Graphical passwords: Learning from the first twelve years

R Biddle, S Chiasson, PC Van Oorschot - ACM Computing Surveys …, 2012 - dl.acm.org
Starting around 1999, a great many graphical password schemes have been proposed as
alternatives to text-based password authentication. We provide a comprehensive overview …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

An {Administrator's} Guide to Internet Password Research

D Florêncio, C Herley, PC Van Oorschot - 28th large installation system …, 2014 - usenix.org
The research literature on passwords is rich but little of it directly aids those charged with
securing web-facing services or setting policies. With a view to improving this situation we …

Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.

J Thorpe, PC van Oorschot - USENIX Security Symposium, 2007 - usenix.org
Although motivated by both usability and security concerns, the existing literature on click-
based graphical password schemes using a single background image (eg, PassPoints) has …

Improving password security and memorability to protect personal and organizational information

KPL Vu, RW Proctor, A Bhargav-Spantzel… - international journal of …, 2007 - Elsevier
Personal information and organizational information need to be protected, which requires
that only authorized users gain access to the information. The most commonly used method …

A large-scale evaluation of high-impact password strength meters

XDCD Carnavalet, M Mannan - ACM Transactions on Information and …, 2015 - dl.acm.org
Passwords are ubiquitous in our daily digital lives. They protect various types of assets
ranging from a simple account on an online newspaper website to our health information on …

Machine learning and soft computing for ICT security: an overview of current trends

F Camastra, A Ciaramella, A Staiano - Journal of Ambient Intelligence and …, 2013 - Springer
In the last years, people have been seeing the pervasive use of computer, communication
technology and Internet, eg, e-mail, online shopping, banking, gaming, Internet telephony …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …

A note on proactive password checking

JJ Yan - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
Nowadays, proactive password checking algorithms are based on the philosophy of the
dictionary attack, and they often fail to prevent some weak passwords with low entropy. In …

What lies beneath? Analyzing automated SSH bruteforce attacks

AR Abdou, D Barrera, PC van Oorschot - International conference on …, 2015 - Springer
We report on what we believe to be the largest dataset (to date) of automated secure shell
(SSH) bruteforce attacks. The dataset includes plaintext password guesses in addition to …