Publication | Closed Access
A study of personal information in human-chosen passwords and its security implications
109
Citations
25
References
2016
Year
Unknown Venue
EngineeringUsable SecurityInformation SecurityBiometricsInformation ForensicsMulti-factor AuthenticationCommunicationText MiningHardware SecurityNatural Language ProcessingSecurity ImplicationsData ScienceComputational LinguisticsSecurity AwarenessPersonal InformationUser PasswordsPersonal-pcfg Cracks PasswordsInternet SecurityIdentity-based SecurityKnowledge DiscoveryData PrivacyComputer ScienceLeaked DatasetData SecurityCryptographyAttack ModelHuman-chosen PasswordsAuthentication Access Control
Though not recommended, Internet users often include parts of personal information in their passwords for easy memorization. However, the use of personal information in passwords and its security implications have not yet been studied systematically in the past. In this paper, we first dissect user passwords from a leaked dataset to investigate how and to what extent user personal information resides in a password. In particular, we extract the most popular password structures expressed by personal information and show the usage of personal information. Then we introduce a new metric called Coverage to quantify the correlation between passwords and personal information. Afterwards, based on our analysis, we extend the Probabilistic Context-Free Grammars (PCFG) method to be semantics-rich and propose Personal-PCFG to crack passwords by generating personalized guesses. Through offline and online attack scenarios, we demonstrate that Personal-PCFG cracks passwords much faster than PCFG and makes online attacks much easier to succeed.
| Year | Citations | |
|---|---|---|
Page 1
Page 1