Proceedings of the 2017 Internet Measurement Conference 2017
DOI: 10.1145/3131365.3131391
|View full text |Cite
|
Sign up to set email alerts
|

Tripwire

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The importance of a quantifiably low false-alarm rate, particularly for breach detection, was detailed in stark terms by the Tripwire study [14]. In this study, researchers worked with an email provider to monitor for logins to fake email accounts, each used to register a decoy account with the same password at another site.…”
Section: False Alarms In Breach Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…The importance of a quantifiably low false-alarm rate, particularly for breach detection, was detailed in stark terms by the Tripwire study [14]. In this study, researchers worked with an email provider to monitor for logins to fake email accounts, each used to register a decoy account with the same password at another site.…”
Section: False Alarms In Breach Detectionmentioning
confidence: 99%
“…Any login to an email account suggested that the site hosting its decoy account had been breached-assuming the email provider itself had not been breached-since the only places where that password (or a hash thereof) existed were the email provider and the site hosting that decoy account. Despite DeBlasio, et al disclosing 18 apparent site breaches (and the Tripwire methodology) to the relevant site administrators, only onethird responded at all, only one indicated that it would force a password reset, and none notified their users [14,Sec. 6.3].…”
Section: False Alarms In Breach Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various other works have leveraged decoy accounts to detect credential database breaches, i.e., accounts with no owner that, if ever accessed, reveal the breach of the account's site or a site where a replica of the account was created (e.g., [14,21]). In Tripwire [13], each decoy account is registered with a distinct email address and password, for which the password at the email provider is the same. Any login to the email account (provided that the email provider is itself not compromised) suggests the breach of the website where that email address was used to register an account.…”
Section: Related Workmentioning
confidence: 99%
“…The paper concludes, "A major open question, however, is how much (probative, but not particularly illustrative) evidence produced by an external monitoring system like Tripwire is needed to convince operators to act, such as notifying their users and forcing a password reset"[13, Section 8].…”
mentioning
confidence: 99%