Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. A Research Agenda Acknowledging the Persistence of Passwords , 2012, IEEE Security & Privacy.
[2] Gianluca Stringhini,et al. What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild , 2016, Internet Measurement Conference.
[3] Luigi Catuogno,et al. A honeypot system with honeyword-driven fake interactive sessions , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).
[4] Mitsuaki Akiyama,et al. Active Credential Leakage for Observing Web-Based Attack Cycle , 2013, RAID.
[5] Angelos D. Keromytis,et al. SAuth: protecting user accounts from password database leaks , 2013, CCS.
[6] Hung-Min Sun,et al. oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks , 2012, IEEE Transactions on Information Forensics and Security.
[7] Vern Paxson,et al. Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials , 2017, CCS.
[8] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[9] Helmut Schneider,et al. The domino effect of password reuse , 2004, CACM.
[10] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.