The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services

被引:28
|
作者
Wang, Chun [1 ]
Jan, Steve T. K. [1 ]
Hu, Hang [1 ]
Bossart, Douglas [1 ]
Wang, Gang [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24060 USA
关键词
D O I
10.1145/3176258.3176332
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Leaked passwords from data breaches can pose a serious threat if users reuse or slightly modify the passwords for other services. With more services getting breached today, there is still a lack of a quantitative understanding of this risk. In this paper, we perform the first large-scale empirical analysis of password reuse and modification patterns using a ground-truth dataset of 28.8 million users and their 61.5 million passwords in 107 services over 8 years. We find that password reuse and modification is very common (observed on 52% of the users). Sensitive online services such as shopping websites and email services received the most reused and modified passwords. We also observe that users would still reuse the already-leaked passwords for other online services for years after the initial data breach. Finally, to quantify the security risks, we develop a new training-based guessing algorithm. We show that more than 16 million password pairs (including 30% of the modified passwords) can be cracked within just 10 guesses.
引用
收藏
页码:196 / 203
页数:8
相关论文
共 29 条