On the accuracy of password strength meters
Password strength meters are an important tool to help users choose secure passwords.
Strength meters can only then provide reasonable guidance when they are accurate, ie …
Strength meters can only then provide reasonable guidance when they are accurate, ie …
Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches
C Wang, Y Ji, H Wang, L Bai - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In this paper, a novel electro-optic feedback phase chaotic system based on nonlinear
coupling of two delayed interfering branches is proposed and analyzed by numerical …
coupling of two delayed interfering branches is proposed and analyzed by numerical …
PassGPT: password modeling and (guided) generation with large language models
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
text without the need for explicit supervision. In this paper, we investigate the efficacy of …
[PDF][PDF] A comprehensive review of honey encryption scheme
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey
Encryption is an encryption scheme that provides resilience against brute-force attack by …
Encryption is an encryption scheme that provides resilience against brute-force attack by …
" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …
one PM to another, the techniques they employ when switching, and challenges they …
Countering malicious content moderation evasion in online social networks: Simulation and detection of word camouflage
Content moderation is the process of screening and monitoring user-generated content
online. It plays a crucial role in stopping content resulting from unacceptable behaviors such …
online. It plays a crucial role in stopping content resulting from unacceptable behaviors such …
" I don't see why I would ever want to use it" Analyzing the Usability of Popular Smartphone Password Managers
S Seiler-Hwang, P Arias-Cabarcos, A Marín… - Proceedings of the …, 2019 - dl.acm.org
Passwords are an often unavoidable authentication mechanism, despite the availability of
additional alternative means. In the case of smartphones, usability problems are aggravated …
additional alternative means. In the case of smartphones, usability problems are aggravated …
Safekeeper: Protecting web passwords using trusted execution environments
Passwords are by far the most widely-used mechanism for authenticating users on the web,
out-performing all competing solutions in terms of deployability (eg cost and compatibility) …
out-performing all competing solutions in terms of deployability (eg cost and compatibility) …
Exploiting Leakage in Password Managers via Injection Attacks
This work explores injection attacks against password managers. In this setting, the
adversary (only) controls their own application client, which they use to''inject" chosen …
adversary (only) controls their own application client, which they use to''inject" chosen …
Incrementally updateable honey password vaults
Password vault applications allow a user to store multiple passwords in a vault and choose
a master password to encrypt the vault. In practice, attackers may steal the storage file of the …
a master password to encrypt the vault. In practice, attackers may steal the storage file of the …