{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:52:25Z","timestamp":1756810345628,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_1","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:22:22Z","timestamp":1537600942000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures"],"prefix":"10.1007","author":[{"given":"Chedy","family":"Missaoui","sequence":"first","affiliation":[]},{"given":"Safa","family":"Bachouch","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Abdelkader","sequence":"additional","affiliation":[]},{"given":"Slim","family":"Trabelsi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Catuogno, L., Castiglione, A., Palmieri, F.: A honeypot system with honeyword-driven fake interactive sessions. In: 2015 International Conference on High Performance Computing and Simulation (HPCS), pp. 187\u2013194. IEEE, July 2015","DOI":"10.1109\/HPCSim.2015.7237039"},{"key":"1_CR2","unstructured":"Database of 1.4 Billion Credentials Found on Dark Web. \n                      https:\/\/www.securityweek.com\/database-14-billion-credentials-found-dark-web"},{"key":"1_CR3","unstructured":"How Apple and Amazon Security Flaws Le to My Epic Hacking. \n                      https:\/\/www.wired.com\/2012\/08\/apple-amazon-mat-honan-hacking\/"},{"key":"1_CR4","unstructured":"LinkedIn Lost 167 Million Account Credentials in Data Breach. \n                      http:\/\/fortune.com\/2016\/05\/18\/linkedin-data-breach-email-password\/"},{"key":"1_CR5","unstructured":"Passwords for 32M Twitter accounts may have been hacked and leaked. \n                      https:\/\/techcrunch.com\/2016\/06\/08\/twitter-hack\/"},{"key":"1_CR6","unstructured":"Password Leak Lists Contain 20 Percent of Microsoft Login Credentials. \n                      https:\/\/www.forbes.com\/sites\/adriankingsleyhughes\/2012\/07\/16\/hackers-have-20-percent-of-microsoft-login-credentials\/#54cb833c7e0d"},{"key":"1_CR7","unstructured":"63% of Data Breaches Result From Weak or Stolen Passwords. \n                      http:\/\/info.idagent.com\/blog\/63-of-data-breaches-result-from-weak-or-stolen-passwords"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"1_CR9","unstructured":"Mozilla: data stolen from hacked bug database was used to attack Firefox. \n                      https:\/\/arstechnica.com\/information-technology\/2015\/09\/mozilla-data-stolen-from-hacked-bug-database-was-used-to-attack-firefox\/?utm_content=buffer1c53c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer"},{"key":"1_CR10","unstructured":"2017 state of authentication report. \n                      https:\/\/fidoalliance.org\/wp-content\/uploads\/The-State-of-Authentication-Report.pdf"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C Herley","year":"2012","unstructured":"Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10(1), 28\u201336 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"1_CR12","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: NDSS, vol. 14, pp. 23\u201326"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-41284-4_12","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"M Akiyama","year":"2013","unstructured":"Akiyama, M., Yagi, T., Aoki, K., Hariu, T., Kadobayashi, Y.: Active credential leakage for observing web-based attack cycle. In: Stolfo, S.J., Stavrou, A., Wright, C.V. (eds.) RAID 2013. LNCS, vol. 8145, pp. 223\u2013243. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-41284-4_12"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Claycomb, W.R., Nicoll, A.: Insider threats to cloud computing: directions for new research challenges. In: 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC), pp. 387\u2013394. IEEE (2012)","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Thomas, K., et al.: Data breaches, phishing, or malware?: understanding the risks of stolen credentials. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1421\u20131434. ACM (2017)","DOI":"10.1145\/3133956.3134067"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Onaolapo, J., Mariconti, E., Stringhini, G.: What happens after you are pwnd: understanding the use of leaked webmail credentials in the wild. In: Proceedings of the 2016 Internet Measurement Conference, pp. 65\u201379. ACM (2016)","DOI":"10.1145\/2987443.2987475"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/TIFS.2011.2169958","volume":"7","author":"Hung-Min Sun","year":"2012","unstructured":"Sun, H.M., Chen, Y.H., Lin, Y.H.: oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans. Inf. Forensics Secur. 7(2), 651\u2013663","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Kontaxis, G., Athanasopoulos, E., Portokalidis, G., Keromytis, A.D.: SAuth: protecting user accounts from password database leaks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 187\u2013198. ACM (2013)","DOI":"10.1145\/2508859.2516746"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T04:57:59Z","timestamp":1558328279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"23 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}