The impact of exposed passwords on honeyword efficacy

Z Huang, L Bauer, MK Reiter - 33rd USENIX Security Symposium …, 2024 - usenix.org
Honeywords are decoy passwords that can be added to a credential database; if a login
attempt uses a honeyword, this indicates that the site's credential database has been …

Detection of Password Reuse and Credential Stuffing: A Server-side Approach

SS Konduru, S Mishra - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Considering password-based authentication technique, password memorability is a real
challenge on users. Hence, password reuse across different web applications is a common …

When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords

J Dani, B McCulloh, N Saxena - arXiv preprint arXiv:2407.16964, 2024 - arxiv.org
" Honeywords" have emerged as a promising defense mechanism for detecting data
breaches and foiling offline dictionary attacks (ODA) by deceiving attackers with false …

Bernoulli honeywords

KC Wang, MK Reiter - arXiv preprint arXiv:2212.12759, 2022 - arxiv.org
Decoy passwords, or" honeywords," planted in a credential database can alert a site to its
breach if ever submitted in a login attempt. To be effective, some honeywords must appear …

Enhancing security and usability in password-based web systems through standardized authentication interactions

A Gautam - 2024 - trace.tennessee.edu
Password-based authentication is the predominant method for securing access on the web,
yet it is fraught with challenges due to the web's lack of inherent design for authentication …

[PDF][PDF] Detecting Compromise of Passkey Storage on the Cloud

M Islam, SS Arora, R ChatterjeeO, KC Wang - pages.cs.wisc.edu
FIDO synced passkeys address account recovery challenges by enabling users to back up
their FIDO2 private signing keys to the cloud storage of passkey management services …