Studying the Impact of Managers on Password Strength and Reuse

12/24/2017
by   Sanam Ghorbani Lyastani, et al.
0

Despite their well-known security problems, passwords are still the incumbent authentication method for virtually all online services. To remedy the situation, end-users are very often referred to password managers as a solution to the password reuse and password weakness problems. However, to date the actual impact of password managers on password security and reuse has not been studied systematically. In this paper, we provide the first large-scale study of the password managers' influence on users' real-life passwords. From 476 participants of an online survey on users' password creation and management strategies, we recruit 170 participants that allowed us to monitor their passwords in-situ through a browser plugin. In contrast to prior work, we collect the passwords' entry methods (e.g., human or password manager) in addition to the passwords and their metrics. Based on our collected data and our survey, we gain a more complete picture of the factors that influence our participants' passwords' strength and reuse. We quantify for the first time that password managers indeed benefit the password strength and uniqueness, however, also our results also suggest that those benefits depend on the users' strategies and that managers without password generators rather aggravate the existing problems.

READ FULL TEXT

page 7

page 9

page 12

research
05/27/2020

Code Duplication and Reuse in Jupyter Notebooks

Duplicating one's own code makes it faster to write software. This exped...
research
01/02/2023

Effect of emotions and personalisation on cancer website reuse intentions

The effect of emotions and personalisation on continuance use intentions...
research
05/11/2023

Traceability and Reuse Mechanisms, the most important Properties of Model Transformation Languages

Dedicated model transformation languages are claimed to provide many ben...
research
11/05/2021

Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version)

Online services like Google provide a variety of application programming...
research
11/20/2018

Evaluating the End-User Experience of Private Browsing Mode

Nowadays, all major web browsers have a private browsing mode. However, ...
research
09/14/2022

The Impact of Model Transformation Language Features on Quality Properties of MTLs: A Study Protocol

Background: Dedicated model transformation languages are claimed to prov...
research
08/24/2020

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

Personal Identification Numbers (PINs) are widely used as an access cont...

Please sign up or login with your details

Forgot password? Click here to reset