Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Machine learning enabled industrial iot security: Challenges, trends and solutions

C Ni, SC Li - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract Introduction: The increasingly integrated Industrial IoT (IIoT) with industrial systems
brings benefits such as intelligent analytics, predictive maintenance, and remote monitoring …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Passgan: A deep learning approach for password guessing

B Hitaj, P Gasti, G Ateniese, F Perez-Cruz - Applied Cryptography and …, 2019 - Springer
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable
users to check billions of passwords per second against password hashes. In addition to …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Fast, lean, and accurate: Modeling password guessability using neural networks

W Melicher, B Ur, SM Segreti, S Komanduri… - 25th USENIX Security …, 2016 - usenix.org
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …

zxcvbn:{Low-Budget} Password Strength Estimation

DL Wheeler - 25th USENIX Security Symposium (USENIX Security …, 2016 - usenix.org
zxcvbn: Low-Budget Password Strength Estimation Page 1 This paper is included in the
Proceedings of the 25th USENIX Security Symposium August 10–12, 2016 • Austin, TX …

The impact of information security threat awareness on privacy-protective behaviors

S Mamonov, R Benbunan-Fich - Computers in Human Behavior, 2018 - Elsevier
In this study, we examine how to motivate computer users to protect themselves from
potential security and privacy threats. We draw on the Information Processing framework …

Do users' perceptions of password security match reality?

B Ur, J Bees, SM Segreti, L Bauer, N Christin… - Proceedings of the …, 2016 - dl.acm.org
Although many users create predictable passwords, the extent to which users realize these
passwords are predictable is not well understood. We investigate the relationship between …

Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability

B Ur, SM Segreti, L Bauer, N Christin… - 24th USENIX Security …, 2015 - usenix.org
Parameterized password guessability—how many guesses a particular cracking algorithm
with particular training data would take to guess a password—has become a common metric …