Targeted Online Password Guessing: An Underestimated Threat

Slides:



Advertisements
Similar presentations
Your Security in the IT Market Beyond the MD5 Collisions Daniel Joščák, S.ICZ a.s. & MFF UK 04/05/2007, SPI Brno.
Advertisements

How the Private Virtual Office delivers Scalable and Elastic computing resources to your Organization Without Additional Investment in Server Capacity.
Miguel E. Andrés. What is information leakage? An incident where the confidentiality of information has been compromised. Examples [2010] Gmail accounts.
1 Financial Mathematics Clicker review session, Final.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
OCFS: Optimal Orthogonal Centroid Feature Selection for Text Categorization Jun Yan, Ning Liu, Benyu Zhang, Shuicheng Yan, Zheng Chen, and Weiguo Fan et.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Better Air Quality in Asian and Pacific Rim Cities (BAQ 2002) December 2002, Hong Kong SAR The Trend of Acid Rain in China W. Wang 1,3, T. Wang 2,
Enter User Id and Password Click on Submit Press Place Order Button.
Databases and security continued CMSC 461 Michael Wilson.
Honey Encryption: Security Beyond the Brute-Force Bound
The Online Activity Module User Account and Contact Us June 5, 2013.
TAD Screen Shots Kevin Coombes, et al.. TAD TAD (Tissue Array Database) is an SQL database and ASP front end for tissue microarrays The screen shots in.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Национальная процедура одобрения и регистрации проектов (программ) международной технической помощи (исключая представление информации об организации и.
8.1.4 Can it still be factored? Factoring Completely I can factor out a common factor.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Institute of International Studies Tsinghua University
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Versatile online trading platform – “Shareetrade” Move to a higher level in online trading with Shareetrade - arguably the fastest and most robust trading.
Scientific Method Hypothesis. I. Hypothesis 1) Possible explanation for __________OR for a __________ that can be _________ 2) A ___________ about the.
Detecting Signal from Data with Noise Xianyao Chen Meng Wang, Yuanling Zhang, Ying Feng Zhaohua Wu, Norden E. Huang Laboratory of Data Analysis and Applications,
UI Tags of Struts2. May 12, 2011 Struts 2.x Tags in detail:- The Struts 2.x tags can be classified under the following categories. i) UI Tags ii) Control.
Honeywords: Making Passwords-Cracking Detectable Ari Jules, Ronald L. Rivest Presented by: Karthik Padullaparty | kpad470 October 14, Karthik Padullaparty.
Facial Smile Detection Based on Deep Learning Features Authors: Kaihao Zhang, Yongzhen Huang, Hong Wu and Liang Wang Center for Research on Intelligent.
PASSWORD tYPOS and How to Correct Them Securely R. Chatterjee, A. Athalye, D. Akhawe, A. Juels, T. Ristenpart To typo is human; to tolerate, divine.
ΟΡΓΑΝΩΣΗ ΚΑΙ ΔΙΟΙΚΗΣΗ ΕΠΙΧΕΙΡΗΣΕΩΝ 3 Ο ΜΑΘΗΜΑ. ΟΙ ΜΕΓΑΛΕΣ ΕΠΙΧΕΙΡΗΣΕΙΣ Η δημιουργία μεγάλων επιχειρήσεων είναι ένα από τα χαρακτηριστικά του 20 ου αιώνα.
Safe Computing Protect your electronic profile means protecting You and Case Information Security Office, ITS Case Western Reserve University 2015 Information.
A Collaborative Quality Ranking Framework for Cloud Components
Understanding The Computer Login Account
Understanding Human-Chosen PINs:
Penetration Testing Offline Password Cracking
Targeted Online Password Guessing: An Underestimated Threat
Account Access Request Procedures
The Perfect Marriage! Ephesians 5:21-33.
FuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic
Show Call Manager.
drainage lymphatique - 6Sense
Tips on Password Safety Taylor Palmer
Tangled Web of Password Reuse
AIRS Sounding and Cloud Property Study
Quicken capital one download error
smartmail & smartportal: Introducing Two-Factor Authentication
Consulting 2.0.
Account Access Request Procedures
Account Access Request Procedures
ОПЕРАТИВНА ПРОГРАМА “ИНОВАЦИИ И КОНКУРЕНТОСПОСОБНОСТ“ „Подобряване на производствения капацитет в МСП“
Фейлетоните на Алеко Константинов
Measuretwicemedia.com. Santa Barbara SEO SEO Salt Lake City.
GANG: Detecting Fraudulent Users in OSNs
Solving Equations 3x+7 –7 13 –7 =.
Information Security – Sep 18
Title Layout Subtitle.
Account Access Request Procedures
Mingzhen Mo and Irwin King
Example Make x the subject of the formula
Account Access Request Procedures
Yahoo Mail Password Reset Support help Number
Fig. 1 Examples of experimental stimuli and behavioral performance.
Account Access Request Procedures
Account Access Request Procedures
No-Jump-into-Latency in China's Internet
U A B II III I IV 94.
Characterizing Pixel Tracking through the Lens of Disposable Services
Presentation transcript:

Targeted Online Password Guessing: An Underestimated Threat ACM CCS 2016 Ding Wang, Zijian Zhang, Ping Wang (Peking University,China) Jeff Yan (Lancaster University, UK) Xinyi Huang (Fujian Normal University, China)

Real-world password datasets Five Chinese datasets, Five English ones A total of 95.83 million

Real-world personal info datasets Three Chinese ones, One English Finally, we get 7 PII-associated datasets by by matching email with password datasets.

Experimental results on normal users With 100 guesses, TarGuess-I outperforms Personal-PCFG by 46%; TarGuess-II outperforms Das et al. ‘s by 72%; Both TarGuess-III and IV gain 73%+ success rates.

on security-savvy users Experimental results on security-savvy users With 100 guesses, TarGuess-I outperforms Personal-PCFG by 142%; TarGuess-II outperforms Das et al. ‘s by 169%; Both TarGuess-III and IV gain 32%+ success rates.

——A further validation Experimental results ——A further validation Cracking real Xiaomi cloud accounts 5.3K Xiaomi MD5-salted hashes, obtained by matching the 8.28 million Xiaomi dataset with the 130K 12306 dataset using email. Very consistent results with these plaintext-based experiments on normal users.

THANK YOU & QUESTIONS