Komanduri et al., 2014 - Google Patents
Telepathwords: Preventing Weak Passwords by Reading {Users'} MindsKomanduri et al., 2014
View PDF- Document ID
- 3539986413443144356
- Author
- Komanduri S
- Shay R
- Cranor L
- Herley C
- Schechter S
- Publication year
- Publication venue
- 23rd USENIX Security Symposium (USENIX Security 14)
External Links
Snippet
To discourage the creation of predictable passwords, vulnerable to guessing attacks, we present Telepathwords. As a user creates a password, Telepathwords makes realtime predictions for the next character that user will type. While the concept is simple, making …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Komanduri et al. | Telepathwords: Preventing Weak Passwords by Reading {Users’} Minds | |
| Shay et al. | Designing password policies for strength and usability | |
| Keith et al. | The usability of passphrases for authentication: An empirical field study | |
| Guo et al. | Optiwords: A new password policy for creating memorable and strong passwords | |
| Melicher et al. | Usability and security of text passwords on mobile devices | |
| Shay et al. | Can long passwords be secure and usable? | |
| Just et al. | Personal choice and challenge questions: a security and usability assessment | |
| Egelman et al. | Does my password go up to eleven? The impact of password meters on password selection | |
| Mazurek et al. | Measuring password guessability for an entire university | |
| Das et al. | The tangled web of password reuse. | |
| Houshmand et al. | Building better passwords using probabilistic techniques | |
| Li et al. | A {Large-Scale} empirical analysis of chinese web passwords | |
| Keith et al. | A behavioral analysis of passphrase design and effectiveness | |
| Yang et al. | Free-form gesture authentication in the wild | |
| Forget et al. | Improving text passwords through persuasion | |
| Bonneau et al. | Linguistic properties of multi-word passphrases | |
| Han et al. | Regional patterns and vulnerability analysis of chinese web passwords | |
| Han et al. | Shadow attacks based on password reuses: A quantitative empirical analysis | |
| Keszthelyi | About passwords | |
| Kanta et al. | How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts | |
| Markert et al. | On the security of smartphone unlock pins | |
| Grobler et al. | The importance of social identity on password formulations | |
| Yang et al. | Text entry method affects password security | |
| Wang et al. | Understanding passwords of Chinese users: Characteristics, security and implications | |
| Thai et al. | A statistical Markov-based password strength meter |