메뉴 건너뛰기




Volumn , Issue , 2015, Pages 463-481

Measuring real-world accuracies and biases in modeling password guessability

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION;

EID: 85076274968     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (161)

References (72)
  • 2
    • 84889010365 scopus 로고    scopus 로고
    • The Gawker hack: How a million passwords were lost
    • December
    • BONNEAU, J. The Gawker hack: How a million passwords were lost. Light Blue Touchpaper Blog, December 2010. http://www.lightbluetouchpaper.org/2010/12/15/thegawker-hack-how-a-million-passwords-were-lost/.
    • (2010) Light Blue Touchpaper Blog
    • Bonneau, J.1
  • 3
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • BONNEAU, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proc. IEEE Symp. Security & Privacy (2012).
    • (2012) Proc. IEEE Symp. Security & Privacy
    • Bonneau, J.1
  • 4
    • 85076288259 scopus 로고    scopus 로고
    • Statistical metrics for individual password strength
    • BONNEAU, J. Statistical metrics for individual password strength. In Proc. WPS (2012).
    • (2012) Proc. WPS
    • Bonneau, J.1
  • 6
    • 84879755136 scopus 로고    scopus 로고
    • Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords
    • BONNEAU, J., AND XU, R. Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords. In Proc. W2SP (2012).
    • (2012) Proc. W2SP
    • Bonneau, J.1    Xu, R.2
  • 7
    • 85014995774 scopus 로고    scopus 로고
    • 10 (or so) of the worst passwords exposed by the LinkedIn hack
    • June
    • BRODKIN, J. 10 (or so) of the worst passwords exposed by the LinkedIn hack. Ars Technica, June 2012.
    • (2012) Ars Technica
    • Brodkin, J.1
  • 9
    • 85013836600 scopus 로고    scopus 로고
    • CARNEGIE MELLON UNIVERSITY. Password guessability service. https://pgs.ece.cmu.edu, 2015.
    • (2015) CARNEGIE MELLON UNIVERSITY
  • 10
    • 84959406256 scopus 로고    scopus 로고
    • Adaptive password-strength meters from Markov models
    • CASTELLUCCIA, C., DÜRMUTH, M., AND PERITO, D. Adaptive password-strength meters from Markov models. In Proc. NDSS (2012).
    • (2012) Proc. NDSS
    • Castelluccia, C.1    Dürmuth, M.2    Perito, D.3
  • 13
    • 85076317432 scopus 로고    scopus 로고
    • CURLYBOI. Hashtopus. http://hashtopus.nech.me/manual.html, 2009-.
    • (2009) Hashtopus
  • 15
    • 85104527602 scopus 로고    scopus 로고
    • From very weak to very strong: Analyzing password-strength meters
    • DE CARNÉ DE CARNAVALET, X., AND MANNAN, M. From very weak to very strong: Analyzing password-strength meters. In Proc. NDSS (2014).
    • (2014) Proc. NDSS
    • De Carné De Carnavalet, X.1    Mannan, M.2
  • 17
    • 84891136737 scopus 로고    scopus 로고
    • Usage of botnets for high speed md5 hash cracking
    • DEV, J. A. Usage of botnets for high speed md5 hash cracking. In INTECH (2013).
    • (2013) INTECH
    • Dev, J.A.1
  • 19
    • 84977833880 scopus 로고    scopus 로고
    • When privacy meets security: Leveraging personal information for password cracking
    • DÜRMUTH, M., CHAABANE, A., PERITO, D., AND CASTELLUCCIA, C. When privacy meets security: Leveraging personal information for password cracking. CoRR (2013).
    • (2013) CoRR
    • Dürmuth, M.1    Chaabane, A.2    Perito, D.3    Castelluccia, C.4
  • 20
  • 23
    • 84893121194 scopus 로고    scopus 로고
    • Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331
    • May
    • GOODIN, D. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”. Ars Technica, May 2013.
    • (2013) Ars Technica
    • Goodin, D.1
  • 24
    • 84959277527 scopus 로고    scopus 로고
    • Thereisnofatebutwhatwemake”-turbo-charged cracking comes to long passwords
    • August
    • GOODIN, D. “thereisnofatebutwhatwemake”-turbo-charged cracking comes to long passwords. Ars Technica, August 2013.
    • (2013) Ars Technica
    • Goodin, D.1
  • 25
    • 85076314190 scopus 로고    scopus 로고
    • Meet wordhound, the tool that puts a personal touch on password cracking
    • August
    • GOODIN, D. Meet wordhound, the tool that puts a personal touch on password cracking. Ars Technica, August 2014.
    • (2014) Ars Technica
    • Goodin, D.1
  • 26
    • 47749103248 scopus 로고    scopus 로고
    • GOOGLE. Web 1T 5-gram version 1, 2006. http://www.ldc.upenn.edu/Catalog/CatalogEntry.jsp? catalogId=LDC2006T13.
    • (2006) Web 1T 5-Gram Version 1
  • 27
    • 85076303339 scopus 로고    scopus 로고
    • HAIBLE. gperf. https://www.gnu.org/software/gperf/, 2010-.
    • Gperf
  • 28
    • 84874906715 scopus 로고    scopus 로고
    • A study of user password strategy for multiple accounts
    • HAQUE, S. T., WRIGHT, M., AND SCIELZO, S. A study of user password strategy for multiple accounts. In Proc. CODASPY (2013).
    • (2013) Proc. CODASPY
    • Haque, S.T.1    Wright, M.2    Scielzo, S.3
  • 29
    • 79952018667 scopus 로고    scopus 로고
    • IMPERVA. Consumer password worst practices, 2010. http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf.
    • (2010) Consumer Password Worst Practices
  • 30
    • 85076306126 scopus 로고    scopus 로고
    • INSIDEPRO. PasswordsPro. http://www.insidepro.com/eng/passwordspro.shtml, 2003-.
    • (2003) PasswordsPro
  • 35
    • 85015023451 scopus 로고    scopus 로고
    • 2010
    • KORELOGIC.”Crack Me If You Can” - DEFCON 2010. http://contest-2010.korelogic.com/rules.html, 2010-.
    • (2010) Crack Me If You Can” - DEFCON
  • 37
    • 85076278063 scopus 로고    scopus 로고
    • Pathwell topologies
    • KORELOGIC. Pathwell topologies. KoreLogic Blog, 2014. https://blog.korelogic.com/blog/2014/04/04/ pathwell_topologies.
    • (2014) KoreLogic Blog
  • 39
    • 85015032845 scopus 로고    scopus 로고
    • Apple on iCloud breach: It’s not our fault hackers guessed celebrity passwords
    • September
    • LOVE, D. Apple on iCloud breach: It’s not our fault hackers guessed celebrity passwords. International Business Times, September 2014.
    • (2014) International Business Times
    • Love, D.1
  • 41
    • 85076307127 scopus 로고    scopus 로고
    • Automatic wordlist mangling rule generation
    • MARECHAL, S. Automatic wordlist mangling rule generation. Openwall Blog, 2012. http://www.openwall.com/presentations/Passwords12-Mangling-RulesGeneration/.
    • (2012) Openwall Blog
    • Marechal, S.1
  • 43
    • 0018543411 scopus 로고
    • Password security: A case history
    • MORRIS, R., AND THOMPSON, K. Password security: A case history. CACM 22, 11 (1979).
    • (1979) CACM , vol.22 , pp. 11
    • Morris, R.1    Thompson, K.2
  • 44
    • 85076316359 scopus 로고    scopus 로고
    • MWR INFOSECURITY. MWR InfoSecurity, 2014. https://www.mwrinfosecurity.com/.
    • (2014) MWR InfoSecurity
  • 45
    • 33745788833 scopus 로고    scopus 로고
    • Fast dictionary attacks on passwords using time-space tradeoff
    • NARAYANAN, A., AND SHMATIKOV, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proc. CCS (2005).
    • (2005) Proc. CCS
    • Narayanan, A.1    Shmatikov, V.2
  • 46
    • 85076324331 scopus 로고    scopus 로고
    • OPENWALL. Wordlists. http://download.openwall.net/pub/wordlists/, 2015.
    • (2015) Wordlists
  • 47
    • 84868349605 scopus 로고    scopus 로고
    • Stronger key derivation via sequential memory-hard function
    • PERCIVAL, C. Stronger key derivation via sequential memory-hard function. In Proc. BSD Conference (2009).
    • (2009) Proc. BSD Conference
    • Percival, C.1
  • 48
    • 84897432730 scopus 로고    scopus 로고
    • Adobe hacking attack was bigger than previously thought
    • October
    • PERLROTH, N. Adobe hacking attack was bigger than previously thought. The New York Times Bits Blog, October 2013.
    • (2013) The New York Times Bits Blog
    • Perlroth, N.1
  • 52
    • 55449109246 scopus 로고    scopus 로고
    • A future-adaptable password scheme
    • PROVOS, N., AND MAZIERES, D. A future-adaptable password scheme. In Proc. USENIX (1999).
    • (1999) Proc. USENIX
    • Provos, N.1    Mazieres, D.2
  • 53
    • 84874910866 scopus 로고    scopus 로고
    • Effect of grammar on security of long passwords
    • RAO, A., JHA, B., AND KINI, G. Effect of grammar on security of long passwords. In Proc. CODASPY (2013).
    • (2013) Proc. CODASPY
    • Rao, A.1    Jha, B.2    Kini, G.3
  • 54
    • 85076273872 scopus 로고    scopus 로고
    • MySpace passwords aren’t so dumb
    • December
    • SCHNEIER, B. MySpace passwords aren’t so dumb. Wired, December 2012.
    • (2012) Wired
    • Schneier, B.1
  • 57
  • 58
    • 85076307750 scopus 로고    scopus 로고
    • STEUBE, J. Mask Attack. https://hashcat.net/wiki/doku.php?id=mask_attack, 2009-.
    • (2009) Mask Attack
    • Steube, J.1
  • 59
  • 60
    • 84959159726 scopus 로고    scopus 로고
    • The password life cycle: User behaviour in managing passwords
    • STOBERT, E., AND BIDDLE, R. The password life cycle: User behaviour in managing passwords. In Proc. SOUPS (2014).
    • (2014) Proc. SOUPS
    • Stobert, E.1    Biddle, R.2
  • 61
    • 85076278208 scopus 로고    scopus 로고
    • STRICTURE GROUP. Password auditing services. http://stricture-group.com/services/password-audits.htm.
    • Password Auditing Services
  • 62
    • 85015062378 scopus 로고    scopus 로고
    • June
    • TRUSTWAVE. eHarmony password dump analysis, June 2012. http://blog.spiderlabs.com/2012/06/eharmonypassword-dump-analysis.html.
    • (2012) eHarmony Password Dump Analysis
  • 63
    • 85076307512 scopus 로고    scopus 로고
    • Business password analysis
    • TRUSTWAVE. 2014
    • TRUSTWAVE. 2014 business password analysis. Password Research, 2014.
    • (2014) Password Research
  • 64
    • 85075918169 scopus 로고    scopus 로고
    • TRUST WAVESPIDERLABS. SpiderLabs/KoreLogic-Rules. https://github.com/SpiderLabs/KoreLogic- Rules, 2012.
    • (2012) SpiderLabs/KoreLogic-Rules
  • 67
    • 78650009077 scopus 로고    scopus 로고
    • If your password is 123456, just make it hackme
    • VANCE, A. If your password is 123456, just make it hackme. New York Times, 2010.
    • (2010) New York Times
    • Vance, A.1
  • 68
    • 85121907225 scopus 로고    scopus 로고
    • On the semantic patterns of passwords and their security impact
    • VERAS, R., COLLINS, C., AND THORPE, J. On the semantic patterns of passwords and their security impact. In Proc. NDSS (2014).
    • (2014) Proc. NDSS
    • Veras, R.1    Collins, C.2    Thorpe, J.3
  • 69
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • WEIR, M., AGGARWAL, S., COLLINS, M., AND STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. CCS (2010).
    • (2010) Proc. CCS
    • Weir, M.1    Aggarwal, S.2    Collins, M.3    Stern, H.4
  • 72
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • ZHANG, Y., MONROSE, F., AND REITER, M. K. The security of modern password expiration: An algorithmic framework and empirical analysis. In Proc. CCS (2010).
    • (2010) Proc. CCS
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.