Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23268
|View full text |Cite
|
Sign up to set email alerts
|

From Very Weak to Very Strong: Analyzing Password-Strength Meters

Abstract: Millions of users are exposed to password-strength meters/checkers at highly popular web services that use userchosen passwords for authentication. Recent studies have found evidence that some meters actually guide users to choose better passwords-which is a fairly rare-bit of good news in password research. However, these meters are mostly based on ad-hoc design. At least, as we found, most vendors do not provide any explanation of their design choices, sometimes making them appear to be a black box. We analy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
53
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 98 publications
(56 citation statements)
references
References 18 publications
3
53
0
Order By: Relevance
“…The same observations were reported by de Carné de Carnavalet and Mannan in their work [3], in which they examined 13 PPCs deployed at 11 widely-used web services.…”
Section: Related Worksupporting
confidence: 74%
See 1 more Smart Citation
“…The same observations were reported by de Carné de Carnavalet and Mannan in their work [3], in which they examined 13 PPCs deployed at 11 widely-used web services.…”
Section: Related Worksupporting
confidence: 74%
“…Using purely client-side Web-based technologies, we implemented one possible PSV design as an open-source software tool on a 2-D animated canvas. We followed some educational principles to design and 3 In principle, a PSM algorithm can return more than one value each representing a different aspect of the password strength. Such algorithms are however very rare.…”
Section: Introductionmentioning
confidence: 99%
“…Historically, the strength of passwords against guessing attacks has been assessed by using password crackers to find weak passwords [42]. Recently much more precise techniques have been developed [8], [50], [13], [18], [22].…”
Section: Related Workmentioning
confidence: 99%
“…In analysis of real programs, these constraints could be much more complex. For instance, the targeted password could have additional strength requirements imposed [24] or the guess could be computed using automated rules by a tool [49]. Encoding such constraints may yield a complex set of constraints in the analysis.…”
Section: Introductionmentioning
confidence: 99%
“…We demonstrate the use of SMC to quantify the sensitive information leaked in several UNIX utilities when they operate on encrypted data as proposed in a recent work [46]. As a final case study, we use SMC to quantitatively compare the strength of three password meters in real-world websites -Ebay, Drupal and Microsoft, and measure their efficacy in preventing passwords that are known dictionary words [24].…”
Section: Introductionmentioning
confidence: 99%