|
|
|
|
|
|
|
|
| ( 1 of 1 ) |
| United States Patent | 9,438,419 |
| Aggarwal , et al. | September 6, 2016 |
System and methodology that utilizes keyboard patterns and alpha string patterns for password cracking. Keyboard patterns can be used as components of passwords, and the relevant shapes can extracted from these keyboard patterns and passwords. This keyboard information can be used to extend a probabilistic context-free grammar that can then be used to generate guesses containing keyboard patterns. Further, patterns in alpha strings, such as repeated words and multi-words, can be systematically learned using a training dictionary. This information can be used to extend the probabilistic context-free grammars which leads to generation of guesses based on the distribution of these patterns in the alpha strings, Keyboard patterns and alpha string patterns, individually and in combination, are shown herein to be effective for password cracking.
| Inventors: | Aggarwal; Sudhir (Tallahassee, FL), Houshmand; Shiva (Tallahassee, FL), Flood; Randy (Tallahassee, FL) | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Applicant: |
| ||||||||||
| Assignee: |
The Florida State University Research Foundation, Inc.
(Tallahassee,
FL)
|
||||||||||
| Family ID: | 56878098 | ||||||||||
| Appl. No.: | 14/319,775 | ||||||||||
| Filed: | June 30, 2014 |
| Application Number | Filing Date | Patent Number | Issue Date | ||
|---|---|---|---|---|---|
| 13624249 | Sep 21, 2012 | ||||
| 13547779 | Jul 12, 2012 | ||||
| 61506785 | Jul 12, 2011 | ||||
| Current U.S. Class: | 1/1 |
| Current CPC Class: | G06N 5/048 (20130101); H04L 9/0863 (20130101); G06N 20/00 (20190101); G06F 21/46 (20130101); H04L 2209/26 (20130101) |
| Current International Class: | H04L 9/08 (20060101); G06N 5/04 (20060101) |
| 8539247 | September 2013 | McGrew |
| 8769607 | July 2014 | Jerdonek |
| 9178876 | November 2015 | Johansson |
| 2011/0314294 | December 2011 | McGrew |
| WO 2011162841 | Dec 2011 | WO | |||
Houshmand Yazdi, Analyzing Password Strength & Efficient Password Cracking, 2011, FSU Libraries. cited by examiner . Houshmand Yazdi, Probabilistic Context-Free Grammar Based Password Cracking: Attack, Defense and Applications, 2015, FSU Libraries. cited by examiner . Loge. The English Open Word List. Dreamsteep. Date Accessed Sep. 18, 2014. http://dreamsteep.com/projects/the-english-open-word-list.html. cited by applicant . A list of popular password cracking wordlists. 2005. Date Accessed Sep. 2, 2014. http://www.outpost9.com/files/WordLists.html. cited by applicant . Mazurek et al., Measuring Password Guessability for an Entire University. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13). 2013: 173-186. cited by applicant . De Luca et al., PassShape--stroke based shape passwords. Proceedings of OzCHI. 2007: 1-2. cited by applicant . Narayanan and Shmatikov .Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff. CCS'05. 2005: 1-9. cited by applicant . Vance. If your password is 123456, just make it hackme. New York Times. 2010. Date Accessed Sep. 2, 2014. http://www.nytimes.com/2010/01/21/technology/21password.html. cited by applicant . Bernd Chang. 6 Million User Data of China Software Developer Network (CSDN) Leaked. HUG China. 2011. Date Accessed Sep. 18, 2014. http://www.hugchina.com/china/stories/science/6-million-user-data-of-chin- a-software-developer-network-csdn-leaked-2011-12-22.html. cited by applicant . Castelluccia et al., Adaptive password-strength meters from Markov models. NDSS '12. 2012. cited by applicant . Schweitzer et al., Visualizing keyboard pattern password. 6th International Workshop on Visualization for Cyber Security. 2009: 69-73. cited by applicant . Klein. Foiling the cracker: a survey of and improvements to password security. Proceedings of USENIX UNIX Security Workshop. 1990: 1-11. cited by applicant . Ma et al., A Study of Probabilistic Password Models. Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP '14). 2014: 1-16. cited by applicant . Hashcat advanced password recovery. Last updated Aug. 20, 2014. Date Accessed Sep. 18, 2014. http://hashcat.net/oclhashcat/. cited by applicant . Bonneau. The science of guessing: analyzing an anonymized corpus of 70 million passwords. 2012 IEEE Symposium on Security and Privacy. 2012: 538-552. cited by applicant . Yan et al., Password Memorability and Security: Empirical Results. IEEE Security and Privacy Magazine. 2004. Volume 2: 25-31. cited by applicant . Bonneau and Shutova. Linguistic properties of multi-word passphrases. Proceedings of the 16th international conference on Financial Cryptography and Data Security. 2010: 1-12. cited by applicant . Bensmann. Intelligent Search Strategies on Human Chosen Passwords. Doctoral dissertation, Master's thesis. Technische Universitaet Dortmund. 2009: 1-96. cited by applicant . Kuo et al., Human Selection of Mnemonic Phrase-based Passwords. Symp. On Usable Privacy and Security (SOUPS). 2006: 1-12. cited by applicant . Rabiner. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE. 1989. Volume 77 (No. 2 ): 257-286. cited by applicant . Dell'Amico et al., Password strength: an empirical analysis. Proceedings of IEEE INFOCOM 2010. 2010: 1-9. cited by applicant . Hellman et al., A Cryptanalytic Time-Memory Trade-Off. IEEE Transactions on Information Theory. 1980. vol. 6 (Issue 4): 401-406. cited by applicant . Weir et al., Password cracking using probabilistic context-free grammars Proceedings of the 30th IEEE Symposium on Security and Privacy. 2009: 391-405. cited by applicant . Weir et al., Testing metrics for password creation policies by attacking large sets of revealed passwords. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10). Chicago, Illinois. 2010: 162-175. cited by applicant . Shay et al, Can Long Passwords be secure and usable? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). 2014: 1-10. cited by applicant . Mentens et al., Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. Proceedings of the International Workshop on Reconfigurable Computing: Architectures and Applications. Lecture Notes in Computer Science. 2006. Volume 3985: 323-334. cited by applicant . Kelley et al., Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. Proceedings of the 2012 IEEE Symposium on Security and Privacy. 2012: 523-537. cited by applicant . Oechslin. Making a Faster Cryptanalytic Time-Memory Trade-Off. Proceedings of Advances in Cryptology (CRYPTO 2003). Lecture Notes in Computer Science. Volume 2729: 617-630. cited by applicant . McMillan. Phishing attack targets MySpace users. 2006. Date Accessed Sep. 2, 2014. http://www.infoworld.com/d/security-central/phishing-attack-targ- ets-myspace-users-614. cited by applicant . Shay et al, Encountering stronger password requirements: user attitudes and behaviors. 6th Symposium on Usable Privacy and Security (SOUPS). Redmond, WA. 2010: 1-20. cited by applicant . Houshmand and Aggarwal. Building better passwords using probabilistic techniques. Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12). 2012: 109-118. cited by applicant . Musil. Hackers post 450K credentials pilfered from Yahoo. CNET. 2012. Date Accessed Sep. 18, 2014. http://www.cnet.com/news/hackers-post-450k-credentials-pilfered -from-yahoo/. cited by applicant . Riley. Password security: what users know and what they actually do. Usability News. 2006. vol. 8 (No. 1): 1-5. cited by applicant . Stone-Gross et al., Your botnet is my botnet: Analysis of a botnet takeover. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). Chicago, Illinois. 2009: 635-347. cited by applicant . Schetcher et al., Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks. HotSec'10: Proceedings of the 5th USENIX conference on Hot Topics in Security. 2010: 1-6. cited by applicant . Warren. Thousands of Hotmail Passwords Leaked. 2009. Date Accessed Sep. 2, 2014. http://www.neowin.net/news/main/09/10/05/thousands-of-hotmail-passw- ords-leaked-online. cited by applicant . The Open wall group,.John the Ripper password cracker. Date Accessed Jul. 30, 2014. http://www.openwall.com/john/. cited by applicant . Zhang et al., The security of modern password expiration: an algorithmic framework and empirical analysis. Proceedings of 17th ACM Conference on Computer and Communication Security (CCS '10). Chicago, Illinois. 2010:176-186. cited by applicant . Wikipedia, "NTLM". Date Accessed Jun. 2, 2013. http://en.wikipedia.org/wiki/NTLM. cited by applicant . TrueCrypt Free Open-Source On-the-fly Encryption. Date Accessed Jun. 2, 2013. http://www.truecrypt.org/. cited by applicant . Manber. A simple scheme to make passwords based on one-way functions much harder to crack. Computers & Security Journal. 1996. vol. 15. (Issue 2): 171-176. cited by applicant . Weir. RE: Test the Strength of Your Password Creation Policy. 2009. Date Accessed Jun. 2, 2013. http://reusablesec.blogspot.com/2009/06/re-test-strength-of-your-password- .html. cited by applicant . Weir. Probabilistic Password Cracker--Reusable Security Tools. Date Accessed Jun. 2, 2013. http://sites.google.com/site/reusablesec/Home/password-cracking-tools/pro- bablistic.sub.--cracker. cited by applicant . Cain & Able Password Cracker. 2013. Date Accessed Jun. 2, 2013. http://www.oxid.it. cited by applicant . Chomsky. Three models for the description of language. IEEE Transactions on Information Theory. 1956. vol. 2 (No. 3): 113-124. cited by applicant . John the Ripper's cracking modes. Date Accessed Jun. 2, 2013. http://www.openwall.com/john/doc/MODES.shtml. cited by applicant . Naraine. PhpBB Hacked; Details Scarce. ZDNet. Date Accessed Jun. 2, 2013 http://blogs.zdnet.com/security/?p=2493. cited by applicant . Weir and Aggarwal. Cracking 400,000 Passwords or How to Explain to Your Roommate why the Power-Bill is a Little High. Defcon 17. 2009: 1-78. cited by applicant . Password Weir. Reusable Security: Password Cracking, Crypto, and General Security Research. Blog. 2010. Date Accessed Jun. 2, 2013. http://reusablesec.blogspot.com. cited by applicant . Veras et al., On the Semantic Patterns of Passwords and their Security Impact. Network and Distributed System Security Symposium (NDDS '14). 2014: 1-16. cited by applicant . Weir. Using Probabilistic Techniques to aid in Password Cracking Attacks. Dissertation. Florida State University. 2010: 1-140. cited by applicant. |
|
|