passwords 2015 Dec. 7, 2015 to Dec. 9, 2015, cambridge,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote:The History Of L0phtCrack Chris Wysopal N/A
Keynote:Users hate passwords - so are they on their way out? Angela Sasse M. Angela Sasse is the Professor of Human-Centred Technology at University College London. A usability ...
Expert Password Management Robert Biddle , Elizabeth Stobert Experts are often asked for advice about password management, but how do experts manage their ...
Analyzing 4 Million Real-World Personal Knowledge Questions Markus Dürmuth , Maximilian Golla Personal Knowledge Questions are widely used for fallback authentication, i.e., recovering access to an account ...
Strengthening Public Key Authentication against Key Theft Martin Kleppmann , Conrad Irwin Authentication protocols based on an asymmetric keypair provide strong authentication as long as the private ...
Efficient Wordlists - Why you don't need 25GB To Be a Pro Dimitri Fousekis A common question asked by many who wish to analyse, "crack" or recover passwords is ...
HPKP, HSTS & CSP for securing your password Scott Helme Scott is an information security consultant at Pentest Limited. He has received worldwide attention for ...
Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev Based on the analysis of 6-digit combinations(OTP) generated by DIGIPASS GO3 we were able to ...
Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework Stefan Lucks , Jakob Wenzel Catena is a password-scrambling framework characterized by its high flexibility. The user (defender) can simply ...
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks Paul Van Oorschot , David Barrera , Abdelrahman Abdou We report on what we believe to be the largest dataset (to date) of automated ...
Preventing Keystroke Dynamics: The Hard Way Per Thorsheim , Paul Moore Per Thorsheim is the founder & main organizer of PasswordsCon. During daytime he works as ...
Rethinking factors, and(not) to store oracles Jeffrey Goldberg Multi-factor Authentication is typically thought of in terms of "something you have", "something you know", ...
BitLocker Dictionary Attack using GPUs Elena Agostini , Massimo Bernaschi BitLocker is a full-disk encryption feature included in recent Windows versions. It is designed to ...
Debunking Graphical Passwords Myths Jeunese Payne There have been numerous attempts to replace or re-design knowledge-based authentication. Despite these endeavours, driven ...
Framework for Comparing Password Guessing Strategies Maximillian Golla Several password guessers have been proposed in recent years. Comparing the reported performance numbers is ...
Assessing the User Experience of Password Reset Policies in a University M. angela Sasse , Kat Krol , Simon Parkin , Samy Driss Organisations may secure system access through use of passwords that comply with defined complexity rules. ...
Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones Bruno Crispo , Attaullah Buriro , Filippo Delfrari , Jeffrey Klardie , Konrad Wrona In this paper, we propose a new multi-modal behavioural biometric that uses features collected while ...
Linguistic Cracking of Passphrases using Markov Chains Peder Simovits In order to remember long passwords, it is not uncommon users are recommended to create ...
Beyond words Sebastein Raveau XKCD's "correcthorsebatterystaple" suggestion is often dismissed on the basis that trying word combinations is still ...
Verification Code Forwarding Attack Nasir Memon , Seyedhossein Siadati , Toan Nguyen Major Internet service providers deploy SMS-based verification mechanisms to fortify the security of users' accounts ...
On Password-Authenticated Key Exchange Security Modeling Jean Lancrenon Deciding which security model is the right one for Authenticated Key Exchange (AKE) is well-known ...