fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars

@article{Wang2016fuzzyPSMAN,
  title={fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars},
  author={Ding Wang and Debiao He and Haibo Cheng and Ping Wang},
  journal={2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},
  year={2016},
  pages={595-606}
}
To provide timely feedbacks to users, nearly every respectable Internet service now imposes a password strength meter (PSM) upon user registration or password change. It is a rare bit of good news in password research that well-designed PSMs do help improve the strength of user-chosen passwords. However, leading PSMs in the industrial world (e.g., Zxcvbn, KeePSM and NIST PSM) are mainly composed of simple heuristic rules and found to be highly inaccurate, while state-of-the-art PSMs from… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

On the Accuracy of Password Strength Meters

ACM Conference on Computer and Communications Security • 2018
View 18 Excerpts
Highly Influenced

Authentication by Encrypted Negative Password

IEEE Transactions on Information Forensics and Security • 2019

A Technique Based on the Module-K Super Graceful Labelling for Designing New-Type Graphical Passwords

2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC) • 2018
View 1 Excerpt

Password Replacement Patterns

2018 5th International Conference on Control, Decision and Information Technologies (CoDIT) • 2018
View 1 Excerpt

CombinedPWD: A New Password Authentication Mechanism Using Separators Between Keystrokes

2017 13th International Conference on Computational Intelligence and Security (CIS) • 2017
View 1 Excerpt

Zipf’s Law in Passwords

IEEE Transactions on Information Forensics and Security • 2014
View 4 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 51 references

China’s Internet users zoom to 668 million, July 2015, https: //www.techinasia.com/chinas-internet-thirdlargest-country-earth

C. Custer
2015
View 8 Excerpts
Highly Influenced

Details on the quality/strength estimations in KeePass, July 2015, http://keepass.info/help/kb/pw quality est.html

D. Reichl
2015
View 9 Excerpts
Highly Influenced

A Study of Probabilistic Password Models

2014 IEEE Symposium on Security and Privacy • 2014
View 13 Excerpts
Highly Influenced

NIST SP800-63-2: Electronic authentication guideline

W. Burr, D. Dodson, R. Perlner, S. Gupta, E. Nabbus
National Institute of Standards and Technology, Reston, VA, Tech. Rep., Aug. 2013. • 2013
View 7 Excerpts
Highly Influenced

The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords

2012 IEEE Symposium on Security and Privacy • 2012
View 4 Excerpts
Highly Influenced

Password Cracking Using Probabilistic Context-Free Grammars

2009 30th IEEE Symposium on Security and Privacy • 2009
View 4 Excerpts
Highly Influenced

A modification of kendall’s tau for the case of arbitrary ties in both rankings

L. M. Adler
J. Amer. Statist. Assoc., vol. 52, no. 277, pp. 33–35, 1957. • 1957
View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…