Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information

08/28/2020
by   Salman Salamatian, et al.
0

According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which m adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords 𝐗 of length n, generated independently and identically from a distribution P_X, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information 𝐘_(m) are generated independently from passing 𝐗 through a memoryless channel P_Y|X, as the length of the password n goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/11/2018

Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks

Consider the problem of guessing the realization of a random vector X by...
research
05/29/2018

Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

In September 2017, McAffee Labs quarterly report estimated that brute fo...
research
04/23/2019

Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks

The Lightning Network is the most widely used payment channel network (P...
research
06/22/2019

Protecting shared information in networks: a network security game with strategic attacks

A digital security breach, by which confidential information is leaked, ...
research
05/28/2022

Contributor-Aware Defenses Against Adversarial Backdoor Attacks

Deep neural networks for image classification are well-known to be vulne...
research
09/16/2020

Perfectly Secure Message Transmission against Rational Adversaries

Secure Message Transmission (SMT) is a two-party cryptographic protocol ...
research
11/20/2017

Model Extraction Warning in MLaaS Paradigm

Cloud vendors are increasingly offering machine learning services as par...

Please sign up or login with your details

Forgot password? Click here to reset