Proceedings of the 31st Annual Computer Security Applications Conference 2015
DOI: 10.1145/2818000.2818015
|View full text |Cite
|
Sign up to set email alerts
|

ErsatzPasswords

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…In their proposal and works building on it (e.g., [14]), the target is augmented with a trusted honeychecker that stores which of the passwords listed with the account is the user-chosen one; login attempts with others alert the site to its breach. Almeshekah et al [2] use a machine-dependent function (e.g., hardware security module) in the password hash at the target site to prevent offline cracking of its credential database if breached. Of more relevance here, an attacker who is unaware of this defense and so attempts to crack its database offline will produce plausible decoy passwords (ersatzpasswords) that, when submitted, alert the target site to its breach.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In their proposal and works building on it (e.g., [14]), the target is augmented with a trusted honeychecker that stores which of the passwords listed with the account is the user-chosen one; login attempts with others alert the site to its breach. Almeshekah et al [2] use a machine-dependent function (e.g., hardware security module) in the password hash at the target site to prevent offline cracking of its credential database if breached. Of more relevance here, an attacker who is unaware of this defense and so attempts to crack its database offline will produce plausible decoy passwords (ersatzpasswords) that, when submitted, alert the target site to its breach.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, DeBlasio et al report that sites' unwillingness to trust the evidence they provided of the sites' breaches was an obstacle to getting them to act. 2 Moreover, the utility of artificial accounts hinges critically on their indistinguishability from real ones, and if methods using them became effective in hindering attacker activity, ensuring the indistinguishability of these accounts would presumably become its own arms race. Our design is agnostic to whether it is deployed on real or decoy accounts, sidestepping the need for convincing decoy accounts but also demanding attention to the risks to real accounts that it might introduce.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We define deceptive defense systems as software, personnel, data, or policies to deceive attackers and decrease their ability to succeed. Examples include honeypots [12], honeyfiles [15], honeywords [9], and ErsatzPasswords [1].…”
Section: Information Security and Stability Analysismentioning
confidence: 99%
“…The EPW scheme [1] uses deception to protect salted password hashes (SHP) from offline brute-force attacks by modifying password hash creation. The term "ersatz password" can be interpreted as "fake passwords", i.e., not passwords of legitimate users in the system.…”
Section: Background On Security Controlmentioning
confidence: 99%