Protecting accounts from credential stuffing with password breach alerting

K Thomas, J Pullman, K Yeo, A Raghunathan… - 28th USENIX Security …, 2019 - usenix.org
Protecting accounts from credential stuffing attacks remains burdensome due to an
asymmetry of knowledge: attackers have wide-scale access to billions of stolen usernames …

Protocols for checking compromised credentials

L Li, B Pal, J Ali, N Sullivan, R Chatterjee… - Proceedings of the …, 2019 - dl.acm.org
To prevent credential stuffing attacks, industry best practice now proactively checks if user
credentials are present in known data breaches. Recently, some web services, such as …

" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications

M Golla, M Wei, J Hainline, L Filipe… - Proceedings of the …, 2018 - dl.acm.org
Password reuse is widespread, so a breach of one provider's password database threatens
accounts on other providers. When companies find stolen credentials on the black market …

Data breaches, phishing, or malware? Understanding the risks of stolen credentials

K Thomas, F Li, A Zand, J Barrett, J Ranieri… - Proceedings of the …, 2017 - dl.acm.org
In this paper, we present the first longitudinal measurement study of the underground
ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the …

Evaluating login challenges as adefense against account takeover

P Doerfler, K Thomas, M Marincenko, J Ranieri… - The World Wide Web …, 2019 - dl.acm.org
In this paper, we study the efficacy of login challenges at preventing account takeover, as
well as evaluate the amount of friction these challenges create for normal users. These …

" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking

R Shay, I Ion, RW Reeder, S Consolvo - Proceedings of the SIGCHI …, 2014 - dl.acm.org
With so much of our lives digital, online, and not entirely under our control, we risk losing
access to our communications, reputation, and data. Recent years have brought a rash of …

Password management strategies for online accounts

S Gaw, EW Felten - Proceedings of the second symposium on Usable …, 2006 - dl.acm.org
Given the widespread use of password authentication in online correspondence,
subscription services, and shopping, there is growing concern about identity theft. When …

That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers

S Oesch, S Ruoti - Proceedings of the 29th USENIX Conference on …, 2020 - usenix.org
Password managers have the potential to help users more effectively manage their
passwords and address many of the concerns surrounding password-based authentication …

Password managers: Attacks and defenses

D Silver, S Jana, D Boneh, E Chen… - 23rd USENIX Security …, 2014 - usenix.org
We study the security of popular password managers and their policies on automatically
filling in Web passwords. We examine browser built-in password managers, mobile …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …