2012
DOI: 10.1007/978-1-4614-4878-5_2
|View full text |Cite
|
Sign up to set email alerts
|

The Benefits of Understanding Passwords

Abstract: We study passwords from the perspective of how they are generated, with the goal of better understanding how to distinguish good passwords from bad ones. Based on reviews of large quantities of passwords, we argue that users produce passwords using a small set of rules and types of components, both of which we describe herein. We build a parser of passwords, and show how this can be used to gain a better understanding of passwords, as well as to block weak passwords.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(25 citation statements)
references
References 14 publications
0
23
0
Order By: Relevance
“…If a password contains uppercase letters, digits, or symbols, they are often in predictable locations [3]. Furthermore, most character substitutions (e.g., replacing "e" with "3") found in passwords are predictable [21], [41]. The intuition behind blacklisting the N most common passwords is that users who otherwise would have chosen one of these common passwords will instead choose from a larger space of potential passwords, rather than one of the N next-mostcommon passwords.…”
Section: Background and Related Workmentioning
confidence: 99%
“…If a password contains uppercase letters, digits, or symbols, they are often in predictable locations [3]. Furthermore, most character substitutions (e.g., replacing "e" with "3") found in passwords are predictable [21], [41]. The intuition behind blacklisting the N most common passwords is that users who otherwise would have chosen one of these common passwords will instead choose from a larger space of potential passwords, rather than one of the N next-mostcommon passwords.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Many researchers use password corpora collected from various security leaks [14,24,26,35,53,55]. These corpora tend to be very large (tens of thousands to millions), and they represent in-use passwords selected by users.…”
Section: Password Corporamentioning
confidence: 99%
“…Prior password studies all have one or more of the following drawbacks: very small data sets [36], data from experimental studies rather than from deployed authentication systems [31], no access to plaintext passwords [3], self-reported password information [47], leaked data of questionable validity, or accounts of minimal value [26,53]. As a result, the important question of whether the results apply to real, high-value passwords has remained open.…”
Section: Introductionmentioning
confidence: 99%
“…Weak passwords [15] are a major cause of data and security breaches. SplashData reveals each year its annual 25 Worst Passwords of the Year list 2 .…”
Section: Related Workmentioning
confidence: 99%