2021
DOI: 10.1016/j.cose.2020.102068
|View full text |Cite
|
Sign up to set email alerts
|

Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…The LinkedIn Dataset is Not IID When we attempted to generate LP based upper/lower bounds for the LinkedIn frequency corpus [31] we discovered that there was no feasible solution that satisfies all of the constraints in LPlower and LPupper. This indicates that we cannot view the LinkedIn frequency corpus 𝑆 as consisting of 𝑁 independent samples from an unknown distribution i.e., the LinkedIn frequency corpus is inconsistent with any proposed password distribution D if the samples are drawn independently.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The LinkedIn Dataset is Not IID When we attempted to generate LP based upper/lower bounds for the LinkedIn frequency corpus [31] we discovered that there was no feasible solution that satisfies all of the constraints in LPlower and LPupper. This indicates that we cannot view the LinkedIn frequency corpus 𝑆 as consisting of 𝑁 independent samples from an unknown distribution i.e., the LinkedIn frequency corpus is inconsistent with any proposed password distribution D if the samples are drawn independently.…”
Section: Discussionmentioning
confidence: 99%
“…Two of the password datasets (Yahoo! [8,13] and LinkedIn [31]) are actually differentially private frequency lists and do not include plaintext passwords. For these datasets we can still apply our techniques to upper/lower bound πœ† 𝐺 , but we cannot compare our bounds with the empirical password cracking models.…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations
“…We consider nine empirical password datasets (along with their size Plaintext passwords are available for all datasets except for the differentially private LinkedIn [15] and Yahoo! [6,8] frequency corpuses which intentionally omit passwords.…”
Section: Empirical Password Datasetsmentioning
confidence: 99%