Journals

A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords

Enhanced Tacit Secrets

We explore the feasibility of Tacit Secrets: system-assigned pass- words that you can remember, but cannot write down or otherwise commu- nicate. We design an approach to creating Tacit Secrets based on Contextual Cueing, an implicit learning method …

On Password Behaviours and Attitudes in Different Populations [Author’s preprint]

In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. This leads us to ask whether other types of passwords (e.g., graphical) …

An Exploration of Geographic Authentication Schemes

We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPassNotes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes-an extension of …

Exploiting Predictability in Click-Based Graphical Passwords

We provide an in-depth study of the security of click-based graphical password schemes like PassPoints (Weidenbeck et al., 2005), by exploring popular points (hot-spots), and examining strategies to predict and exploit them in guessing attacks. We …

Purely Automated Attacks on PassPoints-Style Graphical Passwords

We introduce and evaluate various methods for purely automated attacks against PassPoints-style graphical passwords. For generating these attacks, we introduce a graph-based algorithm to efficiently create dictionaries based on heuristics such as …

On Predictive Models and User-Drawn Graphical Passwords

In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. This leads us to ask whether other types of passwords (e.g., graphical) …