Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3354229
|View full text |Cite
|
Sign up to set email alerts
|

Protocols for Checking Compromised Credentials

Abstract: To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal description of C3 services, detailing different settings and operational requirements, and we give relevant threat mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
40
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 32 publications
(42 citation statements)
references
References 25 publications
1
40
0
Order By: Relevance
“…There is a trade-off to this approach; to ensure both communication overhead remains low and prevent re-identification attacks, the user must disclose the first few bits of two hashed Rolling Proximity Identifiers. The risk associated to such a protocol is well documented in [12] and formal analysis of the properties of anonymised hashes can be found in [15]. Such protocols have been used widely in compromised credential checking systems, a privacy sensitive context.…”
Section: Security Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…There is a trade-off to this approach; to ensure both communication overhead remains low and prevent re-identification attacks, the user must disclose the first few bits of two hashed Rolling Proximity Identifiers. The risk associated to such a protocol is well documented in [12] and formal analysis of the properties of anonymised hashes can be found in [15]. Such protocols have been used widely in compromised credential checking systems, a privacy sensitive context.…”
Section: Security Discussionmentioning
confidence: 99%
“…Our prior work in [12] provides an empirical comparison of compromised credential checking (C3) protocols and defines novel protocols for minimising information loss. Whilst pure Private Set Intersection has a heavy computational and communication overhead, [13] has combined k-Anonymous protocols with Private Set Intersection to reduce this burden.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Here an adversary uses exposed passwords to try to log into user accounts on various web services, which succeeds frequently because of password reuse [22,36]. In response, practitioners have set up third-party services such as Have I Been Pwned (HIBP) [3,31] and Google Password Checkup (GPC) [38,41] that provide public APIs to check if a user's password has been exposed in known breaches. These breach-alerting services, also called compromised credential checking (C3) services, can help prevent credential stuffing attacks by alerting users to change their passwords.…”
Section: Introductionmentioning
confidence: 99%