It is very important to consider whether a password has been leaked, because security can no longer be guaranteed for passwords exposed to attackers. However, most existing password security evaluation methods do not consider the leakage of the password. Even if leakage is considered, a process of collecting, storing, and verifying a huge number of leaked passwords is required, which is not practical in low-performance devices such as IoT devices. Therefore, we propose another approach in this paper using a deep learning model. A password list was made for the proposed model by randomly extracting 133,447 words from a total of seven dictionaries, including Wikipedia and Korean-language dictionaries. After that, a deep learning model was cre...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
Researchers proposed several data-driven methods to efficiently guess user-chosen passwords for pass...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
In the present thesis, we aim at alleviating the inherent limitations affecting current solu- tions ...
Security weaknesses are sometimes caused by patterns in human behaviors. However, it can be difficul...
Abstract: Passwords, as the most used method of authentication because to its ease of implementation...
The frequent incidents of password leakage have increased people’s attention and research on passwor...
<p>In an effort to improve security by preventing users from picking weak passwords, system administ...
Abstract—We present the first framework for segmentation, semantic classification, and semantic gene...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Passwords, particularly text-based, are the most common authentication mechanisms across all platfor...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Passwords are stored in the form of salted one-way hashes so that attacks on servers cannot leak the...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
Researchers proposed several data-driven methods to efficiently guess user-chosen passwords for pass...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
In the present thesis, we aim at alleviating the inherent limitations affecting current solu- tions ...
Security weaknesses are sometimes caused by patterns in human behaviors. However, it can be difficul...
Abstract: Passwords, as the most used method of authentication because to its ease of implementation...
The frequent incidents of password leakage have increased people’s attention and research on passwor...
<p>In an effort to improve security by preventing users from picking weak passwords, system administ...
Abstract—We present the first framework for segmentation, semantic classification, and semantic gene...
password strength by simulating password-cracking algorithms Intro How effectively several heuristic...
Password-based authentication is perhaps the most widely used method for user authentication. Passwo...
Passwords, particularly text-based, are the most common authentication mechanisms across all platfor...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Despite considerable research on passwords, empirical studies of password strength have been limited...
Passwords are stored in the form of salted one-way hashes so that attacks on servers cannot leak the...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
Researchers proposed several data-driven methods to efficiently guess user-chosen passwords for pass...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...