{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T04:04:06Z","timestamp":1747454646037,"version":"3.40.5"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_5","type":"book-chapter","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:31:57Z","timestamp":1747384317000},"page":"67-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generating and\u00a0Attacking Passwords with\u00a0Misspellings by\u00a0Leveraging Homophones"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0779-3595","authenticated-orcid":false,"given":"Shiva","family":"Houshmand","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-1826","authenticated-orcid":false,"given":"Smita","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Jared","family":"Maeyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"5_CR1","unstructured":"The cmu pronouncing dictionary. http:\/\/www.speech.cs.cmu.edu\/cgi-bin\/cmudict"},{"key":"5_CR2","unstructured":"Hashcat: Advanced password recovery. http:\/hashcat.net\/hashcat"},{"key":"5_CR3","unstructured":"Openwall: John the ripper password cracker. http:\/\/www.openwall.com\/john"},{"key":"5_CR4","unstructured":"Password datasets. https:\/\/wiki.skullsecurity.org\/index.php\/Passwords"},{"key":"5_CR5","unstructured":"Word Pronunciation Generation using LSTMs. Kaggle https:\/\/www.kaggle.com\/code\/quadeer15sh\/word-pronunciation-generation-using-lstms\/notebook"},{"key":"5_CR6","unstructured":"Archive of password recommendations (2025). https:\/\/github.com\/shibba\/homophone_passwords\/blob\/main\/Password_Policies_Archive.pdf"},{"key":"5_CR7","unstructured":"Ajini, M.H.S.: https:\/\/github.com\/mohamad-hasan-sohan-ajini\/G2P"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Ansari, M.Z., Ahmad, T., Khan, S., Mabood, F., Faizan, M.: Homograph language identification using machine learning techniques. In: Proceedings of International Conference on Data Science and Applications. Springer (2023)","DOI":"10.1007\/978-981-19-6631-6_60"},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.specom.2008.01.002","volume":"50","author":"M Bisani","year":"2008","unstructured":"Bisani, M., Ney, H.: Joint-sequence models for grapheme-to-phoneme conversion. Speech Commun. 50(5), 434\u2013451 (2008)","journal-title":"Speech Commun."},{"issue":"6","key":"5_CR10","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"AS Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., Douglas, K.: Generating and remembering passwords. Appl. Cogn. Psychol. 18(6), 641\u2013651 (2004)","journal-title":"Appl. Cogn. Psychol."},{"issue":"16","key":"5_CR11","doi-asserted-by":"publisher","first-page":"9408","DOI":"10.3390\/app13169408","volume":"13","author":"D Cao","year":"2023","unstructured":"Cao, D., Zhao, Y., Wu, L.: Near-optimal active learning for multilingual grapheme-to-phoneme conversion. Appl. Sci. 13(16), 9408 (2023)","journal-title":"Appl. Sci."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Chen, S.F., et al.: Conditional and joint models for grapheme-to-phoneme conversion. In: INTERSPEECH, pp. 2033\u20132036 (2003)","DOI":"10.21437\/Eurospeech.2003-584"},{"key":"5_CR13","unstructured":"Daelemans, W., Zavrel, J., Van Der\u00a0Sloot, K., Van\u00a0den Bosch, A.: Timbl: Tilburg memory-based learner. Tilburg University (2004)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Decadt, B., Duchateau, J., Daelemans, W., Wambacq, P.: Memory-based phoneme-to-grapheme conversion: A method for dealing with out-of-vocabulary items in speech recognition. In: Computational Linguistics in the Netherlands. Brill (2002)","DOI":"10.1163\/9789004334038_006"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Dell\u2019Amico, M., Filippone, M.: Monte carlo strength evaluation: Fast and reliable password checking. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS \u201915, Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813631","DOI":"10.1145\/2810103.2813631"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Dong, L., Guo, Z.Q., Tan, C.H., Hu, Y.J., Jiang, Y., Ling, Z.H.: Neural grapheme-to-phoneme conversion with pre-trained grapheme models. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6202\u20136206. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746447"},{"key":"5_CR17","unstructured":"Galescu, L., Allen, J.F.: Bi-directional conversion between graphemes and phonemes using a joint n-gram model. In: 4th ISCA Tutorial and Research Workshop (ITRW) on Speech Synthesis (2001)"},{"key":"5_CR18","unstructured":"Garofolo, J.S., et\u00a0al.: TIMIT Acoustic-Phonetic Continuous Speech Corpus LDC93S1 (1993)"},{"key":"5_CR19","unstructured":"Gorman, K., Mazovetskiy, G., Nikolaev, V.: Improving homograph disambiguation with supervised machine learning. In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018) (2018)"},{"key":"5_CR20","unstructured":"Hanna, P., Hanna, J., HODGES, R., RUDORF, E.: Phoneme-grapheme correspondences as cues to spelling improvement (1966)"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-21568-2_11","volume-title":"Applied Cryptography and Network Security","author":"B Hitaj","year":"2019","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., Perez-Cruz, F.: Passgan: A deep learning approach for password guessing. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) Applied Cryptography and Network Security, pp. 217\u2013237. Springer International Publishing, Cham (2019)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural computation pp. 1735\u201380 (12 1997)","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Houshmand, S., Aggarwal, S.: Building better passwords using probabilistic techniques. In: Proceedings of the 28th Annual Computer Security Applications Conference. ACM (2012)","DOI":"10.1145\/2420950.2420966"},{"issue":"8","key":"5_CR24","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/TIFS.2015.2428671","volume":"10","author":"S Houshmand","year":"2015","unstructured":"Houshmand, S., Aggarwal, S., Flood, R.: Next gen pcfg password cracking. IEEE Trans. Inf. Forensics Secur. 10(8), 1776\u20131791 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"23","key":"5_CR25","doi-asserted-by":"publisher","first-page":"12379","DOI":"10.3390\/app122312379","volume":"12","author":"J Jiang","year":"2022","unstructured":"Jiang, J., Zhou, A., Liu, L., Zhang, L.: Omecdn: a password-generation model based on an ordered markov enumerator and critic discriminant network. Appl. Sci. 12(23), 12379 (2022). https:\/\/doi.org\/10.3390\/app122312379","journal-title":"Appl. Sci."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Jyothi, P., Hasegawa-Johnson, M.: Low-resource grapheme-to-phoneme conversion using recurrent neural networks. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 5030\u20135034. IEEE (2017)","DOI":"10.1109\/ICASSP.2017.7953114"},{"issue":"5","key":"5_CR27","doi-asserted-by":"publisher","first-page":"2758","DOI":"10.3390\/app12052758","volume":"12","author":"P K\u0142osowski","year":"2022","unstructured":"K\u0142osowski, P.: A rule-based grapheme-to-phoneme conversion system. Appl. Sci. 12(5), 2758 (2022)","journal-title":"Appl. Sci."},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Li, X., Metze, F., Mortensen, D., Watanabe, S., Black, A.: Zero-shot learning for grapheme to phoneme conversion with language ensemble. In: Muresan, S., Nakov, P., Villavicencio, A. (eds.) Findings of the Association for Computational Linguistics: ACL, pp. 2106\u20132115. Association for Computational Linguistics, Dublin (2022).https:\/\/doi.org\/10.18653\/v1\/2022.findings-acl.166","DOI":"10.18653\/v1\/2022.findings-acl.166"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Genpass: A general deep learning model for password guessing with pcfg rules and adversarial generation. In: 2018 IEEE International Conference on Communications (ICC) (2018)","DOI":"10.1109\/ICC.2018.8422243"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Masumura, R., Makishima, N., Ihori, M., Takashima, A., Tanaka, T., Orihashi, S.: Phoneme-to-grapheme conversion based large-scale pre-training for end-to-end automatic speech recognition. In: INTERSPEECH (2020)","DOI":"10.21437\/Interspeech.2020-1930"},{"key":"5_CR31","unstructured":"McMillan., R.: Phishing attack targets myspace users. http:\/\/www.infoworld.com\/d\/security-central\/ phishing-attack-targets-myspace-users-614"},{"key":"5_CR32","unstructured":"Melicher, W., et al.: Fast, lean, and accurate: modeling password guessability using neural networks. In: 25th USENIX Security Symposium. USENIX Association (2016)"},{"key":"5_CR33","unstructured":"Musil, S.: Yahoo credentials (2012). https:\/\/www.cnet.com\/news\/privacy\/hackers-post-450k-credentials-pilfered-from-yahoo\/"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM Conference on Computer and Communications Security CCS \u201905 (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Nicolis, M., Klimkov, V.: Homograph disambiguation with contextual word embeddings for tts systems. In: Interspeech Workshop on Speech Synthesis (2021)","DOI":"10.21437\/SSW.2021-39"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Pasandi, H.B., Pasandi, H.B.: Evaluation of asr systems for conversational speech: a linguistic perspective. In: Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems (SenSys \u201922) (2023)","DOI":"10.1145\/3560905.3568297"},{"key":"5_CR37","unstructured":"Pitt, M., et al.: Buckeye corpus of conversational speech. In: Department of Psychology, Ohio State University (Distributor) (2007). https:\/\/buckeyecorpus.osu.edu\/"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Rando, J., Perez-Cruz, F., Hitaj, B.: Passgpt: Password modeling and (guided) generation with large language models. In: Computer Security \u2013 ESORICS 2023, pp. 164\u2013183. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-51482-1_9"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Rao, K., Peng, F., Sak, H., Beaufays, F.: Grapheme-to-phoneme conversion using long short-term memory recurrent neural networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2015)","DOI":"10.1109\/ICASSP.2015.7178767"},{"key":"5_CR40","unstructured":"Rena\u00a0Nemoto, I.V., Adda-Decker, M.: Speech errors on frequently observed homophones in french: Perceptual evaluation vs automatic classification. In: Proceedings of the International Conference on Language Resources and Evaluation (2008)"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"\u0158ez\u00e1\u010dkov\u00e1, M., \u0160vec, J., Tihelka, D.: T5g2p: Using text-to-text transfer transformer for grapheme-to-phoneme conversion (2021)","DOI":"10.21437\/Interspeech.2021-546"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"Sejnowski, T., Rosenberg, C.: Connectionist Bench (Nettalk Corpus). UCI Machine Learning Repository (1954). https:\/\/doi.org\/10.24432\/C5VP6T","DOI":"10.24432\/C5VP6T"},{"key":"5_CR43","first-page":"2095","volume":"2019","author":"Y Sevinj","year":"2019","unstructured":"Sevinj, Y., G\u00e9za, N., B\u00e1lint, G.T.: Transformer based grapheme-to-phoneme conversion. Proc. Interspeech 2019, 2095\u20132099 (2019)","journal-title":"Proc. Interspeech"},{"key":"5_CR44","first-page":"117","volume":"44","author":"N Torstensson","year":"2002","unstructured":"Torstensson, N.: Grapheme-to-phoneme conversion, a knowledge-based approach. Speech Music and Hearing TMH-QPSR-Fonetik 44, 117\u2013120 (2002)","journal-title":"Speech Music and Hearing TMH-QPSR-Fonetik"},{"key":"5_CR45","unstructured":"Vance, A.: If your password is 123456, just make it hackme. http:\/\/www.nytimes.com\/2010\/01\/21\/technology\/21password.html"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Veras, R., Collins, C., Thorpe, J.: On semantic patterns of passwords and their security impact. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego (2014)","DOI":"10.14722\/ndss.2014.23103"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Vesik, K., Abdul-Mageed, M., Silfverberg, M.: One model to pronounce them all: Multilingual grapheme-to-phoneme conversion with a transformer ensemble. In: Proceedings of the 17th SIGMORPHON Workshop on Computational Research in Phonetics, Phonology, and Morphology (2020)","DOI":"10.18653\/v1\/2020.sigmorphon-1.16"},{"key":"5_CR48","unstructured":"Warren., T.: Thousands of hotmail passwords leaked. http:\/\/www.neowin.net\/news\/main\/09\/10\/05\/thousands-of -hotmail-passwords-leaked-online"},{"key":"5_CR49","doi-asserted-by":"publisher","unstructured":"Weir, M., Aggarwal, S., Medeiros, B.d., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 391\u2013405 (2009). https:\/\/doi.org\/10.1109\/SP.2009.8","DOI":"10.1109\/SP.2009.8"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Yao, K., Zweig, G.: Sequence-to-sequence neural net models for grapheme-to-phoneme conversion arXiv preprint arXiv:1506.00196 (2015)","DOI":"10.21437\/Interspeech.2015-134"},{"issue":"6","key":"5_CR51","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.3390\/app9061143","volume":"9","author":"S Yolchuyeva","year":"2019","unstructured":"Yolchuyeva, S., N\u00e9meth, G., Gyires-T\u00f3th, B.: Grapheme-to-phoneme conversion with convolutional neural networks. Appl. Sci. 9(6), 1143 (2019)","journal-title":"Appl. Sci."},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Yolchuyeva, S., N\u00e9meth, G., Gyires-T\u00f3th, B.: Transformer based grapheme-to-phoneme conversion. arXiv preprint arXiv:2004.06338 (2020)","DOI":"10.21437\/Interspeech.2019-1954"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Yu, M., et al: Multilingual grapheme-to-phoneme conversion with byte representation. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8234\u20138238. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054696"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Zhu, J., Zhang, C., Jurgens, D.: Byt5 model for massively multilingual grapheme-to-phoneme conversion. arXiv preprint arXiv:2204.03067 (2022)","DOI":"10.21437\/Interspeech.2022-538"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:32:20Z","timestamp":1747384340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}