On the accuracy of password strength meters

M Golla, M Dürmuth - Proceedings of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …

Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches

C Wang, Y Ji, H Wang, L Bai - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In this paper, a novel electro-optic feedback phase chaotic system based on nonlinear
coupling of two delayed interfering branches is proposed and analyzed by numerical …

PassGPT: password modeling and (guided) generation with large language models

J Rando, F Perez-Cruz, B Hitaj - European Symposium on Research in …, 2023 - Springer
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …

[PDF][PDF] A comprehensive review of honey encryption scheme

AE Omolara, A Jantan, OI Abiodun - Indonesian Journal of Electrical …, 2019 - academia.edu
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey
Encryption is an encryption scheme that provides resilience against brute-force attack by …

" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers

CW Munyendo, P Mayer, AJ Aviv - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …

Countering malicious content moderation evasion in online social networks: Simulation and detection of word camouflage

Á Huertas-García, A Martín, J Huertas-Tato… - Applied Soft …, 2023 - Elsevier
Content moderation is the process of screening and monitoring user-generated content
online. It plays a crucial role in stopping content resulting from unacceptable behaviors such …

" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers

S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …

Safekeeper: Protecting web passwords using trusted execution environments

K Krawiecka, A Kurnikov, A Paverd, M Mannan… - Proceedings of the …, 2018 - dl.acm.org
Passwords are by far the most widely-used mechanism for authenticating users on the web,
out-performing all competing solutions in terms of deployability (eg cost and compatibility) …

Exploiting Leakage in Password Managers via Injection Attacks

A Fábrega, A Namavari, R Agarwal, B Nassi… - 33rd USENIX Security …, 2024 - usenix.org
This work explores injection attacks against password managers. In this setting, the
adversary (only) controls their own application client, which they use to''inject" chosen …

Incrementally updateable honey password vaults

H Cheng, W Li, P Wang, CH Chu, K Liang - 30th USENIX Security …, 2021 - usenix.org
Password vault applications allow a user to store multiple passwords in a vault and choose
a master password to encrypt the vault. In practice, attackers may steal the storage file of the …