Bernoulli honeywords

12/24/2022
by   Ke Coby Wang, et al.
0

Decoy passwords, or “honeywords,” planted in a credential database can alert a site to its breach if ever submitted in a login attempt. To be effective, some honeywords must appear at least as likely to be user-chosen passwords as the real ones, and honeywords must be very difficult to guess without having breached the database, to prevent false breach alarms. These goals have proved elusive, however, for heuristic honeyword generation algorithms. In this paper we explore an alternative strategy in which the defender treats honeyword selection as a Bernoulli process in which each possible password (except the user-chosen one) is selected as a honeyword independently with some fixed probability. We show how Bernoulli honeywords can be integrated into two existing system designs for leveraging honeywords: one based on a honeychecker that stores the secret index of the user-chosen password in the list of account passwords, and another that does not leverage secret state at all. We show that Bernoulli honeywords enable analytic derivation of false breach-detection probabilities irrespective of what information the attacker gathers about the sites' users; that their true and false breach-detection probabilities demonstrate compelling efficacy; and that Bernoulli honeywords can even enable performance improvements in modern honeyword system designs.

READ FULL TEXT
research
09/19/2023

The Impact of Exposed Passwords on Honeyword Efficacy

Honeywords are decoy passwords that can be added to a credential databas...
research
06/29/2022

Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

We propose a biometric identification system where the chosen- and gener...
research
08/25/2021

Testing for directed information graphs

In this paper, we study a hypothesis test to determine the underlying di...
research
07/03/2023

A Comparative Study of Software Secrets Reporting by Secret Detection Tools

Background: According to GitGuardian's monitoring of public GitHub repos...
research
07/27/2021

Estudo Abordando o Contexto de Notícias Falsas em Países de Língua Portuguesa (Fake News)

This work consists of a study that addresses the context of false news i...
research
03/16/2023

Secret-Keeping in Question Answering

Existing question-answering research focuses on unanswerable questions i...
research
03/16/2023

MASCARA: Systematically Generating Memorable And Secure Passphrases

Passwords are the most common mechanism for authenticating users online....

Please sign up or login with your details

Forgot password? Click here to reset