Affiliation:
1. United States Air Force Academy, 2354 Farichild Dr, 6G-101, USAFA, Colorado 80840, USA
Abstract
Passwords are fundamental security vulnerabilities in many systems. Several researchers have investigated the trade-off between password memorability versus resiliency to cracking and have looked at alternative systems such as graphical passwords and biometrics. To create stronger passwords, many systems enforce rules regarding the required length and types of characters passwords must contain. Another suggested approach is to use passphrases to combat dictionary attacks. One common ‘trick’ used to remember passwords that conform to complex rules is to select a pattern of keys on the keyboard. Although appearing random, the pattern is easy to remember. The purpose of this research was to investigate how often patterns are used, whether patterns could be classified into common categories, and whether those categories could be used to attack and defeat pattern-based passwords. Visualization techniques were used to collect data and assist in pattern categorization. The approach successfully identified 2 out of 11 passwords in a real-world password file that were not discovered with a traditional dictionary attack. This article will present the approach used to collect and categorize patterns, and describe the resulting attack method that successfully identified passwords in a live system.
Subject
Computer Vision and Pattern Recognition
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AvoidPwd: A mnemonic password generation strategy based on keyboard transformation;China Communications;2022-10
2. A large-scale analysis of Wi-Fi passwords;Journal of Information Security and Applications;2022-06
3. VowPass: Novel Method to Generate Secure and Memorable Passwords;2021 4th International Conference on Signal Processing and Information Security (ICSPIS);2021-11-24
4. Password guessers under a microscope: an in-depth analysis to inform deployments;International Journal of Information Security;2021-08-23
5. Leet Usage and Its Effect on Password Security;IEEE Transactions on Information Forensics and Security;2021