[PDF][PDF] The impact of exposed passwords on honeyword efficacy

Z Huang, L Bauer, MK Reiter - arXiv preprint arxiv:2309.10323, 2023 - usenix.org
… Our findings that password reuse across sites is so detrimental to honeyword false-negative
rates (Sec. 4.3.2) provides yet more evidence that moving more users toward …

Inside out-A study of users' perceptions of password memorability and recall

R Alomari, MV Martin, S MacDonald, A Maraj… - Journal of Information …, 2019 - Elsevier
… tend to reuse passwords to cope … passwords we (1) had an adequate number of passwords
of each strength (ie, any shorter password length would have resulted very few passwords

Improving password guessing via representation learning

D Pasquini, A Gangwal, G Ateniese… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
… approach for password guessing. We show that an abstract password representation naturally
… , and yet presently active, password guessing field. These properties can establish novel …

Costs and benefits of authentication advice

H Murray, D Malone - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
… We found 5 pieces of advice telling organisations to Store password history to eliminate
reuse, 1 encouraged organisations to Enforce a minimum password age, and 10 were in favour …

Fixing the fixes: Assessing the solutions of SAST tools for securing password storage

H Tupsamudre, M Sahu, K Vidhani, S Lodha - Financial Cryptography and …, 2020 - Springer
… to investigate the password creation and password management strategies (storage, reuse
etc.) of … For instance, users choose predictable passwords and reuse their passwords across …

Towards quantum large-scale password guessing on real-world distributions

M Dürmuth, M Golla, P Markert, A May… - … on Cryptology and …, 2021 - Springer
… In the following section, we provide a brief introduction to password guessing and the real-world
password datasets we are using. Moreover, we describe how human password choice …

Recurrent neural network based password generation for group attribute context-ware applications

J Luo, J Deng, C Lu, H Liu - 2019 IEEE 21st International …, 2019 - ieeexplore.ieee.org
… the habits of reusing the same password in the many websites [9], [10], and the user’s
password may … Wang, “The tangled web of password reuse.” in NDSS, vol. 14, 2014, pp. 23–26. …

Politics of data reuse in machine learning systems: Theorizing reuse entanglements

NB Thylstrup, KB Hansen, M Flyverbom… - Big Data & …, 2022 - journals.sagepub.com
reuse of data as an inherently entangled phenomenon. To examine this tension between the
discursive regimes and the realities of data reuse, we advance the notion of reuse … of reuse

Superword: A honeyword system for achieving higher security goals

Y Guo, Z Zhang, Y Guo - Computers & Security, 2021 - Elsevier
password”? (2) How to prevent the intersection attack in multiple systems caused … password
reuse without reducing usability? (3) How to reduce the success rate of targeted password

MementoKey: Keeping passwords in mind

B Jeong, A Vallat, C Csikszentmihalyi, J Park… - Extended Abstracts of …, 2019 - dl.acm.org
… Some studies analyze real passwords through leaked … password and password reuse [6].
All this work has highlighted a number of issues, which are well known: secure passwords are …