pith. sign in

arxiv: 1706.01939 · v2 · pith:276PAZU4new · submitted 2017-06-06 · 💻 cs.CR

Empirical Analysis of Password Reuse and Modification across Online Service

classification 💻 cs.CR
keywords passwordacrosspasswordsmillionreusedservicesusersdifferent
0
0 comments X p. Extension
pith:276PAZU4 Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{276PAZU4}

Prints a linked pith:276PAZU4 badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Leaked passwords from data breaches can pose a serious threat to users if the password is reused elsewhere. With more online services getting breached today, there is still a lack of large-scale quantitative understanding of the risks of password reuse across services. In this paper, we analyze a large collection of 28.8 million users and their 61.5 million passwords across 107 services. We find that 38% of the users have reused exactly the same password across different sites, while 20% have modified an existing password to create new ones. In addition, we find that the password modification patterns are highly consistent across different user demographics, indicating a high predictability. To quantify the risk, we build a new training-based guessing algorithm, and show that more than 16 million password pairs can be cracked within just 10 attempts (30% of the modified passwords and all the reused passwords).

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.