Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Quest: instant questionnaire collection from handshake messages using WLAN
Wireless Networks (WIRE), Volume 30, Issue 4Pages 2081–2098https://doi.org/10.1007/s11276-023-03645-6AbstractA common approach for questionnaire collection is to set up a WLAN and respondents submit answers via specific apps or a web browser. However, much unnecessary background traffic is incurred once a device connects to Wi-Fi, consuming limited ...
- short-paperFebruary 2021
Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords
SIN 2020: 13th International Conference on Security of Information and NetworksArticle No.: 13, Pages 1–3https://doi.org/10.1145/3433174.3433616The password policies for 14 popular websites were checked and a list of passwords that satisfied the minimal requirements created for each website. 58 users then created realistic passwords that satisfied the minimal requirements. A special purpose ...
- research-articleNovember 2019
The Password Literacy in North Macedonia: A Case Study
CECC 2019: Proceedings of the Third Central European Cybersecurity ConferenceArticle No.: 14, Pages 1–6https://doi.org/10.1145/3360664.3360678Following the repeated reports of high prevalence of functional illiteracy in the countries of the Western Balkans, we go on to study the password composition habits of cultural groups from this region. Ina password cracking experiment, we obtain and ...
- research-articleJune 2019
Towards Designing Advanced Password Cracking Toolkits: Optimizing the Password Cracking Process
UMAP'19 Adjunct: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and PersonalizationPages 203–208https://doi.org/10.1145/3314183.3324967Passwords are still a widespread authentication mechanism that, despite the efforts of the cybersecurity community to educate people, are often predictable. Therefore, there is a need for defenders, e.g. cybersecurity/IT administrators, to periodically ...
- research-articleApril 2019
A coarse-grained password model with memorable unit-based recurrent neural networks
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied ComputingPages 1890–1897https://doi.org/10.1145/3297280.3297464Passwords will continue to be the most prevalent form of authentication in the foreseeable future. But passwords often consist of some common segments which are easy to be predicted and attacked. Lots of methods have been proposed to describe password ...
- abstractApril 2018
SIGCHI Outstanding Dissertation Award -- Supporting Password Decisions with Data
CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing SystemsPaper No.: Award1, Pages 1–3https://doi.org/10.1145/3170427.3185060Abstract Despite decades of research into developing abstract security advice and improving interfaces, users still struggle to make passwords. Users frequently create passwords that are predictable for attackers [1, 9] or make other decisions (e.g., ...
- research-articleDecember 2016
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords
ACM Transactions on Privacy and Security (TOPS), Volume 19, Issue 3Article No.: 9, Pages 1–30https://doi.org/10.1145/2996457In this work, we present a simple, yet effective and practical scheme to improve the security of stored password hashes, increasing the difficulty to crack passwords and exposing cracking attempts. We utilize a hardware-dependent function (HDF), such as ...
- research-articleAugust 2015
Next Gen PCFG Password Cracking
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 8Pages 1776–1791https://doi.org/10.1109/TIFS.2015.2428671Passwords continue to remain an important authentication technique. The probabilistic context-free grammar-based password cracking system of Weir et al. was an important addition to dictionary-based password cracking approaches. In this paper, we show how ...
- research-articleNovember 2013
Honeywords: making password-cracking detectable
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityPages 145–160https://doi.org/10.1145/2508859.2516671We propose a simple method for improving the security of hashed passwords: the maintenance of additional ``honeywords'' (false passwords) associated with each user's account. An adversary who steals a file of hashed passwords and inverts the hash ...
- ArticleDecember 2012
Password Input by Mouth Image
PAAP '12: Proceedings of the 2012 Fifth International Symposium on Parallel Architectures, Algorithms and ProgrammingPages 163–165https://doi.org/10.1109/PAAP.2012.32Usually, the password input on a web page form is produced by computer keyboard or mouse. This paper introduces a special method by mouth image. The password is produced by mouth image and submitted by mouth image. In the same time, the face image is ...
- ArticleJune 2012
How to break EAP-MD5
WISTP'12: Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystemsPages 49–57https://doi.org/10.1007/978-3-642-30955-7_6We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, ...
- research-articleOctober 2010
Testing metrics for password creation policies by attacking large sets of revealed passwords
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityPages 162–175https://doi.org/10.1145/1866307.1866327In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the security provided by various password creation policies. This is accomplished by modeling the success rate of current password ...
- short-paperSeptember 2010
The weak and the strong password preferences: a case study on turkish users
SIN '10: Proceedings of the 3rd international conference on Security of information and networksPages 56–61https://doi.org/10.1145/1854099.1854113Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be ...
- research-articleJuly 2008
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
ACM Transactions on Information and System Security (TISSEC), Volume 11, Issue 4Article No.: 17, Pages 1–22https://doi.org/10.1145/1380564.1380565Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several improvements since the original work of Hellman. The ensuing variants definitely improve the original trade-off but their real impact has never been ...
- ArticleOctober 2006
Dictionary attacks using keyboard acoustic emanations
CCS '06: Proceedings of the 13th ACM conference on Computer and communications securityPages 245–254https://doi.org/10.1145/1180405.1180436We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruct single words of 7-13 characters from a recording of the clicks made when ...
- ArticleSeptember 2006
Ethical hacking and password cracking: a pattern for individualized security exercises
InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum developmentPages 13–18https://doi.org/10.1145/1231047.1231051A design pattern provides a type of template or meta-template for solving design problems. This paper provides and discusses a pattern for creating individualized learning exercises. The domain of application is security education. The specific examples ...
- ArticleJuly 2006
Human selection of mnemonic phrase-based passwords
SOUPS '06: Proceedings of the second symposium on Usable privacy and securityPages 67–78https://doi.org/10.1145/1143120.1143129Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to strengthen passwords, some systems instruct users to create mnemonic phrase-...