOUPS (2014).
-
(2014)
Proc. SOUPS
-
-
Stobert, E.1
Biddle, R.2
-
61
-
-
85076278208
-
-
STRICTURE GROUP. Password auditing services. http://stricture-group.com/services/password-audits.htm.
-
Password Auditing Services
-
-
-
62
-
-
85015062378
-
-
June
-
TRUSTWAVE. eHarmony password dump analysis, June 2012. http://blog.spiderlabs.com/2012/06/eharmonypassword-dump-analysis.html.
-
(2012)
eHarmony Password Dump Analysis
-
-
-
63
-
-
85076307512
-
Business password analysis
-
TRUSTWAVE. 2014
-
TRUSTWAVE. 2014 business password analysis. Password Research, 2014.
-
(2014)
Password Research
-
-
-
64
-
-
85075918169
-
-
TRUST WAVESPIDERLABS. SpiderLabs/KoreLogic-Rules. https://github.com/SpiderLabs/KoreLogic- Rules, 2012.
-
(2012)
SpiderLabs/KoreLogic-Rules
-
-
-
65
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
August
-
UR, B., KELLY, P. G., KOMANDURI, S., LEE, J., MAASS, M., MAZUREK, M., PASSARO, T., SHAY, R., VIDAS, T., BAUER, L., CHRISTIN, N., AND CRANOR, L. F. How does your password measure up? The effect of strength meters on password creation. In Proc. USENIX Security (August 2012).
-
(2012)
Proc. USENIX Security
-
-
Ur, B.1
Kelly, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
Christin, N.11
Cranor, L.F.12
-
66
-
-
84970040528
-
I added ‘!’ at the end to make it secure”: Observing password creation in the lab
-
UR, B., NOMA, F., BEES, J., SEGRETI, S. M., SHAY, R., BAUER, L., CHRISTIN, N., AND CRANOR, L. F. “i added ‘!’ at the end to make it secure”: Observing password creation in the lab. In Proc. SOUPS (2015).
-
(2015)
Proc. SOUPS
-
-
Ur, B.1
Noma, F.2
Bees, J.3
Segreti, S.M.4
Shay, R.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
67
-
-
78650009077
-
If your password is 123456, just make it hackme
-
VANCE, A. If your password is 123456, just make it hackme. New York Times, 2010.
-
(2010)
New York Times
-
-
Vance, A.1
-
68
-
-
85121907225
-
On the semantic patterns of passwords and their security impact
-
VERAS, R., COLLINS, C., AND THORPE, J. On the semantic patterns of passwords and their security impact. In Proc. NDSS (2014).
-
(2014)
Proc. NDSS
-
-
Veras, R.1
Collins, C.2
Thorpe, J.3
-
69
-
-
78650022232
-
Testing metrics for password creation policies by attacking large sets of revealed passwords
-
WEIR, M., AGGARWAL, S., COLLINS, M., AND STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS (2010).
-
(2010)
Proc. CCS
-
-
Weir, M.1
Aggarwal, S.2
Collins, M.3
Stern, H.4
-
70
-
-
70449688216
-
Password cracking using probabilistic context-free grammars
-
WEIR, M., AGGARWAL, S., MEDEIROS, B. D., AND GLODEK, B. Password cracking using probabilistic context-free grammars. In Proc. IEEE Symp. Security & Privacy (2009).
-
(2009)
Proc. IEEE Symp. Security & Privacy
-
-
Weir, M.1
Aggarwal, S.2
Medeiros, B.D.3
Glodek, B.4
-
72
-
-
78650011800
-
The security of modern password expiration: An algorithmic framework and empirical analysis
-
ZHANG, Y., MONROSE, F., AND REITER, M. K. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. CCS (2010).
-
(2010)
Proc. CCS
-
-
Zhang, Y.1
Monrose, F.2
Reiter, M.K.3
|