" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
AS Albesher - Sustainability, 2023 - mdpi.com
A sustainable online environment is essential to protecting businesses from abuse and data
breaches. To protect sustainability, websites' authentication procedures should continuously …
breaches. To protect sustainability, websites' authentication procedures should continuously …
A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
A {Large-Scale} Measurement of Website Login Policies
S Al Roomi, F Li - 32nd USENIX Security Symposium (USENIX Security …, 2023 - usenix.org
Authenticating on a website using a password involves a multi-stage login process, where
each stage entails critical policy and implementation decisions that impact login security and …
each stage entails critical policy and implementation decisions that impact login security and …
{Pass2Edit}: A {Multi-Step} Generative Model for Guessing Edited Passwords
While password stuffing attacks (that exploit the direct password reuse behavior) have
gained considerable attention, only a few studies have examined password tweaking …
gained considerable attention, only a few studies have examined password tweaking …
Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …
MASCARA: Systematically generating memorable and secure passphrases
A Mukherjee, K Murali, SK Jha, N Ganguly… - Proceedings of the …, 2023 - dl.acm.org
Passwords are the most common mechanism for authenticating users online. However,
studies have shown that users find it difficult to create and manage secure passwords. To …
studies have shown that users find it difficult to create and manage secure passwords. To …
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph
The prevalence of credential stuffing has caused devastating harm to online users who tend
to reuse passwords across websites. In response, researchers have made efforts to detect …
to reuse passwords across websites. In response, researchers have made efforts to detect …
SoK: Web Authentication in the Age of End-to-End Encryption
J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication
J Lee, HK Choi, JH Yoon, S Kim - IEEE Access, 2023 - ieeexplore.ieee.org
One of the most critical vulnerabilities in authentication, commonly referred to as “broken
authentication,” poses a harmful threat, leading to the compromise of user credentials and …
authentication,” poses a harmful threat, leading to the compromise of user credentials and …