Passtrans: an improved password reuse model based on transformer xiaoxi he haibo cheng * jiahong xie ping wang kaitai liang peking university { hxx2019, hbcheng, xjhshare, pwang } @pku.edu.cn delft university of technology kaitai.liang@tudelft.nl

HIGHLIGHTS

SUMMARY

    This fragile password generation may bring potential leakage risk to the new passwords once the old credentials are compromised, which is known as credential tweaking attack. In 2014, Das et_al first studied the threat of password reuse and proposed a cross-site password guessing algorithm. The output of their model is the transformation path of leaked passwords to targeted passwords. To characterize a user`s password reuse behavior, such as direct reuse (e_g, "password" → "password"), finetuning (e_g, "password" → "pa$$word") and irrelevant passwords (e_g, "chixue100" → "123456"), the authors propose PassTrans based on the transformer . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?