Idsgan: Generative adversarial networks for attack generation against intrusion detection
Z Lin, Y Shi, Z Xue - Pacific-asia conference on knowledge discovery and …, 2022 - Springer
As an essential tool in security, the intrusion detection system bears the responsibility of the
defense to network attacks performed by malicious traffic. Nowadays, with the help of …
defense to network attacks performed by malicious traffic. Nowadays, with the help of …
GNPassGAN: improved generative adversarial networks for trawling offline password guessing
The security of passwords depends on a thorough understanding of the strategies used by
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
A Systematic Review on Password Guessing Tasks
W Yu, Q Yin, H Yin, W Xiao, T Chang, L He, L Ni, Q Ji - Entropy, 2023 - mdpi.com
Recently, many password guessing algorithms have been proposed, seriously threatening
cyber security. In this paper, we systematically review over thirty methods for password …
cyber security. In this paper, we systematically review over thirty methods for password …
Chunk-level password guessing: Towards modeling refined password composition representations
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …
suitable password composition representation is an influential factor. Unfortunately, the …
A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
accounts. To learn how organizations can better protect users, we retrospectively analyzed …
[HTML][HTML] Decoding developer password patterns: A comparative analysis of password extraction and selection practices
N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …
access sensitive information. However, user password choices are often weak and …
Improving real-world password guessing attacks via bi-directional transformers
Password guessing attacks, prevalent issues in the real world, can be conceptualized as
efforts to approximate the probability distribution of text tokens. Techniques in the natural …
efforts to approximate the probability distribution of text tokens. Techniques in the natural …
PassGPT: password modeling and (guided) generation with large language models
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
Reducing bias in modeling real-world password strength via deep learning and dynamic dictionaries
D Pasquini, M Cianfriglia, G Ateniese… - 30th USENIX Security …, 2021 - usenix.org
Password security hinges on an in-depth understanding of the techniques adopted by
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …