Label-only model inversion attacks: Attack with the least information

T Zhu, D Ye, S Zhou, B Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In a model inversion attack, an adversary attempts to reconstruct the training data records of
a target model using only the model's output. In launching a contemporary model inversion …

Honeyword-based authentication techniques for protecting passwords: A survey

N Chakraborty, J Li, VCM Leung, S Mondal… - ACM Computing …, 2022 - dl.acm.org
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest
in 2013, has emerged as a security mechanism that can provide security against server-side …

No single silver bullet: Measuring the accuracy of password strength meters

D Wang, X Shan, Q Dong, Y Shen, C Jia - 32nd USENIX Security …, 2023 - usenix.org
To help users create stronger passwords, nearly every respectable web service adopts a
password strength meter (PSM) to provide real-time strength feedback upon user …

Password guessing using random forest

D Wang, Y Zou, Z Zhang, K Xiu - 32nd USENIX Security Symposium …, 2023 - usenix.org
Passwords are the most widely used authentication method, and guessing attacks are the
most effective method for password strength evaluation. However, existing password …

Honey, i chunked the passwords: Generating semantic honeywords resistant to targeted attacks using pre-trained language models

F Yu, MV Martin - International Conference on Detection of Intrusions and …, 2023 - Springer
Honeywords are fictitious passwords inserted into databases in order to identify password
breaches. The major challenge is producing honeywords that are difficult to distinguish from …

{Pass2Edit}: A {Multi-Step} Generative Model for Guessing Edited Passwords

D Wang, Y Zou, YA Xiao, S Ma, X Chen - 32nd USENIX Security …, 2023 - usenix.org
While password stuffing attacks (that exploit the direct password reuse behavior) have
gained considerable attention, only a few studies have examined password tweaking …

[PDF][PDF] The impact of exposed passwords on honeyword efficacy

Z Huang, L Bauer, MK Reiter - arXiv preprint arxiv:2309.10323, 2023 - usenix.org
Honeywords are decoy passwords that can be added to a credential database; if a login
attempt uses a honeyword, this indicates that the site's credential database has been …

QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage

J Jiang, D Wang, G Zhang - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Cloud storage provides an efficient and convenient way to manage data, but it also poses
significant challenges to data security. The central issue with cloud storage is to ensure the …

The tables have turned: GPT-3 distinguishing passwords from honeywords

N Chakraborty, Y Yamout… - 2023 IEEE Conference …, 2023 - ieeexplore.ieee.org
In the field of information security, there has been a noteworthy trend toward leveraging
machine learning models to develop and exploit security solutions. The emergence of …

Universal neural-cracking-machines: Self-configurable password models from auxiliary data

D Pasquini, G Ateniese, C Troncoso - arXiv preprint arXiv:2301.07628, 2023 - arxiv.org
We introduce the concept of" universal password model"--a password model that, once pre-
trained, can automatically adapt its guessing strategy based on the target system. To …