Security challenges in industry 4.0 plc systems

J Hajda, R Jakuszewski, S Ogonowski - Applied Sciences, 2021 - mdpi.com
The concept of the fourth industrial revolution assumes the integration of people and digitally
controlled machines with the Internet and information technologies. At the end of 2015, more …

GNPassGAN: improved generative adversarial networks for trawling offline password guessing

F Yu, MV Martin - 2022 IEEE European Symposium on Security …, 2022 - ieeexplore.ieee.org
The security of passwords depends on a thorough understanding of the strategies used by
attackers. Unfortunately, real-world adversaries use pragmatic guessing tactics like …

Password policies of most top websites fail to follow best practices

K Lee, S Sjöberg, A Narayanan - Eighteenth Symposium on Usable …, 2022 - usenix.org
We examined the policies of 120 of the most popular websites for when a user creates a
new password for their account. Despite well-established advice that has emerged from the …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Chunk-level password guessing: Towards modeling refined password composition representations

M Xu, C Wang, J Yu, J Zhang, K Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Textual password security hinges on the guessing models adopted by attackers, in which a
suitable password composition representation is an influential factor. Unfortunately, the …

" It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users' Misconceptions About {FIDO2} Biometric {WebAuthn}

L Lassak, A Hildebrandt, M Golla, B Ur - 30th USENIX Security …, 2021 - usenix.org
While prior attempts at passwordless authentication on the web have required specialized
hardware, FIDO2's WebAuthn protocol lets users sign into websites with their smartphone …

A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead

C Reuter, LL Iacono, A Benlian - Behaviour & Information …, 2022 - Taylor & Francis
In the last decades, research has shown that both technical solutions and user perceptions
are important to improve security and privacy in the digital realm. The field of 'usable …

A {Two-Decade} Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords

A Nisenoff, M Golla, M Wei, J Hainline… - 32nd USENIX Security …, 2023 - usenix.org
Credential-guessing attacks often exploit passwords that were reused across a user's online
accounts. To learn how organizations can better protect users, we retrospectively analyzed …

They would do better if they worked together: The case of interaction problems between password managers and websites

N Huaman, S Amft, M Oltrogge… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Password managers are tools to support users with the secure generation and storage of
credentials and logins used in online accounts. Previous work illustrated that building …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …