Abstract
AbstractPassword management has long been a persistently challenging task. This led to the introduction of password management software, which has been around for at least 25 years in various forms, including desktop and browser-based applications. This work assesses the ability of two dozen password managers, 12 desktop applications, and 12 browser plugins, to effectively protect the confidentiality of secret credentials in six representative scenarios. Our analysis focuses on the period during which a Password Manager (PM) resides in the RAM. Despite the sensitive nature of these applications, our results show that across all scenarios, only three desktop PM applications and two browser plugins do not store plaintext passwords in the system memory. Oddly enough, at the time of writing, only two vendors recognized the exploit as a vulnerability, reserving CVE-2023-23349, while the rest chose to disregard or underrate the issue.
Publisher
Springer Nature Switzerland
Reference32 articles.
1. AlessandroZ: LaZagne. https://github.com/AlessandroZ/LaZagne. Accessed 14 Jan 2024
2. Apostolopoulos, D., Marinakis, G., Ntantogian, C., Xenakis, C.: Discovering authentication credentials in volatile memory of android mobile devices. In: Conference on e-Business, e-Services and e-Society, pp. 178–185 (2013)
3. Barten, D.: Client-side attacks on the lastpass browser extension (2019). https://api.semanticscholar.org/CorpusID:153315475
4. C.E.: Pandora. https://github.com/efchatz/pandora. Accessed 14 Jan 2024
5. Carr, M., Shahandashti, S.F.: Revisiting security vulnerabilities in commercial password managers. In: ICT Systems Security and Privacy Protection, pp. 265–279 (2020)