" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites

AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

A {Large-Scale} Measurement of Website Login Policies

S Al Roomi, F Li - 32nd USENIX Security Symposium (USENIX Security …, 2023 - usenix.org
Authenticating on a website using a password involves a multi-stage login process, where
each stage entails critical policy and implementation decisions that impact login security and …

{Pass2Edit}: A {Multi-Step} Generative Model for Guessing Edited Passwords

D Wang, Y Zou, YA Xiao, S Ma, X Chen - 32nd USENIX Security …, 2023 - usenix.org
While password stuffing attacks (that exploit the direct password reuse behavior) have
gained considerable attention, only a few studies have examined password tweaking …

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

D Pöhn, W Hommel - Security and Communication Networks, 2023 - Wiley Online Library
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …

MASCARA: Systematically generating memorable and secure passphrases

A Mukherjee, K Murali, SK Jha, N Ganguly… - Proceedings of the …, 2023 - dl.acm.org
Passwords are the most common mechanism for authenticating users online. However,
studies have shown that users find it difficult to create and manage secure passwords. To …

PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph

J Kim, M Song, M Seo, Y Jin, S Shin - 2024 IEEE Symposium on …, 2023 - computer.org
The prevalence of credential stuffing has caused devastating harm to online users who tend
to reuse passwords across websites. In response, researchers have made efforts to detect …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication

J Lee, HK Choi, JH Yoon, S Kim - IEEE Access, 2023 - ieeexplore.ieee.org
One of the most critical vulnerabilities in authentication, commonly referred to as “broken
authentication,” poses a harmful threat, leading to the compromise of user credentials and …