Recoverable Identifier
advisory
doi_compliance
recoverable_identifier
DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/1866307.1866328;wgroup:string:acmETRA) was visible in the surrounding text but could not be confirmed against doi.org as printed.
Paper page Integrity report arXiv Try DOI
Evidence text
Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. 2010. The security of modern password expiration: An algorithmic framework and empirical analysis. Proceedings of the ACM Conference on Computer and Communications Security (2010), 176–186. doi:10.1145/1866307.1866328;WGROUP:STRING:ACM ETRA ’26, June 01–04, 2026, Marrakesh, Morocco Duru Paker, Suleyman Ozdel, and Enkelejda Kasneci A GPT-4o / DeepSeek Password Generation Prompt You are Password Booster. Receive a password as input and immediately return a single, stronger password derived from it. Make it stronger but still memorable. Your output MUST be exactly one line and contain ONLY the new password. No labels, no explanations, no formatting, no markdown, no prefixes, no suffixes. Just the password. A.1 Password Length Constraints Across Generators The password generation methods differed slightly in their length constraints: • ChatGPT and DeepSeek:No explicit length constraints were imposed. The models generated passwords freely based on the provided prompts. • PassGPT:Passwords were generated with a minimum length of five characters longer than the user’s initial input, with an upper bound of 16 characters. • Random generator:Passwords were constructed by ap- pending a random number of additional characters (between 2 and 4) to the user’s initial password. These differences should be considered when interpreting varia- tions in password length and entropy across generation methods. Table 3: Password length statistics
Evidence payload
{
"printed_excerpt": "Yinqian Zhang, Fabian Monrose, and Michael K. Reiter. 2010. The security of modern password expiration: An algorithmic framework and empirical analysis. Proceedings of the ACM Conference on Computer and Communications Security (2010), 176\u20131",
"reconstructed_doi": "10.1145/1866307.1866328;wgroup:string:acmETRA",
"ref_index": 44,
"resolved_title": null,
"verdict_class": "incontrovertible"
}