- document
-
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...journal article 2023
- document
-
Li, Wenting (author), Yang, Jiahong (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Modeling password distributions is a fundamental problem in password security, benefiting the research and applications on password guessing, password strength meters, honey password vaults, etc. As one of the best segment-based password models, WordPCFG has been proposed to capture individual semantic segments (called words) in passwords....conference paper 2023
- document
-
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...journal article 2021