That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers

08/09/2019
by   Sean Oesch, et al.
0

Password managers have the potential to help users more effectively manage their passwords and address many of the concerns surrounding password-based authentication, however prior research has identified significant vulnerabilities in existing password managers. Since that time, five years has passed, leaving it unclear whether password managers remain vulnerable or whether they are now ready for broad adoption. To answer this question, we evaluate thirteen popular password managers and consider all three stages of the password manager lifecycle--password generation, storage, and autofill. Our evaluation is the first analysis of password generation in password managers, finding several non-random character distributions and identifying instances where generated passwords were vulnerable to online and offline guessing attacks. For password storage and autofill, we replicate past evaluations, demonstrating that while password managers have improved in the half-decade since those prior evaluations, there are still significant issues, particularly with browser-based password managers; these problems include unencrypted metadata, unsafe defaults, and vulnerabilities to clickjacking attacks. Based on our results, we identify password managers to avoid, provide recommendations on how to improve existing password managers, and identify areas of future research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/25/2022

XDRI Attacks - and - How to Enhance Resilience of Residential Routers

We explore the security of residential routers and find a range of criti...
research
07/28/2020

Coding Practices and Recommendations of Spring Security for Enterprise Applications

Spring security is tremendously popular among practitioners for its ease...
research
10/21/2022

Approaches to Identify Vulnerabilities to Misinformation: A Research Agenda

Given the prevalence of online misinformation and our scarce cognitive c...
research
11/21/2019

Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications

We systematize software side-channel attacks with a focus on vulnerabili...
research
05/29/2023

Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

Chatbots shifted from rule-based to artificial intelligence techniques a...
research
07/18/2023

Application of BadNets in Spam Filters

Spam filters are a crucial component of modern email systems, as they he...

Please sign up or login with your details

Forgot password? Click here to reset