Passgan: A deep learning approach for password guessing

B Hitaj, P Gasti, G Ateniese, F Perez-Cruz - Applied Cryptography and …, 2019 - Springer
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …

Fast, lean, and accurate: Modeling password guessability using neural networks

W Melicher, B Ur, SM Segreti, S Komanduri… - 25th USENIX Security …, 2016 - usenix.org
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …

A Systematic Review on Password Guessing Tasks

W Yu, Q Yin, H Yin, W Xiao, T Chang, L He, L Ni, Q Ji - Entropy, 2023 - mdpi.com
Recently, many password guessing algorithms have been proposed, seriously threatening
cyber security. In this paper, we systematically review over thirty methods for password …

Improving password guessing via representation learning

D Pasquini, A Gangwal, G Ateniese… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Learning useful representations from unstructured data is one of the core challenges, as
well as a driving force, of modern data-driven approaches. Deep learning has demonstrated …

PassGPT: password modeling and (guided) generation with large language models

J Rando, F Perez-Cruz, B Hitaj - European Symposium on Research in …, 2023 - Springer
Large language models (LLMs) successfully model natural language from vast amounts of
text without the need for explicit supervision. In this paper, we investigate the efficacy of …

Machine learning and soft computing for ICT security: an overview of current trends

F Camastra, A Ciaramella, A Staiano - Journal of Ambient Intelligence and …, 2013 - Springer
In the last years, people have been seeing the pervasive use of computer, communication
technology and Internet, eg, e-mail, online shopping, banking, gaming, Internet telephony …

Guessing human-chosen secrets

J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …

PassMon: a technique for password generation and strength estimation

S Murmu, H Kasyap, S Tripathy - Journal of Network and Systems …, 2022 - Springer
The password is the most prevalent and reliant mode of authentication by date. We often
come across many websites with user registration pages having different password strength …

Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method

Y Sui, X Zou, EY Du, F Li - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
A large portion of system breaches are caused by authentication failure, either during the
login process or in the post-authentication session; these failures are themselves related to …

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites

Y He, EE Alem, W Wang - Frontiers of Computer Science, 2020 - Springer
Password authentication is vulnerable to dictionary attacks. Password strength
measurement helps users to choose hard-to-guess passwords and enhance the security of …