• Publications
  • Influence
Measuring Real-World Accuracies and Biases in Modeling Password Guessability
TLDR
We investigate how cracking approaches often used by researchers compare to real-world cracking by professionals, as well as how the choice of approach biases research conclusions. Expand
  • 128
  • 22
  • PDF
Usability and Security of Text Passwords on Mobile Devices
TLDR
We compare the strength and usability of passwords created on mobile devices with those created and used on desktops, while varying password policy requirements and input methods. Expand
  • 72
  • 8
  • PDF
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab
TLDR
We found that most participants had a well-defined process for creating passwords. Expand
  • 110
  • 7
  • PDF
Can long passwords be secure and usable?
TLDR
We find that policies requiring longer passwords with fewer additional requirements can be more usable and in some cases more secure than this traditional policy. Expand
  • 117
  • 6
  • PDF
Designing Password Policies for Strength and Usability
TLDR
We examine password-composition policies that are both more usable and more secure than commonly used policies that emphasize complexity. Expand
  • 77
  • 6
  • PDF
Design of a new cable-driven manipulator with a large open lumen: Preliminary applications in the minimally-invasive removal of osteolysis
TLDR
A dexterous manipulator with a large open lumen is presented. Expand
  • 87
  • 4
  • PDF
Do Users' Perceptions of Password Security Match Reality?
TLDR
We investigate users' perceptions of the strength of specific passwords and their actual strength. Expand
  • 111
  • 3
  • PDF
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior
TLDR
This paper examines how feedback and guidance affect password security and usability. Expand
  • 63
  • 3
  • PDF
Diversify to Survive: Making Passwords Stronger with Adaptive Policies
TLDR
In this paper, we investigate the usability and security of adaptive password-composition policies, which dynamically change password requirements over time as users create new passwords. Expand
  • 28
  • 1
  • PDF
Cable length estimation for a compliant surgical manipulator
TLDR
This paper presents a method for estimating drive cable length in an underactuated, hyper-redundant, snake-like manipulator. Expand
  • 25
  • 1