论文标题

怀疑论:自动,合理和保护隐私的密码组成策略选择

Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection

论文作者

Johnson, Saul, Ferreira, João F., Mendes, Alexandra, Cordry, Julien

论文摘要

在受密码保护的系统上执行密码组成策略的选择代表了一个重要的安全决策,并且已证明会显着影响用户选择的密码对猜测攻击的脆弱性。但是,实际上,此选择通常不是严格或合理的,系统管理员仅基于直觉选择密码组成策略倾向。在这项工作中,我们提出了一种新颖的方法,该方法借鉴了密码概率分布,该密码概率分布由大量现实密码数据构建,这些密码数据已根据各种密码组成策略过滤。然后对密码概率进行重新分配以模拟不同的用户密码重新选择行为,以自动确定密码组成策略,该策略将诱导具有最大均匀性的用户选择密码的分布,这是我们证明这是对密码猜测攻击的整体抵抗力的有用代理。此外,我们表明,通过将幂律方程拟合到我们生成的密码概率分布中,我们可以证明我们对密码组成策略的选择是合理的,而无需直接访问用户密码数据。最后,我们提出怀疑论者 - 一种实现此方法的软件工具包,包括DSL,可以使无需密码安全背景的系统管理员比较和排名密码组成策略,而无需求助于昂贵且耗时的用户研究。利用3个数据集中的205,176,321个通用单词,我们通过证明结果与以前对密码组成策略有效性的经验研究的发现紧密相符,使我们的方法有效性。

The choice of password composition policy to enforce on a password-protected system represents a critical security decision, and has been shown to significantly affect the vulnerability of user-chosen passwords to guessing attacks. In practice, however, this choice is not usually rigorous or justifiable, with a tendency for system administrators to choose password composition policies based on intuition alone. In this work, we propose a novel methodology that draws on password probability distributions constructed from large sets of real-world password data which have been filtered according to various password composition policies. Password probabilities are then redistributed to simulate different user password reselection behaviours in order to automatically determine the password composition policy that will induce the distribution of user-chosen passwords with the greatest uniformity, a metric which we show to be a useful proxy to measure overall resistance to password guessing attacks. Further, we show that by fitting power-law equations to the password probability distributions we generate, we can justify our choice of password composition policy without any direct access to user password data. Finally, we present Skeptic -- a software toolkit that implements this methodology, including a DSL to enable system administrators with no background in password security to compare and rank password composition policies without resorting to expensive and time-consuming user studies. Drawing on 205,176,321 pass words across 3 datasets, we lend validity to our approach by demonstrating that the results we obtain align closely with findings from a previous empirical study into password composition policy effectiveness.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源