Measuring Real-World Accuracies and Biases in Modeling Password Guessability
Date: August 2015
Publication: Proceedings of the 24th USENIX Security Symposium, SEC'15
Source 1: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-ur.pdf
Source 2: http://www.ece.cmu.edu/~lbauer/papers/2015/usenix2015-guessing.pdf
Source 3: https://www.andrew.cmu.edu/user/nicolasc/publications/U+-USENIXSec15.pdf
Parameterized password guessability -- how many guesses a particular cracking algorithm with particular training data would take to guess a password -- has become a common metric of password security. Unlike statistical metrics, it aims to model real-world attackers and to provide per-password strength estimates. We investigate how cracking approaches often used by researchers compare to real-world cracking by professionals, as well as how the choice of approach biases research conclusions. We find that semi-automated cracking by professionals outperforms popular fully automated approaches, but can be approximated by combining multiple such approaches. These approaches are only effective, however, with careful configuration and tuning; in commonly used default configurations, they underestimate the real-world guessability of passwords.
We find that analyses of large password sets are often robust to the algorithm used for guessing as long as it is configured effectively. However, cracking algorithms differ systematically in their effectiveness guessing passwords with certain common features (e.g., character substitutions). This has important implications for analyzing the security of specific password characteristics or of individual passwords (e.g., in a password meter or security audit). Our results highlight the danger of relying only on a single cracking algorithm as a measure of password strength and constitute the first scientific evidence that automated guessing can often approximate guessing by professionals.
PasswordResearch.com Note: Additional unlisted authors: Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay. Video and audio of presentation available: https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur
Do you have additional information to contribute regarding this research paper? If so, please email email@example.com with the details.