Home > Research > Publications & Outputs > Targeted online password guessing

Electronic data

  • ccs16

    Accepted author manuscript, 3.43 MB, PDF document

Links

Text available via DOI:

View graph of relations

Targeted online password guessing: an underestimated threat

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Targeted online password guessing: an underestimated threat. / Wang, Ding; Zhang, Zijian; Wang, Ping et al.
CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016. p. 1242-1254.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Wang, D, Zhang, Z, Wang, P, Yan, J & Huang, X 2016, Targeted online password guessing: an underestimated threat. in CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 1242-1254, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 24/10/16. https://doi.org/10.1145/2976749.2978339

APA

Wang, D., Zhang, Z., Wang, P., Yan, J., & Huang, X. (2016). Targeted online password guessing: an underestimated threat. In CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1242-1254). ACM. https://doi.org/10.1145/2976749.2978339

Vancouver

Wang D, Zhang Z, Wang P, Yan J, Huang X. Targeted online password guessing: an underestimated threat. In CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2016. p. 1242-1254 doi: 10.1145/2976749.2978339

Author

Wang, Ding ; Zhang, Zijian ; Wang, Ping et al. / Targeted online password guessing : an underestimated threat. CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2016. pp. 1242-1254

Bibtex

@inproceedings{fc0b37e249b846bea752127b41de0df3,
title = "Targeted online password guessing: an underestimated threat",
abstract = "While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small. We propose TarGuess, a framework that systematically characterizes typical targeted guessing scenarios with seven sound mathematical models, each of which is based on varied kinds of data available to an attacker. These models allow us to design novel and efficient guessing algorithms. Extensive experiments on 10 large real-world password datasets show the effectiveness of TarGuess. Particularly, TarGuess I~IV capture the four most representative scenarios and within 100 guesses: (1) TarGuess-I outperforms its foremost counterpart by 142% against security-savvy users and by 46% against normal users; (2) TarGuess-II outperforms its foremost counterpart by 169% on security-savvy users and by 72% against normal users; and (3) Both TarGuess-III and IV gain success rates over 73% against normal users and over 32% against security-savvy users. TarGuess-III and IV, for the first time, address the issue of cross-site online guessing when given the victim's one sister password and some PII.",
author = "Ding Wang and Zijian Zhang and Ping Wang and Jeff Yan and Xinyi Huang",
year = "2016",
month = oct,
day = "24",
doi = "10.1145/2976749.2978339",
language = "English",
isbn = "9781450341394",
pages = "1242--1254",
booktitle = "CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",
note = "CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ; Conference date: 24-10-2016",

}

RIS

TY - GEN

T1 - Targeted online password guessing

T2 - CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security

AU - Wang, Ding

AU - Zhang, Zijian

AU - Wang, Ping

AU - Yan, Jeff

AU - Huang, Xinyi

PY - 2016/10/24

Y1 - 2016/10/24

N2 - While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small. We propose TarGuess, a framework that systematically characterizes typical targeted guessing scenarios with seven sound mathematical models, each of which is based on varied kinds of data available to an attacker. These models allow us to design novel and efficient guessing algorithms. Extensive experiments on 10 large real-world password datasets show the effectiveness of TarGuess. Particularly, TarGuess I~IV capture the four most representative scenarios and within 100 guesses: (1) TarGuess-I outperforms its foremost counterpart by 142% against security-savvy users and by 46% against normal users; (2) TarGuess-II outperforms its foremost counterpart by 169% on security-savvy users and by 72% against normal users; and (3) Both TarGuess-III and IV gain success rates over 73% against normal users and over 32% against security-savvy users. TarGuess-III and IV, for the first time, address the issue of cross-site online guessing when given the victim's one sister password and some PII.

AB - While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information such as one sister password leaked from her another account and some personally identifiable information (PII). A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small. We propose TarGuess, a framework that systematically characterizes typical targeted guessing scenarios with seven sound mathematical models, each of which is based on varied kinds of data available to an attacker. These models allow us to design novel and efficient guessing algorithms. Extensive experiments on 10 large real-world password datasets show the effectiveness of TarGuess. Particularly, TarGuess I~IV capture the four most representative scenarios and within 100 guesses: (1) TarGuess-I outperforms its foremost counterpart by 142% against security-savvy users and by 46% against normal users; (2) TarGuess-II outperforms its foremost counterpart by 169% on security-savvy users and by 72% against normal users; and (3) Both TarGuess-III and IV gain success rates over 73% against normal users and over 32% against security-savvy users. TarGuess-III and IV, for the first time, address the issue of cross-site online guessing when given the victim's one sister password and some PII.

U2 - 10.1145/2976749.2978339

DO - 10.1145/2976749.2978339

M3 - Conference contribution/Paper

SN - 9781450341394

SP - 1242

EP - 1254

BT - CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

Y2 - 24 October 2016

ER -