Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study

被引:3
|
作者
Shi, Ruixin [1 ,2 ]
Zhou, Yongbin [1 ,2 ]
Li, Yong [3 ]
Han, Weili [4 ,5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[4] Fudan Univ, Software Sch, Shanghai, Peoples R China
[5] Fudan Univ, Shanghai Key Lab Data Sci, Shanghai, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
SECURITY;
D O I
10.1155/2021/5563884
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers proposed several data-driven methods to efficiently guess user-chosen passwords for password strength metering or password recovery in the past decades. However, these methods are usually evaluated under ad hoc scenarios with limited data sets. Thus, this motivates us to conduct a systematic and comparative investigation with a very large-scale data corpus for such state-of-the-art cracking methods. In this paper, we present the large-scale empirical study on password-cracking methods proposed by the academic community since 2005, leveraging about 220 million plaintext passwords leaked from 12 popular websites during the past decade. Specifically, we conduct our empirical evaluation in two cracking scenarios, i.e., cracking under extensive-knowledge and limited-knowledge. The evaluation concludes that no cracking method may outperform others from all aspects in these offline scenarios. The actual cracking performance is determined by multiple factors, including the underlying model principle along with dataset attributes such as length and structure characteristics. Then, we perform further evaluation by analyzing the set of cracked passwords in each targeting dataset. We get some interesting observations that make sense of many cracking behaviors and come up with some suggestions on how to choose a more effective password-cracking method under these two offline cracking scenarios.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
    Ji, Shouling
    Yang, Shukun
    Hu, Xin
    Han, Weili
    Li, Zhigong
    Beyah, Raheem
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 550 - 564
  • [2] A Large-Scale Empirical Study of Conficker
    Shin, Seungwon
    Gu, Guofei
    Reddy, Narasimha
    Lee, Christopher P.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 676 - 690
  • [3] Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study
    Guo, Yao
    Wang, Chengke
    Chen, Xiangqun
    IEEE ACCESS, 2017, 5 : 13387 - 13400
  • [4] A Large-scale Analysis of the Mnemonic Password Advice
    Kiesel, Johannes
    Stein, Benno
    Lucks, Stefan
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [5] Towards Understanding Fixes of SonarQube Static Analysis Violations: A Large-Scale Empirical Study
    Yu, Ping
    Wu, Yijian
    Peng, Jiahan
    Zhang, Jian
    Xie, Peicheng
    Proceedings - 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2023, 2023, : 569 - 580
  • [6] A Large-Scale Empirical Study of Security Patches
    Li, Frank
    Paxson, Vern
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2201 - 2215
  • [7] Understanding participation in e-learning in organizations: a large-scale empirical study of employees
    Garavan, Thomas N.
    Carbery, Ronan
    O'Malley, Grace
    O'Donnell, David
    INTERNATIONAL JOURNAL OF TRAINING AND DEVELOPMENT, 2010, 14 (03) : 155 - 168
  • [8] Conficker and Beyond: A Large-Scale Empirical Study
    Shin, Seungwon
    Gu, Guofei
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 151 - 160
  • [9] Empirical Study of Unsupervised Chinese Word Segmentation Methods for SMT on Large-scale Corpora
    Wang, Xiaolin
    Utiyama, Masao
    Finch, Andrew Michael
    Sumita, Eiichiro
    PROCEEDINGS OF THE 52ND ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 2, 2014, : 752 - 758
  • [10] A Large-Scale Empirical Study of Android App Decompilation
    Mauthe, Noah
    Kargen, Ulf
    Shahmehri, Nahid
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 400 - 410