[go: up one dir, main page]

Komanduri et al., 2014 - Google Patents

Telepathwords: Preventing Weak Passwords by Reading {Users'} Minds

Komanduri et al., 2014

View PDF
Document ID
3539986413443144356
Author
Komanduri S
Shay R
Cranor L
Herley C
Schechter S
Publication year
Publication venue
23rd USENIX Security Symposium (USENIX Security 14)

External Links

Snippet

To discourage the creation of predictable passwords, vulnerable to guessing attacks, we present Telepathwords. As a user creates a password, Telepathwords makes realtime predictions for the next character that user will type. While the concept is simple, making …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Komanduri et al. Telepathwords: Preventing Weak Passwords by Reading {Users’} Minds
Shay et al. Designing password policies for strength and usability
Keith et al. The usability of passphrases for authentication: An empirical field study
Guo et al. Optiwords: A new password policy for creating memorable and strong passwords
Melicher et al. Usability and security of text passwords on mobile devices
Shay et al. Can long passwords be secure and usable?
Just et al. Personal choice and challenge questions: a security and usability assessment
Egelman et al. Does my password go up to eleven? The impact of password meters on password selection
Mazurek et al. Measuring password guessability for an entire university
Das et al. The tangled web of password reuse.
Houshmand et al. Building better passwords using probabilistic techniques
Li et al. A {Large-Scale} empirical analysis of chinese web passwords
Keith et al. A behavioral analysis of passphrase design and effectiveness
Yang et al. Free-form gesture authentication in the wild
Forget et al. Improving text passwords through persuasion
Bonneau et al. Linguistic properties of multi-word passphrases
Han et al. Regional patterns and vulnerability analysis of chinese web passwords
Han et al. Shadow attacks based on password reuses: A quantitative empirical analysis
Keszthelyi About passwords
Kanta et al. How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
Markert et al. On the security of smartphone unlock pins
Grobler et al. The importance of social identity on password formulations
Yang et al. Text entry method affects password security
Wang et al. Understanding passwords of Chinese users: Characteristics, security and implications
Thai et al. A statistical Markov-based password strength meter