HIGHLIGHTS
SUMMARY
This fragile password generation may bring potential leakage risk to the new passwords once the old credentials are compromised, which is known as credential tweaking attack. In 2014, Das et_al first studied the threat of password reuse and proposed a cross-site password guessing algorithm. The output of their model is the transformation path of leaked passwords to targeted passwords. To characterize a user`s password reuse behavior, such as direct reuse (e_g, "password" → "password"), finetuning (e_g, "password" → "pa$$word") and irrelevant passwords (e_g, "chixue100" → "123456"), the authors propose PassTrans based on the transformer . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.