MonoPass: a password manager without master password authentication

H Jeong, H Jung - Companion Proceedings of the 26th International …, 2021 - dl.acm.org
… all passwords when the security of the password manager is breached. We present a password
password to regenerate consistent passwords across a variety of devices and passes …

That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers

S Oesch, S Ruoti - Proceedings of the 29th USENIX Conference on …, 2020 - usenix.org
… and address many of the concerns surrounding password-based … password managers;
especially in browser-based password … likely to reuse password than users of app-based or …

TG-SPSR: A systematic targeted password attacking model

M Zhang, Q Zhang, W Liu, X Hu… - KSII Transactions on …, 2019 - koreascience.kr
password behaviors for password reuse and modification. According to the statistics in [24-27],
users often modify or reuse their existing passwords … intuitively analyze password reuse in …

Why users (don't) use password managers at a large educational institution

P Mayer, CW Munyendo, ML Mazurek… - 31st USENIX Security …, 2022 - usenix.org
… Lastly, we discuss password reuse across accounts by participants. … was a significant
precursor to password reuse. Our results similarly find higher password reuse rates for browser built…

Adaptation of password strength estimators to a non-English environment—the Czech experience

P Doucek, L Pavlíček, J Sedláček, L Nedomová - Computers & security, 2020 - Elsevier
… Regarding password leaks, let us briefly look further back into history. In the 1960s, a
computer system named CTSS (Compatible Time-Sharing System) was developed at MIT. This …

Passtrans: An improved password reuse model based on transformer

X He, H Cheng, J Xie, P Wang… - ICASSP 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
… old password is leaked, the users may suffer from credential tweaking attacks. We propose a
password reuse … We evaluate the performance in leaked password datasets, and the results …

(How) Do people change their passwords after a breach?

S Bhagavatula, L Bauer, A Kapadia - arXiv preprint arXiv:2010.09853, 2020 - arxiv.org
… Computing password reuse: To quantify password reuse, we build on … reuse as defined in
previous work on password reuse [35]. A password for a particular account is exactly reused if …

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites

Y He, EE Alem, W Wang - Frontiers of Computer Science, 2020 - Springer
… very short passwords, as well as reuse the password across the sites, often change most of
passwords using the same or related passwords and they lacked understanding of password

What happens after you leak your password: Understanding credential sharing on phishing sites

P Peng, C Xu, L Quinn, H Hu, B Viswanath… - Proceedings of the 2019 …, 2019 - dl.acm.org
… using the same password (assuming users reuse the password). Intuitively, the email
account can be used to hijack other online accounts registered under this email (eg, through …

Practical password hardening based on TLS

C Diomedous, E Athanasopoulos - … , June 19–20, 2019, Proceedings 16, 2019 - Springer
… Additionally, it is vital to protect the less established web sites, in the context of password
leaks, since due to password reuse [16, 20] a leak in a random web site may be a huge threat …