Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

Code coverage and test suite effectiveness: Empirical study with real bugs in large systems

PS Kochhar, F Thung, D Lo - 2015 IEEE 22nd international …, 2015 - ieeexplore.ieee.org
During software maintenance, testing is a crucial activity to ensure the quality of program
code as it evolves over time. With the increasing size and complexity of software, adequate …

A {Large-Scale} Empirical Analysis of Chinese Web Passwords

Z Li, W Han, W Xu - … USENIX Security Symposium (USENIX Security 14), 2014 - usenix.org
Users speaking different languages may prefer different patterns in creating their passwords,
and thus knowledge on English passwords cannot help to guess passwords from other …

Is this really you? An empirical study on risk-based authentication applied in the wild

S Wiefling, L Lo Iacono, M Dürmuth - … and Privacy Protection: 34th IFIP TC …, 2019 - Springer
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …

" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications

M Golla, M Wei, J Hainline, L Filipe… - Proceedings of the …, 2018 - dl.acm.org
Password reuse is widespread, so a breach of one provider's password database threatens
accounts on other providers. When companies find stolen credentials on the black market …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …

An investigation into users' considerations towards using password managers

M Fagan, Y Albayram, MMH Khan, R Buck - Human-centric Computing …, 2017 - Springer
Password managers, though commonly recommended by security experts, are still not used
by many users. Understanding why some choose to use password managers while others …

Password Portfolios and the {Finite-Effort} User: Sustainably Managing Large Numbers of Accounts

D Florêncio, C Herley, PC Van Oorschot - 23rd USENIX Security …, 2014 - usenix.org
We explore how to manage a portfolio of passwords. We review why mandating exclusively
strong passwords with no re-use gives users an impossible task as portfolio size grows. We …

The next domino to fall: Empirical analysis of user passwords across online services

C Wang, STK Jan, H Hu, D Bossart… - Proceedings of the Eighth …, 2018 - dl.acm.org
Leaked passwords from data breaches can pose a serious threat if users reuse or slightly
modify the passwords for other services. With more services getting breached today, there is …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …