[HTML][HTML] Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries
Passwords have been the prevailing method of authentication since their inception more
than 50 years ago, a trend which has no signs of slowing down in the foreseeable future …
than 50 years ago, a trend which has no signs of slowing down in the foreseeable future …
Batman Hacked My Password: A {Subtitle-Based} Analysis of Password Depiction in Movies
Password security is and will likely remain an issue that non-experts have to deal with. It is
therefore important that they understand the criteria of secure passwords and the …
therefore important that they understand the criteria of secure passwords and the …
Password cracking using chunk similarity
E Zhou, Y Peng, G Shao, F Deng, Y Miao… - Future Generation …, 2024 - Elsevier
Textual password is one of the most important authentic means used in modern information
systems and password cracking is an important means of measuring password strength …
systems and password cracking is an important means of measuring password strength …
[HTML][HTML] A comprehensive evaluation on the benefits of context based password cracking for digital forensics
Password-based authentication systems have many weaknesses, yet they remain
overwhelmingly used and their announced disappearance is still undated. The system …
overwhelmingly used and their announced disappearance is still undated. The system …
Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
M Walkow, D Pöhn - arXiv preprint arXiv:2407.16251, 2024 - arxiv.org
The increase of Internet services has not only created several digital identities but also more
information available about the persons behind them. The data can be collected and used …
information available about the persons behind them. The data can be collected and used …
A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices
H Lingamsetty, NSS Nitya, V Odelu… - 2024 16th …, 2024 - ieeexplore.ieee.org
In real-life applications, many systems such as email, social websites and some financial
organizations, use the password-based approach for user authentication. Thus, password …
organizations, use the password-based approach for user authentication. Thus, password …
Subverting Biometric Security Using 3D Printed Biometrics Characteristics
BL Tait - International Conference on Global Security, Safety …, 2023 - Springer
Abstract 3D printing technology is making major strides into various manufacturing domains,
allowing for rapid prototyping and even manufacturing of novel and task specific hardware …
allowing for rapid prototyping and even manufacturing of novel and task specific hardware …
New Algorithm of Weak Password Detection
A Maralbayev, GS Omar, M Abdulayeva… - … Networks and Mobile …, 2023 - ieeexplore.ieee.org
This article presents a program to detect weak passwords by leveraging combinations of
user-provided information such as name, surname, and birth year. The program …
user-provided information such as name, surname, and birth year. The program …
[PDF][PDF] Context Based Password Cracking Dictionary Expansion Using Generative Pre-trained Transformers
With the rise of online criminal activity leading to the increasing importance of digital
forensics, efficient and effective password-cracking tools are necessary to collect evidence …
forensics, efficient and effective password-cracking tools are necessary to collect evidence …
[PDF][PDF] The Evaluation of Mobile Device Evidence under Person-Level, Location-Focused Propositions
H Spichiger - 2022 - serval.unil.ch
Location-related evidence recovered from mobile devices is frequently used both in the
investigation stages and the trial stage of criminal case proceedings. Due to societal factors …
investigation stages and the trial stage of criminal case proceedings. Due to societal factors …