Corpus ID: 12251269

Modeling Password Guessing with Neural Networks

@inproceedings{Castro2017ModelingPG,
  title={Modeling Password Guessing with Neural Networks},
  author={Leo de Castro and Hunter Lang and Stephanie Liu and Cristina Mata},
  year={2017}
}
Passwords still dominate the authentication space, but they are vulnerable to many different attacks; in recent years, guessing attacks in particular have notably caused a few high-profile information leaks. Password strength checkers, which attempt to guard against guessing attacks by enforcing heuristics like length and character variety, only model resistance to these brute-force attacks by proxy. In this paper, we reproduce the work of Melicher et. al [1], designing a strength checker that… Expand
2 Citations

Figures from this paper

Adversarial Password Cracking
Password generation is a very common security issue. Users are faced with the problem of choosing good passwords and trying to make sure that the password they choose is as robust as possible. InExpand
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
TLDR
A survey on state-of-the-art deep learning methods for password guessing and password strength evaluation, including password pattern extraction, candidate password generation and passwords strength measurement is made. Expand

References

SHOWING 1-5 OF 5 REFERENCES
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
TLDR
This work proposes using artificial neural networks to model text passwords' resistance to guessing attacks, and implements the first principled client-side model of password guessing, which analyzes a password's resistance to a guessing attack of arbitrary duration with sub-second latency. Expand
zxcvbn: Low-Budget Password Strength Estimation
  • Dan Wheeler
  • Computer Science
  • USENIX Security Symposium
  • 2016
For over 30 years, password requirements and feedback have largely remained a product of LUDS: counts of lowerand uppercase letters, digits and symbols. LUDS remains ubiquitous despite being aExpand
Monte Carlo Strength Evaluation.
  • Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS
  • 2015
The police tool that pervs use to steal nude pics from Apples iCloud
  • Wired, September
  • 2014
The police tool that pervs use to steal nude pics from Apples iCloud. Wired