Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978339
|View full text |Cite
|
Sign up to set email alerts
|

Targeted Online Password Guessing

Abstract: While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
221
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 262 publications
(230 citation statements)
references
References 22 publications
4
221
0
Order By: Relevance
“…As a demonstrator, the targeted dictionary attack currently gets the user's first and last names by asking them to log into his/her Facebook account via the Facebook API. This can be extended to cover more personal information such as what was used in [13,31].…”
Section: -D Canvas and Overall Look A 2-d Canvas Is Used As The Conmentioning
confidence: 99%
See 1 more Smart Citation
“…As a demonstrator, the targeted dictionary attack currently gets the user's first and last names by asking them to log into his/her Facebook account via the Facebook API. This can be extended to cover more personal information such as what was used in [13,31].…”
Section: -D Canvas and Overall Look A 2-d Canvas Is Used As The Conmentioning
confidence: 99%
“…Because the pervasive use of passwords, they are frequently targeted in cyber attacks and many large-scale password leakage incidents have been reported especially in recent years [9,22]. Password strengthening technologies such as password hashing and salting have been developed to provide more protection on passwords stored on the server side, but human users remain a weak link because they often choose weak passwords to compromise security for usability, thus making password cracking much more effective [11,17,31,32].…”
Section: Introductionmentioning
confidence: 99%
“…In the cryptanalysis of the two-factor authentication schemes, the adversary A is also supposed to have the following capacities [29,[47][48][49] …”
Section: The Capacities Of Adversarymentioning
confidence: 99%
“…is the running time for exclusive-or operation. |D pw | denotes the number of passwords in D pw , and |D pw | is very limited in practice [49,50]; usually |D pw | ≤ 10 6 ; so the above attack is quite efficient.…”
Section: Offline Dictionary Attack Via Verification Value Inmentioning
confidence: 99%
“…In addition, intrusion detection systems can also be classified as signature based or anomaly based depending upon the attack detection method. The signature-based systems are trained by extracting specific patterns (or signatures) from previously known attacks while the anomaly-based systems learn from the normal data collected when there is no anomalous activity [1,30,31,32,43]. The main purpose of an IDS is to detect as many attacks as possible with minimum number of false alarms, i.e., the system must be accurate in detecting attacks.…”
Section: Introductionmentioning
confidence: 99%