Incentivizing Collaboration for Detection of Credential Database Breaches
Pith reviewed 2026-05-19 11:43 UTC · model grok-4.3
The pith
Sites improve their own breach detection by increasing monitoring of honeywords at other sites via favor exchanges.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Through a model-checking analysis, a site can improve its ability to detect its own breach when it increases the monitoring effort it expends for others, using an algorithm by which sites exchange monitoring favors for honeyword detection at other sites.
What carries the argument
The favor-exchange algorithm that lets sites trade monitoring efforts, with model checking used to verify that higher effort for others yields better own-site detection.
If this is right
- Sites that increase their monitoring effort for others achieve higher rates of detecting their own breaches.
- Detection effectiveness scales with parameters such as total monitoring volume and number of participating sites.
- The favor-exchange approach maintains performance when tested against real-world breached credential datasets.
- Quantified parameter effects support practical decisions on deploying a shared monitoring ecosystem.
Where Pith is reading between the lines
- Wider adoption could reduce the overall success of credential stuffing by making cross-site checks routine.
- The system might extend to automated protocols that penalize non-reporting to strengthen long-term participation.
- Similar favor-exchange ideas could apply to other collaborative security tasks like sharing indicators of compromise.
Load-bearing premise
Sites can reliably detect and report honeyword usage at other sites and will follow the favor-exchange protocol without strategic deviation or false reports.
What would settle it
A simulation or deployment where participating sites either fail to report honeyword detections accurately or deviate from the agreed favor exchanges, resulting in no measurable gain in breach detection rates.
Figures
read the original abstract
Decoy passwords, or ``honeywords,'' alert a site to its breach if entered in a login attempt on that site. However, an attacker can identify a user-chosen password from among the decoys, without alerting the site to its breach, via credential stuffing, i.e., entering the stolen passwords at another site where a user reused her password. Prior work thus proposed that sites monitor for the entry of their honeywords at other sites, but the incentives for sites to participate in this monitoring remain unclear. In this paper, we propose and evaluate an algorithm by which sites can exchange monitoring favors. Through a model-checking analysis, we show that a site can improve its ability to detect its own breach when it increases the monitoring effort it expends for others. We quantify how key parameters impact detection effectiveness and their implications for deploying a monitoring ecosystem. Finally, we evaluate our algorithm on a breached credential dataset, demonstrating effectiveness at scale.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes an algorithm for credential-storing sites to exchange monitoring favors for honeyword detections to counter credential-stuffing attacks. Through model-checking of a game-theoretic protocol, it claims that a site improves its own breach detection probability by increasing the monitoring effort it expends on behalf of other sites. The work quantifies the impact of key parameters on detection effectiveness and evaluates the algorithm on a real-world breached-credential dataset to demonstrate scalability.
Significance. If the central claim holds under realistic conditions, the result supplies a formal incentive mechanism for collaborative monitoring that could strengthen ecosystem-wide breach detection. The manuscript earns credit for employing model-checking to provide machine-checked support for the incentive property and for performing an independent evaluation on a large breached-credential dataset that shows effectiveness at scale.
major comments (1)
- [Abstract and evaluation sections] Abstract and evaluation sections: the model-checking analysis establishes the improvement claim only under the assumption that sites reliably detect honeyword usage at remote sites and submit reports honestly without strategic deviation or false positives. The transition rules and payoff functions embed this premise directly, yet no additional robustness checks or alternative strategies (e.g., withholding reports or injecting false positives) are explored; if such deviations are admitted, the verified property may cease to hold and the central claim becomes conditional on unverified behavioral assumptions.
minor comments (1)
- [Abstract] Abstract: error bars, sensitivity analysis with respect to monitoring-effort levels, and handling of false-positive reports are not mentioned, leaving gaps in the reported robustness.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. The major comment correctly identifies the scope of our modeling assumptions, which we address below.
read point-by-point responses
-
Referee: [Abstract and evaluation sections] Abstract and evaluation sections: the model-checking analysis establishes the improvement claim only under the assumption that sites reliably detect honeyword usage at remote sites and submit reports honestly without strategic deviation or false positives. The transition rules and payoff functions embed this premise directly, yet no additional robustness checks or alternative strategies (e.g., withholding reports or injecting false positives) are explored; if such deviations are admitted, the verified property may cease to hold and the central claim becomes conditional on unverified behavioral assumptions.
Authors: We agree that the model-checking analysis verifies the incentive property only under the assumptions of reliable honeyword detection and honest reporting, as directly encoded in the transition rules and payoff functions. The central claim of the paper is that, within this model, a site improves its own breach detection by increasing monitoring effort for others. We did not perform robustness checks against strategic deviations such as withholding reports or injecting false positives, because the work focuses on establishing the basic collaborative incentive mechanism rather than a full adversarial game. We will revise the abstract and evaluation sections to more explicitly state these assumptions and add a short discussion paragraph noting that analysis of strategic misbehavior is an important avenue for future work. revision: partial
Circularity Check
No significant circularity; model-checking derives property from explicitly defined game rules
full rationale
The central claim is established by model-checking a game with explicitly stated transition rules, payoff functions, and monitoring protocols. The verification result follows from the model definition rather than reducing to a fitted parameter or self-citation chain. The separate evaluation on an external breached-credential dataset provides an independent check. No load-bearing step equates the output to the input by construction, and the paper does not invoke prior self-authored uniqueness theorems or smuggle ansatzes.
Axiom & Free-Parameter Ledger
free parameters (1)
- monitoring effort level
axioms (1)
- domain assumption Sites can accurately detect and attribute honeyword usage at other sites
Reference graph
Works this paper leans on
-
[1]
M. Abdallah, P. Naghizadeh, A. R. Hota, T. Cason, S. Bagchi, and S. Sundaram. Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs. IEEE Transactions on Control of Network Systems , 7(4):1585–1596, 2020
work page 2020
-
[2]
M. Abdallah, D. Woods, P. Naghizadeh, I. Khalil, T. Cason, S. Sun- daram, and S. Bagchi. Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems. In IEEE Symposium on Security and Privacy , pages 249–266, 2022
work page 2022
-
[3]
I. Abraham, P. Jovanovic, M. Maller, S. Meiklejogn, G. Stern, and A. Tomescu. Reaching consensus for asynchronous distributed key generation. In 40th ACM Symposium on Principles of Distributed Computing, pages 363–373, 2021
work page 2021
-
[4]
I. Abraham, P. Jovanovic, M. Maller, S. Meiklejohn, and G. Stern. Bingo: Adaptivity and asynchrony in verifiable secret sharing and distributed key generation. In Advances in Cryptology – CRYPTO 2023, volume 14081 of Lecture Notes in Computer Science , August 2023
work page 2023
- [5]
-
[6]
M. AlSabah, G. Oligeri, and R. Riley. Your culture is in your password: An analysis of a demographically-diverse password dataset. Computers & Security, 77:427–441, 2018
work page 2018
-
[7]
A. Bandarupalli, A. Bhat, S. Bagchi, A. Kate, and M. K. Reiter. Random beacons in Monte Carlo: E fficient asynchronous random beacon without threshold cryptography. In 31st ACM Conference on Computer and Communications Security , 2024
work page 2024
-
[8]
B. Birnbaum, N. R. Devanur, and L. Xiao. Distributed algorithms via gradient descent for Fisher markets. In 12th ACM Conference on Electronic Commerce, pages 127–136, 2011
work page 2011
-
[9]
S. Br ˆanzei, N. Devanur, and Y . Rabani. Proportional dynamics in exchange economies. In 22nd ACM Conference on Economics and Computation, pages 180–201, 2021
work page 2021
- [10]
-
[11]
N. Chakraborty, J. Li, V . C. M. Leung, S. Mondal, Y . Pan, C. Luo, and M. Mukherjee. Honeyword-based authentication techniques for protecting passwords: A survey. ACM Computing Surveys , 55:1–37, 2022
work page 2022
-
[12]
Y . K. Cheung, R. Cole, and Y . Tao. Dynamics of distributed updating in Fisher markets. In 19th ACM Conference on Economics and Computation, pages 351–368, 2018
work page 2018
-
[13]
C. Cimpanu. 23,600 hacked databases have leaked from a defunct ’data breach index’ site. https: //www.zdnet.com /article /23600-hac ked-databases-have-leaked-from-a-defunct-data-breach-index-site /, November 2020
work page 2020
-
[14]
B. Cohen. Incentives build robustness in BitTorrent. http: //bittorrent .org/bittorrentecon.pdf, May 2003
work page 2003
-
[15]
A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang. The tangled web of password reuse. In 21st ISOC Network and Distributed System Security Symposium, 2014
work page 2014
-
[16]
S. Das, Z. Xiang, L. Kokoris-Kogias, and L. Ren. Practical asyn- chronous high-threshold distributed key generation and distributed polynomial sampling. In 32nd USENIX Security Symposium , August 2023
work page 2023
-
[17]
S. Das, T. Yurek, Z. Xiang, A. Miller, L. Kokoris-Kogias, and L. Ren. Practical asynchronous distributed key generation. In 43rd IEEE Symposium on Security and Privacy , pages 2518–2534, 2022
work page 2022
-
[18]
DATAtab Team. Kruskal-Wallis-test. https: //datatab.net/tutorial/kru skal-wallis-test
-
[19]
A. Davidson and C. Cid. An e fficient toolkit for computing private set operations. In 22nd Australasian Conference on Information Security and Privacy , volume 10343 of Lecture Notes in Computer Science , pages 261–278, July 2017
work page 2017
-
[20]
E. De Cristofaro, P. Gasti, and G. Tsudik. Fast and private computa- tion of cardinality of set intersection and union. In 11th International Conference on Cryptology and Network Security , volume 7712 of Lecture Notes in Computer Science , pages 218–231, 2012
work page 2012
-
[21]
L. F. de Souza, P. Kuznetsov, and A. Tonkikh. Distributed randomness from approximate agreement. In 36th International Conference on Distributed Computing, October 2022
work page 2022
-
[22]
J. DeBlasio, S. Savage, G. M. V oelker, and A. C. Snoeren. Tripwire: Inferring internet site compromise. In 17th Internet Measurement Conference, pages 341–354, 2017
work page 2017
-
[23]
S. K. Debnath and R. Dutta. Secure and e fficient private set intersec- tion cardinality using Bloom filter. In 18th International Conference on Information Security , volume 9290 of Lecture Notes in Computer Science, pages 209–226, September 2015
work page 2015
-
[24]
A. Dionysiou, V . Vassiliades, and E. Athanasopoulos. Honeygen: generating honeywords using representation learning. In 16th ACM Symposium on Information, Computer and Communications Security , 2021
work page 2021
-
[25]
C. Duma, M. Karresand, N. Shahmehri, and G. Caronni. A trust- aware, P2P-based overlay for intrusion detection. In 17th International Workshop on Database and Expert Systems Applications , pages 692– 697, 2006
work page 2006
-
[26]
R. Egert, M. Fischlin, D. Gens, S. Jacob, M. Senker, and J. Till- manns. Privately computing set-union and set-intersection cardinality via Bloom filters. In 20th Australasian Conference on Information Security and Privacy , volume 9144 of Lecture Notes in Computer Science, 2015
work page 2015
-
[27]
D. Endler. How much data was leaked to cybercriminals in 2020 — and what they’re doing with it. https: //www.forbes.com/councils/fo rbestechcouncil /2021/04/20/how-much-data-was-leaked-to-cybercr iminals-in-2020---and-what-theyre-doing-with-it /, April 2021
work page 2020
-
[28]
I. Erguler. Achieving flatness: Selecting the honeywords from existing user passwords. IEEE Transactions on Parallel and Distributed Systems, 13(2), 2016
work page 2016
-
[29]
C. Fung. Design and Management of Collaborative Intrusion Detec- tion Networks. PhD thesis, University of Waterloo, 2013
work page 2013
-
[30]
C. J. Fung and Q. Zhu. FACID: A trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Networks , 53:17–31, 2016
work page 2016
-
[31]
Y . Gao, Y . Lu, Z. Lu, Q. Tang, J. Xu, and Z. Zhang. E fficient asynchronous Byzantine agreement without private setups. In 42nd IEEE International Conference on Distributed Computing Systems , pages 246–257, July 2022
work page 2022
-
[32]
B. Garbinato and I. Rickebusch. Impossibility results on fair ex- change. In 10th International Conference on Innovative Internet Community Systems, pages 507–518, 2010
work page 2010
- [33]
-
[34]
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology, 20:51–83, 2007
work page 2007
-
[35]
DFINITY Technology Overview Series, Consensus System
T. Hanke, M. Movahedi, and D. Williams. DFINITY technology overview series, consensus system. arXiv:1805.04548 [cs.DC], 2018
work page internal anchor Pith review Pith/arXiv arXiv 2018
-
[36]
A. R. Hota, A. A. Clements, S. Bagchi, and S. Sundaram. A game- theoretic framework for securing interdependent assets in networks. In Game Theory for Security and Risk Management , pages 157–184. Springer, 2018
work page 2018
- [37]
-
[38]
T. Hunt. Have I been pwned? https: //haveibeenpwned.com
-
[39]
T. Hunt. Here’s why [insert thing here] is not a password killer. https://www.troyhunt.com/heres-why-insert-thing-here-is-not-a-pas sword-killer/, 05 November 2018
work page 2018
-
[40]
T. Hunt. Inside the cit0day breach collection. https: //www.troyhunt .com/inside-the-cit0day-breach-collection /, November 2020
work page 2020
-
[41]
Cost of a data breach report 2024
IBM. Cost of a data breach report 2024. https: //www.ibm.com/repo rts/data-breach, 2024
work page 2024
-
[42]
R. W. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to- peer approach to network intrusion detection and prevention. In 12th IEEE International Workshop on Enabling Technologies: Infrastruc- ture for Collaborative Enterprises , June 2003
work page 2003
- [43]
-
[44]
A. Juels and R. L. Rivest. Honeywords: Making password-cracking detectable. In 20th ACM Conference on Computer and Communica- tions Security, pages 145–160, 2013
work page 2013
-
[45]
A. Kate and I. Goldberg. Distributed key generation for the Internet. In 29th IEEE International Conference on Distributed Computing Systems, June 2009
work page 2009
-
[46]
J. Kelsey, L. T. A. N. Brand ˜ao, R. Peralta, and H. Booth. A reference for randomness beacons: Format and protocol version 2. https: //doi. org/10.6028/NIST.IR.8213-draft, May 2019
-
[47]
J. Kim, M. Song, M. Seo, Y . Jin, and S. Shin. P assREfinder: Credential stu ffing risk prediction by representing password reuse between websites on a graph. In 45th IEEE Symposium on Security and Privacy, May 2024
work page 2024
-
[48]
L. Kissner and D. Song. Privacy-preserving set operations. In Advances in Cryptology – CRYPTO 2005 , volume 3621 of Lecture Notes in Computer Science , pages 241–257, August 2005
work page 2005
-
[49]
E. Kokoris-Kogias, D. Malkhi, and A. Spiegelman. Asynchronous distributed key generation for computationally secure randomness, consensus, and threshold signatures. In 27th ACM Conference on Computer and Communications Security , pages 1751–1767, Novem- ber 2020
work page 2020
-
[50]
Y . Kolumbus, M. Levy, and N. Nisan. Asynchronous proportional response dynamics: Convergence in markets with adversarial schedul- ing. In 37th Conference on Neural Information Processing Systems , pages 25409–25434, 2023
work page 2023
-
[51]
H. Kunreuther and G. Heal. Interdependent security. Journal of Risk and Uncertainty, 26:231–249, 2003
work page 2003
-
[52]
M. Kwiatkowska, G. Norman, and D. Parker. PRISM 4.0: Verification of probabilistic real-time systems. In International Conference on Computer Aided Verification, 2011
work page 2011
-
[53]
K. Lai, L. Rasmusson, E. Adar, L. Zhang, and B. A. Huberman. Tycoon: An implementation of a distributed, market-based resource allocation system. Multiagent and Grid Systems, 1(3):169–182, 2005
work page 2005
- [54]
-
[55]
M. Lelarge and J. Bolot. A local mean field analysis of security investments in networks. In 3rd Workshop on Economics of Networked Systems, pages 25–30, 2008
work page 2008
-
[56]
R. Lemos. Credential stu ffing reaches 193 billion login attempts annually. https: //www.darkreading.com /cloud-security /credential -stuffing-reaches-193-billion-login-attempts-annually, 19 May 2021
work page 2021
- [57]
-
[58]
G. Ling, P. Tang, and W. Qiu. E fficient updatable PSI from asym- metric PSI and PSU. Cryptology ePrint Archive, Paper 2024 /1712, 2024
work page 2024
-
[59]
J. Lou, A. M. Smith, and Y . V orobeychik. Multidefender security games. IEEE Intelligent Systems , 32(1):50–60, 2017
work page 2017
-
[60]
D. Malkhi and M. K. Reiter. An architecture for survivable coordina- tion in large distributed systems. IEEE Transactions on Knowledge and Data Engineering , 12(2), March /April 2000
work page 2000
- [61]
-
[62]
In 13thSymposium on Usable Privacy and Security , pages 13– 28, 2017
work page 2017
- [63]
-
[64]
R. A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos. Security decision-making among interdependent organizations. In 21st IEEE Computer Security Foundations Symposium , pages 66–80, 2008
work page 2008
-
[65]
K. C. Nguyen, T. Alpcan, and T. Basar. Stochastic games for security in networks with interdependent nodes. In 1st International Conference on Game Theory for Networks , pages 697–703, 2009
work page 2009
-
[66]
National Council of ISACs. About isacs. https: //www.nationalisacs. org/about-isacs, 2025
work page 2025
-
[67]
OneCloud. What is the average response time to detect a cyber breach in 2024? https: //www.onecloud.com.au/resources/what-is-the-avera ge-response-time-to-detect-a-cyber-breach-in-2024 /, 4 September 2024
work page 2024
-
[68]
P. S. Oruganti, P. Naghizadeh, and Q. Ahmed. The impact of network design interventions on the security of interdependent systems. IEEE Transactions on Control of Network Systems , 11(1):173–184, 2023
work page 2023
-
[69]
H. Pagnia and F. C. G ¨artner. On the impossibility of fair exchange without a trusted third party. Technical Report TUD-BS-1999-02, De- partment of Computer Science, Darmstadt University of Technology, March 1999
work page 1999
-
[70]
B. Pal, M. Islam, M. Sanusi, N. Sullivan, L. Valenta, T. Whalen, C. Wood, T. Ristenpart, and R. Chattejee. Might I get pwned: A second generation compromised credential checking service. In 31st USENIX Security Symposium , August 2022
work page 2022
-
[71]
S. Pearman, J. Thomas, P. E. Naeini, H. Habib, L. Bauer, N. Christin, L. F. Cranor, S. Egelman, and A. Forget. Let’s go in for a closer look: Observing passwords in their natural habitat. In 24th ACM Conference on Computer and Communications Security , October 2017
work page 2017
-
[72]
A. Pfitzmann and M. Waidner. Networks without user observability. Computers & Security, 6(2):158–166, April 1987
work page 1987
- [73]
-
[74]
J. Pullman, K. Thomas, and E. Bursztein. Protect your accounts from data breaches with Password Checkup. https: //security.googleblog.co m/2019/02/protect-your-accounts-from-data.html, 5 February 2019
work page 2019
- [75]
-
[76]
Business churn rate by industry
Recurly Research. Business churn rate by industry. https: //recurly.co m/research/churn-rate-benchmarks/, 2024
work page 2024
-
[77]
H. Robbins. A remark on Stirling’s formula. The American Mathe- matical Monthly, 62(1):26–29, 1955
work page 1955
-
[78]
T. Sandholm and X. Wang. (Im)possibility of safe exchange mech- anism design. In 18th AAAI Conference on Artificial Intelligence , pages 338–344, 2002
work page 2002
-
[79]
E. Stobert and R. Biddle. The password life cycle. ACM Transactions on Privacy and Security , 21(3):1–32, 2018
work page 2018
-
[80]
R. Terry. Honey accounts explained. https: //www.crowdstrike.com/en -us/cybersecurity-101 /identity-protection /honey-account /, 7 January 2025
work page 2025
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.