About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_34,
        author={Qiying Dong and Ding Wang and Yaosheng Shen and Chunfu Jia},
        title={PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Password authentication Targeted guessing Password strength meter Personally identifiable information Password probabilistic model},
        doi={10.1007/978-3-031-25538-0_34}
    }
    
  • Qiying Dong
    Ding Wang
    Yaosheng Shen
    Chunfu Jia
    Year: 2023
    PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_34
Qiying Dong1, Ding Wang1,*, Yaosheng Shen2, Chunfu Jia1
  • 1: College of Cyber Science, Nankai University
  • 2: School of ECE, Peking University Shenzhen Graduate School
*Contact email: wangding@nankai.edu.cn

Abstract

In recent years, unending breaches of users’ personally identifiable information (PII) have become increasingly severe, making targeted password guessing using PII a practical threat. However, to our knowledge, most password strength meters (PSMs) only consider the traditional trawling password guessing threat, and no PSM has taken into account the more severe targeted guessing threat using PII (e.g., name, birthday, and phone number). To fill this gap, in this paper, we mainly focus on targeted password strength evaluation in the scenario where users’ PII is available to the attacker. First, to capture more fine-grained password structures, we introduce the high-frequency substring as a new grammar tag into leading targeted password probabilistic models TarGuess-I and TarMarkov, and propose TarGuess-I-H and TarMarkov-H. Then, we weight and combine our two improved models to devise PII-PSM,the first practicaltargeted PSM resistant to common PII-accessible attackers. By using the weighted Spearman (WSpearman) metric recommended at CCS’18, we evaluate the accuracy of our PII-PSM and its counterparts (i.e., our TarGuess-I-H and TarMarkov-H, as well as two benchmarks of Optimal and Minauto). We conduct evaluation experiments on password datasets leaked from eight high-profile English and Chinese services. Results show that our PII-PSM is more accurate than TarGuess-I-H and TarMarkov-H, and is closer to Optimal and Minauto, with WSpearman differences of only 0.014(\sim )0.023 and 0.012(\sim )0.031, respectively. This establishes the accuracy of PII-PSM, facilitating to nudge users to select stronger passwords.

Keywords
Password authentication Targeted guessing Password strength meter Personally identifiable information Password probabilistic model
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_34
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL