2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) 2016
DOI: 10.1109/rew.2016.034
|View full text |Cite
|
Sign up to set email alerts
|

Forensically-Sound Analysis of Security Risks of Using Local Password Managers

Abstract: Abstract-Password managers address the usability challenge of authentication, i.e., to manage the effort in creating, memorising, and entering complex passwords for an end-user. Offering features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords for variable contexts, their security is as critical as the assets being protected by the passwords. Previous security risk analyses have focused primarily on cloud-and browser-based password managers, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…Password managers re-establish a reasonable balance between the security and usability of passwords, enjoying research attention [16,17,18,19]. Most of the existing research on password managers has focused on (1) technical aspects of these tools and mechanisms to improve their security and usability [16,17], (2) evaluating their security [18,19], or (3) designing for usability [20]. Less work has been carried out on password manager adoption.…”
Section: Related and Background Researchmentioning
confidence: 99%
“…Password managers re-establish a reasonable balance between the security and usability of passwords, enjoying research attention [16,17,18,19]. Most of the existing research on password managers has focused on (1) technical aspects of these tools and mechanisms to improve their security and usability [16,17], (2) evaluating their security [18,19], or (3) designing for usability [20]. Less work has been carried out on password manager adoption.…”
Section: Related and Background Researchmentioning
confidence: 99%
“…For example, in the context of social media incident investigations, Tun et al [22] identify three main requirements related to evidence collection: maintaining privacy, continuity, and integrity of digital evidence. Similarly, Gray et al [23] have proposed a technique to assess risks that local password managers can bring when maintaining integrity and authenticity of passwords. This technique could be applied to other sources of evidence to ensure integrity and authenticity of the data preserved proactively.…”
Section: Forensic Readiness Requirementsmentioning
confidence: 99%
“…The passwords stored by software managers are another form of ephemeral intelligence, where the master password in transient memory may be revealed by unexpected failure of the software system. To reduce the risk of exposing the master passwords, the in-memory plain text passwords should never last long [1]. Live forensic evidence could be combined with persistence storage in order to preserve them in the long run, while typically the storages are remote from the data generators.…”
Section: Live Forensics Versus Snap Forensicsmentioning
confidence: 99%