Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically collected for a research study or from low-value accounts. Properties of pass-words used for high-value accounts thus remain poorly understood. We fill this gap by studying the single-sign-on passwords used by over 25,000 faculty, staff, and students at a research university with a complex password policy. Key aspects of our contributions rest on our (indirect) access to plaintext passwords. We describe our data collection methodology, particularly the many precautions we took to minimize risks to users. We then analyze how guessable the collected passw...
Abstract—We report on the largest corpus of user-chosen passwords ever studied, consisting of anonym...
While passwords have served the purpose of authentication throughout human history, text passwords h...
Password guessing is one of the most common methods an attacker will use for compromising end users....
Despite considerable research on passwords, empirical studies of password strength have been limited...
<p>Despite considerable research on passwords, empirical studies of password strength have been limi...
Despite considerable research on passwords, empirical studies of password strength have been limited...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
Parameterized password guessability—how many guesses a particular cracking algorithm with particular...
Despite advances in biometrics and other technologies, pass-words remain the most commonly used mean...
Despite decades of research into developing abstract security advice and improving interfaces, users...
Parameterized password guessability—how many guesses a particular cracking algorithm with particular...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as ...
<p>In an effort to improve security by preventing users from picking weak passwords, system administ...
Abstract—We report on the largest corpus of user-chosen passwords ever studied, consisting of anonym...
While passwords have served the purpose of authentication throughout human history, text passwords h...
Password guessing is one of the most common methods an attacker will use for compromising end users....
Despite considerable research on passwords, empirical studies of password strength have been limited...
<p>Despite considerable research on passwords, empirical studies of password strength have been limi...
Despite considerable research on passwords, empirical studies of password strength have been limited...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
Parameterized password guessability—how many guesses a particular cracking algorithm with particular...
Despite advances in biometrics and other technologies, pass-words remain the most commonly used mean...
Despite decades of research into developing abstract security advice and improving interfaces, users...
Parameterized password guessability—how many guesses a particular cracking algorithm with particular...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as ...
<p>In an effort to improve security by preventing users from picking weak passwords, system administ...
Abstract—We report on the largest corpus of user-chosen passwords ever studied, consisting of anonym...
While passwords have served the purpose of authentication throughout human history, text passwords h...
Password guessing is one of the most common methods an attacker will use for compromising end users....