From Very Weak to Very Strong: Analyzing Password-Strength Meters

@inproceedings{Carnavalet2014FromVW,
  title={From Very Weak to Very Strong: Analyzing Password-Strength Meters},
  author={Xavier de Carn{\'e} de Carnavalet and Mohammad Mannan},
  booktitle={NDSS},
  year={2014}
}
Millions of users are exposed to password-strength meters/checkers at highly popular web services that use userchosen passwords for authentication. Recent studies have found evidence that some meters actually guide users to choose better passwords—which is a rare bit of good news in password research. However, these meters are mostly based on ad-hoc design. At least, as we found, most vendors do not provide any explanation of their design choices, sometimes making them appear to be a black box… CONTINUE READING
Highly Influential
This paper has highly influenced 15 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 94 citations. REVIEW CITATIONS
63 Citations
35 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 63 extracted citations

94 Citations

010203020142015201620172018
Citations per Year
Semantic Scholar estimates that this publication has 94 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 35 references

Character encoding issues for web passwords

  • J. Bonneau, R. Xu
  • Web 2.0 Security & Privacy (W2SP’12), San…
  • 2012
Highly Influential
4 Excerpts

Using probabilistic techniques to aid in password cracking attacks

  • C. M. Weir
  • Ph.D. dissertation, Florida State University, Mar…
  • 2010
Highly Influential
11 Excerpts

John the Ripper password cracker

  • OpenWall.com
  • http://www. openwall.com/john.
Highly Influential
9 Excerpts

A state-of-the-art password strength analysis demonstrator

  • N. V. Heijningen
  • Master’s thesis, Rotterdam University, June 2013.
  • 2013
Highly Influential
4 Excerpts

zxcvbn: realistic password strength estimation

  • D. Wheeler
  • Dropbox blog article (Apr. 10, 2012). https…
  • 2012
Highly Influential
3 Excerpts

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331

  • ArsTechnica.com
  • news article (May 27, 2013). http://arstechnica…
  • 2013
3 Excerpts

Similar Papers

Loading similar papers…