Measuring Real-World Accuracies and Biases in Modeling Password Guessability Segreti. et al. Usenix Security 2015.

Slides:



Advertisements
Similar presentations
Password Cracking Lesson 10. Why crack passwords?
Advertisements

On the Semantic Patterns of Passwords and their Security Impact RAFAEL VERAS, CHRISTOPHER COLLINS, JULIE THORPE UNIVERSITY OF ONTARIO INSTITUTE OF TECHNOLOGY.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle.
Matt Weir, Sudhir Aggarwal, Michael Collins, Henry Stern Presented by Erik Archambault.
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms by Patrick Gage Kelley, Saranga Komanduri, Michelle.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Hidden Markov Model 11/28/07. Bayes Rule The posterior distribution Select k with the largest posterior distribution. Minimizes the average misclassification.
Apr 30, 2002Mårten Trolin1 Previous lecture – passwords Passwords for authentication –Storing hashed passwords –Use of salt Passwords for key generation.
NetID Password Strength Initiative Gary Windham Senior Enterprise Systems Architect UITS Computing Services.
Lecture 5: Learning models using EM
Password Attacks Mike. Guessing Default Passwords Many applications and operating systems include built-in default passwords. Lazy administrators Database.
1 Ranked Queries over sources with Boolean Query Interfaces without Ranking Support Vagelis Hristidis, Florida International University Yuheng Hu, Arizona.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 MySQL Passwords Password Strength and “Cracking” Presented by Devin Egan Defcon 12 - July 31, 2004 Password Strength and “Cracking” Presented by Devin.
Relevance Feedback Content-Based Image Retrieval Using Query Distribution Estimation Based on Maximum Entropy Principle Irwin King and Zhong Jin The Chinese.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
IE 594 : Research Methodology – Discrete Event Simulation David S. Kim Spring 2009.
Determining the Significance of Item Order In Randomized Problem Sets Zachary A. Pardos, Neil T. Heffernan Worcester Polytechnic Institute Department of.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Masquerade Detection Mark Stamp 1Masquerade Detection.
Calculating Discrete Logarithms John Hawley Nicolette Nicolosi Ryan Rivard.
On the Security of Picture Gesture Authentication Ziming Zhao †‡, Gail-Joon Ahn †‡, Jeong-Jin Seo †, Hongxin Hu § † Arizona State University ‡ GFS Technology.
Password Management. Password Protection Virtually all multiuser systems require that a user provide not only a name or identifier (ID) but also a password.
Multiple Password Interference in text Passwords and click based Graphical Passwords by Sonia Chiasson, Alian Forget, Elizabeth Stobert, PC van Oorschot.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
1 Naïve Bayes Models for Probability Estimation Daniel Lowd University of Washington (Joint work with Pedro Domingos)
Passwords Tom Ristenpart CS The game plan Historical analysis Brief overview of research landscape Current practices in industry Bonneau paper Weir.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
Experimental Evaluation of Learning Algorithms Part 1.
Partially Supervised Classification of Text Documents by Bing Liu, Philip Yu, and Xiaoli Li Presented by: Rick Knowles 7 April 2005.
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 1.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
 Patrick Gage Kelley, et al. “Guess again (and again and again): [...].” In 2012 IEEE Symposium on Security and Privacy (SP), pp IEEE, 2012.
PZAPR Parallel Zip Archive Password Recovery CSCI High Perf Sci Computing Univ. of Colorado Spring 2011 Neelam Agrawal Rodney Beede Yogesh Virkar.
Google News Personalization Big Data reading group November 12, 2007 Presented by Babu Pillai.
Guess again (and again and again) Measuring password strength by simulating password-cracking algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
1 Minimum Error Rate Training in Statistical Machine Translation Franz Josef Och Information Sciences Institute University of Southern California ACL 2003.
Shouling Ji, Shukun Yang, and Raheem Beyah Georgia Institute of Technology Ting Wang Lehigh University Changchang Liu and Wei-Han Lee Princeton University.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
1 Chapter 8: Model Inference and Averaging Presented by Hui Fang.
Feature Selection Poonam Buch. 2 The Problem  The success of machine learning algorithms is usually dependent on the quality of data they operate on.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta Presented by Lihua Ren.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
Honeywords: Making Passwords-Cracking Detectable Ari Jules, Ronald L. Rivest Presented by: Karthik Padullaparty | kpad470 October 14, Karthik Padullaparty.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
Using Simulation to evaluate Rasch Models John Little CEM, Durham University
Understanding Security Policies Lesson 3. Objectives.
Modelling Complex Systems Video 4: A simple example in a complex way.
Tool Support for Testing
Understanding Security Policies
Password Cracking Lesson 10.
FuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic
Timing Analysis of Keystrokes and Timing Attacks on SSH
Kiran Subramanyam Password Cracking 1.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Anna Adams Martina Angela Sasse
Presentation transcript:

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Segreti. et al. Usenix Security 2015

What is password guessability? It measures how easy to guess a password. Bad password: “password”, “Iloveyou” Good password: “qw3^D)Z1”, Different ways: Traditional: Shannon Entropy (not practical) NIST Entropy (rule based) Currently: α-guesswork Parameterized metrics

Why measures password guessability? 1.Eliminate bad passwords. Organizational password audits 2. Help users create better passwords. Provide feedback

Password Guessability Metrics Statistical metrics α-guesswork it takes 1 million guesses for an attacker to guess 10% of passwords in a password set measures password set as a whole Parameterized metrics Investigate guessability under a cracking algorithm (simulate an attacker) measures guessability of individual password. security against real-world attacks, not idealized attacks. Does it accurately model real-world attackers? Does the attacker run only one algorithm? Parameter tuning.

Cracking Algorithm Brute-force and mask Attacks Dumbly iterate all possibilities Mask attacks first give a mask and then iterate e.g. choose L6D1 start from aaaaaa0, aaaaaa1, aaaaaa2, etc Mangled wordlists attacks (may be the most popular) given a dictionary that contains possible passwords mangling rules e.g. ‘password’ ->

Cracking Algorithm Probabilistic context-free grammar (PCFG) Train using real-world passwords (usually from breached password set) Build a password distribution model ranks password structure by probability e.g. p(L3D3S1) = 0.05% ranks special characters and numbers by probability e.g. p(123|D3) = 0.04%, e.g. p(!|S1) = 20% insert characters using an external library e.g. has 50 L3 entries. p(L3) = 1/50 Generate password guess by descending probability: e.g. p(“abc123!”) = 0.05% * 0.04% * 20% * 1/50

Cracking Algorithm Markov Models Train using real-world passwords (usually from breached password set) Choose an order, build markov models and compute probability of guesses. e.g order-5 markov model, what is the probability of “abcde”? p(abcd) = 10% p(e|abcd) = 80% p(bcde|end) = 30% p(“abcde”) = 10% * 80% * 30% try guesses in descending probability order

This paper will... Analyze 4 automated cracking algorithm and 1 manual cracking method. Show that a single cracking algorithm relatively out-of-box produces a poor estimate of password guessability. Uncover the export procedure - using multiple well- configured algorithm in parallel.

This paper What to expect from this paper: Measurement, comparison of existing password cracking algorithm. comparison of algorithm efficiencies between researcher and attacker. What not to expect from this paper Novel technique or algorithm New system

Dataset (testing data) 13,345 passwords created under composition policies. Amazon Mechanical Turk Basic: 8+ chars Complex: 8+ chars, containing 4 character classes LongBasic: 16+ chars, LongComplex: 16+ chars, containing 4 character classes 15,000 from rockyou leak and 15,000 from Yahoo leak

Dataset (Training data) Breaches of MySpace, Rockyou, and Yahoo Dictionaries (19.4m in total): Single words from Google Web Corpus UNIX dictionary 250,000 words inflection dictionary

Simulating Password Cracking PCFG Markov-Model John the Ripper Hashcat Professional Cracker (Done by a security company - KoreLogic)

KoreLogic - professional cracker 1.Use JTR and Hashcat with proprietary wordlists, mangling rules, mask lists, and Markov models 2.Optimized over 10 years of password auditing 3.Dynamically update their mangling rules 4.Attack a. Complex b.Long c.Long Complex

Results - Configuration out-of-the-box configurations commonly used by researchers substantially underestimate password vulnerability. Hashcat different configuration PCFG and Markov Model Training Data Conclusion: Unoptimized configuration means underestimation the vulnerabilities

Guessing by automated approaches Attack Baisc Passwords Attack Long Passwords

Guessing by automated approaches Attack LongBasic Passwords Attack LongComplex Passwords

Guessed portion of password Limite: 10^(14) guesses

Guessing by pros Automated Approaches guess more in early stage An analyst wrote free-style rules at 10^(13) guesses, which significantly increase the cracked passwords Min_auto metric is a conservative approximation of the success of Pros

Limited Professional Cracking Attack 4239 complex passwords

Difference between approaches - Coverage Basic Password On contrast: LongBasic Shared: 6% 28% of Complex, LongBasic, and LongComplex passwords were guessed only by a single approach.

Difference between approaches - Char types Passwords contain only lower-case characters Also different in other settings

Difference between approaches - Different Policies Pro Attack Automated Attack (all attacking algorithms)

Difference between approaches - Different Policies

Difference between approaches - Individual Password

Conclusion A single guessing algorithm -> poor estimation several well-configured algorithms -> fairly good estimation of real attackers Different approaches have different outcome

Questions 1.why do we measure password strength? (2 main reasons) 2. Why is measuring password strength difficult? 3. What should a researcher do to make his estimation of password strength more accurate?

Questions 1.why do we measure password strength? (2 main reasons) 2.Why is measuring password strength difficult? 3.What should a researcher do to make his estimation of password strength more accurate?