“…Therefore, the relation between the old and new password can be expressed as a set of constraints, and the attacker can use it to compute the size of solutions for new p. For example, consider the code snippet in Figure 1. Under the input old p = ab@123 and a new valid password, Lines 22,24,13,4,6,8,14,15,4,6,8,and 28 are executed. This path imposes the following constraints on new p:…”