The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
暂无分享,去创建一个
Gang Wang | Chun Wang | Hang Hu | Douglas Bossart | Steve T. K. Jan | G. Wang | C. Wang | Hang Hu | Douglas Bossart
[1] Ninghui Li,et al. A Study of Probabilistic Password Models , 2014, 2014 IEEE Symposium on Security and Privacy.
[2] Lujo Bauer,et al. Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat , 2017, CCS.
[3] Ting Wang,et al. PARS: A Uniform and Open-source Password Analysis and Research System , 2015, ACSAC 2015.
[4] Daniel Lowe Wheeler. zxcvbn: Low-Budget Password Strength Estimation , 2016, USENIX Security Symposium.
[5] Julie Thorpe,et al. On Semantic Patterns of Passwords and their Security Impact , 2014, NDSS.
[6] Lujo Bauer,et al. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Lujo Bauer,et al. Of passwords and people: measuring the effect of password-composition policies , 2011, CHI.
[8] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[9] Christoph Neumann,et al. On the Privacy Impacts of Publicly Leaked Password Databases , 2017, DIMVA.
[10] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[11] Michael K. Reiter,et al. The security of modern password expiration: an algorithmic framework and empirical analysis , 2010, CCS '10.
[12] S. M. García,et al. 2014: , 2020, A Party for Lazarus.
[13] Clark D. Thomborson,et al. Passwords and Perceptions , 2009, AISC.
[14] Blase Ur,et al. Measuring Real-World Accuracies and Biases in Modeling Password Guessability , 2015, USENIX Security Symposium.
[15] Mohammad Mannan,et al. From Very Weak to Very Strong: Analyzing Password-Strength Meters , 2014, NDSS.
[16] Haining Wang,et al. A study of personal information in human-chosen passwords and its security implications , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[17] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[18] M. Angela Sasse,et al. The true cost of unusable password policies: password use in the wild , 2010, CHI.
[19] Paul C. van Oorschot,et al. Revisiting password rules: facilitating human management of passwords , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[20] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[21] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[22] Blase Ur,et al. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation , 2012, USENIX Security Symposium.
[23] Blase Ur,et al. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks , 2016, USENIX Annual Technical Conference.
[24] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[25] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[26] Shouling Ji,et al. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords , 2017, IEEE Transactions on Dependable and Secure Computing.
[27] Blase Ur,et al. Measuring password guessability for an entire university , 2013, CCS.
[28] Frank Stajano,et al. Passwords and the evolution of imperfect authentication , 2015, Commun. ACM.
[29] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[30] Rick Wash,et al. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites , 2016, SOUPS.
[31] Elizabeth Stobert,et al. The Password Life Cycle: User Behaviour in Managing Passwords , 2014, SOUPS.
[32] Ewan Klein,et al. Natural Language Processing with Python , 2009 .
[33] Matthew K. Wright,et al. A study of user password strategy for multiple accounts , 2013, CODASPY '13.
[34] Lujo Bauer,et al. Encountering stronger password requirements: user attitudes and behaviors , 2010, SOUPS.
[35] Blase Ur,et al. "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab , 2015, SOUPS.
[36] Vern Paxson,et al. Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials , 2017, CCS.
[37] Benno Stein,et al. A Large-scale Analysis of the Mnemonic Password Advice , 2017, NDSS.