Idsgan: Generative adversarial networks for attack generation against intrusion detection

Z Lin, Y Shi, Z Xue - Pacific-asia conference on knowledge discovery and …, 2022 - Springer
As an essential tool in security, the intrusion detection system bears the responsibility of the
defense to network attacks performed by malicious traffic. Nowadays, with the help of …

GNPassGAN: improved generative adversarial networks for trawling offline password guessing

F Yu, MV Martin - 2022 IEEE European Symposium on Security …, 2022 - ieeexplore.ieee.org
The security of passwords depends on a thorough understanding of the strategies used by
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

A Systematic Review on Password Guessing Tasks

W Yu, Q Yin, H Yin, W Xiao, T Chang, L He, L Ni, Q Ji - Entropy, 2023 - mdpi.com
Recently, many password guessing algorithms have been proposed, seriously threatening
cyber security. In this paper, we systematically review over thirty methods for password …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

[HTML][HTML] Decoding developer password patterns: A comparative analysis of password extraction and selection practices

N Lykousas, C Patsakis - Computers & Security, 2024 - Elsevier
Passwords play a crucial role in authentication, ensuring that only authorised entities can
access sensitive information. However, user password choices are often weak and …

Improving real-world password guessing attacks via bi-directional transformers

M Xu, J Yu, X Zhang, C Wang, S Zhang, H Wu… - 32nd USENIX Security …, 2023 - usenix.org
Password guessing attacks, prevalent issues in the real world, can be conceptualized as
efforts to approximate the probability distribution of text tokens. Techniques in the natural …

PassGPT: password modeling and (guided) generation with large language models

J Rando, F Perez-Cruz, B Hitaj - European Symposium on Research in …, 2023 - Springer
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …

Reducing bias in modeling real-world password strength via deep learning and dynamic dictionaries

D Pasquini, M Cianfriglia, G Ateniese… - 30th USENIX Security …, 2021 - usenix.org
Password security hinges on an in-depth understanding of the techniques adopted by
attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such …