{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:16:20Z","timestamp":1743110180822,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_16","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"285-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks"],"prefix":"10.1007","author":[{"given":"Shiva","family":"Houshmand","sequence":"first","affiliation":[]},{"given":"Sudhir","family":"Aggarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"key":"16_CR1","unstructured":"Castelluccia, C., Chaabane, A., Durmuth, M., Perito, D.: When privacy meets security: Leveraging personal information for password cracking. Computing Research Repository (2013). abs\/1304.6584"},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"F Damerau","year":"1964","unstructured":"Damerau, F.: A technique for computer detection and correction of spelling errors. Communications of the ACM 7(3), 171\u2013176 (1964)","journal-title":"Communications of the ACM"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: Proceedings of the Network and Distributed Systems Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23357"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-15618-7_10","volume-title":"Engineering Secure Software and Systems","author":"M D\u00fcrmuth","year":"2015","unstructured":"D\u00fcrmuth, M., Angelstorf, F., Castelluccia, C., Perito, D., Chaabane, A.: OMEN: faster password guessing using an ordered markov enumerator. In: Piessens, F., Caballero, J., Bielova, N. (eds.) ESSoS 2015. LNCS, vol. 8978, pp. 119\u2013132. Springer, Cham (2015). doi:10.1007\/978-3-319-15618-7_10"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Houshmand, S., Aggarwal, S.: Building better passwords using probabilistic techniques. In: Proceedings of the Twenty-Eighth Annual Computer Security Applications Conference, pp. 109\u2013118 (2012)","DOI":"10.1145\/2420950.2420966"},{"issue":"8","key":"16_CR6","doi-asserted-by":"publisher","first-page":"1776","DOI":"10.1109\/TIFS.2015.2428671","volume":"10","author":"S Houshmand","year":"2015","unstructured":"Houshmand, S., Aggarwal, S., Flood, R.: Next Gen PCFG password cracking. IEEE Transactions on Information Forensics and Security 10(8), 1776\u20131791 (2015)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, H., Sun, K.: A study of personal information in human-chosen passwords and their security implications. In: Proceedings of the Thirty-Fifth Annual IEEE International Conference on Computer Communications (2016)","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"16_CR8","unstructured":"Loge, K.: The English Open Word List, Dreamsteep (2017). dreamsteep.com\/projects\/the-english-open-word-list.html"},{"key":"16_CR9","unstructured":"Musil, S.: Hackers post 450K credentials pilfered from Yahoo, CNET, July 11, 2012"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the Twelfth ACM Conference on Computer and Communications Security, pp. 364\u2013372 (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"16_CR11","unstructured":"Outpost9.com, Word Lists..., (2004). www.outpost9.com\/files\/WordLists.html"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Shay, R., Komanduri, S., Kelley, P., Leon, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L.: Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, article no. 2 (2010)","DOI":"10.1145\/1837110.1837113"},{"key":"16_CR13","unstructured":"Vance, A.: If your password is 123456, just make it hackme. The New York Times, January 20, 2010"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Z., Wang, P., Yan, J., Huang, X.: Targeted online password guessing: an underestimated threat. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1242\u20131254 (2016)","DOI":"10.1145\/2976749.2978339"},{"key":"16_CR15","unstructured":"Waugh, R.: No wonder hackers have it easy: Most of us now have 26 different online accounts \u2013 but only five passwords, Daily Mail, July 16, 2102"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the Seventeenth ACM Conference on Computer and Communications Security, pp. 162\u2013175 (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., de Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 391\u2013405 (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the Seventeenth ACM Conference on Computer and Communications Security, pp. 176\u2013186 (2010)","DOI":"10.1145\/1866307.1866328"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:07:44Z","timestamp":1630368464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}