{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T01:23:47Z","timestamp":1773969827653,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Federal Ministry of Education and Research (BMBF), Germany","award":["01DD20003"],"award-info":[{"award-number":["01DD20003"]}]},{"name":"Google Asia Pacific Pte Ltd","award":["Google India Research Award 2022"],"award-info":[{"award-number":["Google India Research Award 2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582839","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"524-538","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["MASCARA : Systematically Generating Memorable And Secure Passphrases"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0505-6260","authenticated-orcid":false,"given":"Avirup","family":"Mukherjee","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6667-867X","authenticated-orcid":false,"given":"Kousshik","family":"Murali","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6260-5641","authenticated-orcid":false,"given":"Shivam Kumar","family":"Jha","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3967-186X","authenticated-orcid":false,"given":"Niloy","family":"Ganguly","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0308-8787","authenticated-orcid":false,"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4317-0184","authenticated-orcid":false,"given":"Mainack","family":"Mondal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AgileBits. 2018. 1Password passphrase generation. https:\/\/github.com\/1Password\/spg. AgileBits. 2018. 1Password passphrase generation. https:\/\/github.com\/1Password\/spg."},{"key":"e_1_3_2_1_2_1","volume-title":"Towards making random passwords memorable: Leveraging users","author":"Al-Ameen Mahdi\u00a0Nasrullah","unstructured":"Mahdi\u00a0Nasrullah Al-Ameen , Matthew Wright , and Shannon Scielzo . 2015. Towards making random passwords memorable: Leveraging users \u2019 cognitive ability through multiple cues. In CHI\u2019 15. 2315\u20132324. Mahdi\u00a0Nasrullah Al-Ameen, Matthew Wright, and Shannon Scielzo. 2015. Towards making random passwords memorable: Leveraging users\u2019 cognitive ability through multiple cues. In CHI\u201915. 2315\u20132324."},{"key":"e_1_3_2_1_3_1","volume-title":"The belmont report. The Oxford textbook of clinical research ethics","author":"Beauchamp L","year":"2008","unstructured":"Tom\u00a0 L Beauchamp . 2008. The belmont report. The Oxford textbook of clinical research ethics ( 2008 ), 149\u2013155. Tom\u00a0L Beauchamp. 2008. The belmont report. The Oxford textbook of clinical research ethics (2008), 149\u2013155."},{"key":"e_1_3_2_1_4_1","unstructured":"Steven Bird Ewan Klein and Edward Loper. 2009. Natural language processing with Python: Analyzing text with the natural language toolkit. Steven Bird Ewan Klein and Edward Loper. 2009. Natural language processing with Python: Analyzing text with the natural language toolkit."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Nikola\u00a0K. Blanchard Cl\u00e9ment Malaingre and Ted Selker. 2018. Improving Security and Usability of Passphrases with Guided Word Choice. In ACSAC \u201918. 723\u2013732. Nikola\u00a0K. Blanchard Cl\u00e9ment Malaingre and Ted Selker. 2018. Improving Security and Usability of Passphrases with Guided Word Choice. In ACSAC \u201918. 723\u2013732.","DOI":"10.1145\/3274694.3274734"},{"key":"e_1_3_2_1_6_1","volume-title":"Statistical Metrics for Individual Password Strength. In Security Protocols Workshop.","author":"Bonneau Joseph","year":"2012","unstructured":"Joseph Bonneau . 2012 . Statistical Metrics for Individual Password Strength. In Security Protocols Workshop. Joseph Bonneau. 2012. Statistical Metrics for Individual Password Strength. In Security Protocols Workshop."},{"key":"e_1_3_2_1_7_1","unstructured":"Joseph Bonneau. 2018. EFF\u2019s new wordlists for random passphrases. https:\/\/www.eff.org\/deeplinks\/2016\/07\/new-wordlists-random-passphrases Joseph Bonneau. 2018. EFF\u2019s new wordlists for random passphrases. https:\/\/www.eff.org\/deeplinks\/2016\/07\/new-wordlists-random-passphrases"},{"key":"e_1_3_2_1_8_1","volume-title":"The quest to replace passwords: A framework for comparative evaluation of web authentication schemes","author":"Bonneau Joseph","unstructured":"Joseph Bonneau , Cormac Herley , Paul\u00a0 C Van\u00a0Oorschot , and Frank Stajano . 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes . In IEEE S &P. 553\u2013567. Joseph Bonneau, Cormac Herley, Paul\u00a0C Van\u00a0Oorschot, and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE S&P. 553\u2013567."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Joseph Bonneau and Ekaterina Shutova. 2012. Linguistic Properties of Multi-word Passphrases. In FC Jim Blyth Sven Dietrich and L.\u00a0Jean Camp (Eds.). 1\u201312. Joseph Bonneau and Ekaterina Shutova. 2012. Linguistic Properties of Multi-word Passphrases. In FC Jim Blyth Sven Dietrich and L.\u00a0Jean Camp (Eds.). 1\u201312.","DOI":"10.1007\/978-3-642-34638-5_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/146680.146685"},{"key":"e_1_3_2_1_11_1","unstructured":"Julio Casal. 2019. 1.4 Billion Clear Text Credentials Discovered in a Single Database. https:\/\/bit.ly\/3r512M7. Julio Casal. 2019. 1.4 Billion Clear Text Credentials Discovered in a Single Database. https:\/\/bit.ly\/3r512M7."},{"key":"e_1_3_2_1_12_1","volume-title":"pASSWORD tYPOS and how to correct them securely","author":"Chatterjee Rahul","unstructured":"Rahul Chatterjee , Anish Athayle , Devdatta Akhawe , Ari Juels , and Thomas Ristenpart . 2016. pASSWORD tYPOS and how to correct them securely . In IEEE S &P. 799\u2013818. Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, and Thomas Ristenpart. 2016. pASSWORD tYPOS and how to correct them securely. In IEEE S&P. 799\u2013818."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Rahul Chatterjee Joanne Woodage Yuval Pnueli Anusha Chowdhury and Thomas Ristenpart. 2017. The typtop system: Personalized typo-tolerant password checking. In CCS\u201917. 329\u2013346. Rahul Chatterjee Joanne Woodage Yuval Pnueli Anusha Chowdhury and Thomas Ristenpart. 2017. The typtop system: Personalized typo-tolerant password checking. In CCS\u201917. 329\u2013346.","DOI":"10.1145\/3133956.3134000"},{"key":"e_1_3_2_1_14_1","unstructured":"Catalin Cimpanu. 2020. FBI recommends passphrases over password complexity. https:\/\/zd.net\/38Qlwzr. Catalin Cimpanu. 2020. FBI recommends passphrases over password complexity. https:\/\/zd.net\/38Qlwzr."},{"key":"e_1_3_2_1_15_1","unstructured":"Cristian Danescu-Niculescu-Mizil Justin Cheng Jon Kleinberg and Lillian Lee. 2012. You had me at hello: How phrasing affects memorability. In ACL\u201912. Cristian Danescu-Niculescu-Mizil Justin Cheng Jon Kleinberg and Lillian Lee. 2012. You had me at hello: How phrasing affects memorability. In ACL\u201912."},{"key":"e_1_3_2_1_16_1","unstructured":"Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse.. In NDSS\u201914 Vol.\u00a014. 23\u201326. Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse.. In NDSS\u201914 Vol.\u00a014. 23\u201326."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Matteo Dell\u2019Amico and Maurizio Filippone. 2015. Monte Carlo strength evaluation: Fast and reliable password checking. In CCS\u201915. 158\u2013169. Matteo Dell\u2019Amico and Maurizio Filippone. 2015. Monte Carlo strength evaluation: Fast and reliable password checking. In CCS\u201915. 158\u2013169.","DOI":"10.1145\/2810103.2813631"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Serge Egelman Andreas Sotirakopoulos Ildar Muslukhov Konstantin Beznosov and Cormac Herley. 2013. Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection. In CHI\u201913. 2379\u20132388. Serge Egelman Andreas Sotirakopoulos Ildar Muslukhov Konstantin Beznosov and Cormac Herley. 2013. Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection. In CHI\u201913. 2379\u20132388.","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_19_1","unstructured":"Enpass. 2023. Enpass passphrase generation. https:\/\/www.enpass.io\/password-generator\/. Enpass. 2023. Enpass passphrase generation. https:\/\/www.enpass.io\/password-generator\/."},{"key":"e_1_3_2_1_20_1","volume-title":"A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351","author":"Eskandari Shayan","year":"2018","unstructured":"Shayan Eskandari , Jeremy Clark , David Barrera , and Elizabeth Stobert . 2018. A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351 ( 2018 ). Shayan Eskandari, Jeremy Clark, David Barrera, and Elizabeth Stobert. 2018. A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Xianyi Gao Yulong Yang Can Liu Christos Mitropoulos Janne Lindqvist and Antti Oulasvirta. 2018. Forgetting of passwords: ecological theory and data. In USENIX SEC\u201918. 221\u2013238. Xianyi Gao Yulong Yang Can Liu Christos Mitropoulos Janne Lindqvist and Antti Oulasvirta. 2018. Forgetting of passwords: ecological theory and data. In USENIX SEC\u201918. 221\u2013238.","DOI":"10.1007\/s40315-017-0217-z"},{"key":"e_1_3_2_1_22_1","unstructured":"Wolf Garbe. 2022. Symspell. https:\/\/github.com\/wolfgarbe\/SymSpell. Wolf Garbe. 2022. Symspell. https:\/\/github.com\/wolfgarbe\/SymSpell."},{"key":"e_1_3_2_1_23_1","unstructured":"GeoNames. 2005. Major cities of the world. http:\/\/www.geonames.org. GeoNames. 2005. Major cities of the world. http:\/\/www.geonames.org."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Marjan Ghazvininejad and Kevin Knight. 2015. How to memorize a random 60-bit string. In NAACL\u201915. 1569\u20131575. Marjan Ghazvininejad and Kevin Knight. 2015. How to memorize a random 60-bit string. In NAACL\u201915. 1569\u20131575.","DOI":"10.3115\/v1\/N15-1180"},{"key":"e_1_3_2_1_25_1","unstructured":"Murray Grant. 2014. Template based diceware algorithm. https:\/\/github.com\/ligos\/MakeMeAPassword. Murray Grant. 2014. Template based diceware algorithm. https:\/\/github.com\/ligos\/MakeMeAPassword."},{"key":"e_1_3_2_1_26_1","volume-title":"DRAFT NIST special publication 800-63-3 digital identity guidelines. NIST","author":"Grassi A","year":"2017","unstructured":"Paul\u00a0 A Grassi , Michael\u00a0 E Garcia , and James\u00a0 L Fenton . 2017. DRAFT NIST special publication 800-63-3 digital identity guidelines. NIST ( 2017 ). Paul\u00a0A Grassi, Michael\u00a0E Garcia, and James\u00a0L Fenton. 2017. DRAFT NIST special publication 800-63-3 digital identity guidelines. NIST (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.015"},{"key":"e_1_3_2_1_28_1","unstructured":"hashcat Wiki. 2023. Example hashes - Generic hash types. https:\/\/hashcat.net\/wiki\/doku.php?id=example_hashes hashcat Wiki. 2023. Example hashes - Generic hash types. https:\/\/hashcat.net\/wiki\/doku.php?id=example_hashes"},{"key":"e_1_3_2_1_29_1","volume-title":"Surpass: System-Initiated User-Replaceable Passwords. In CCS\u201915. 170\u2013181.","author":"Huh Jun\u00a0Ho","year":"2015","unstructured":"Jun\u00a0Ho Huh , Seongyeol Oh , Hyoungshick Kim , Konstantin Beznosov , Apurva Mohan , and S.\u00a0 Raj Rajagopalan . 2015 . Surpass: System-Initiated User-Replaceable Passwords. In CCS\u201915. 170\u2013181. Jun\u00a0Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, and S.\u00a0Raj Rajagopalan. 2015. Surpass: System-Initiated User-Replaceable Passwords. In CCS\u201915. 170\u2013181."},{"key":"e_1_3_2_1_30_1","volume-title":"Password security, protection, and management. US Computer Emergency Readiness Team","author":"Huth Alexa","year":"2012","unstructured":"Alexa Huth , Michael Orlando , and Linda Pesante . 2012. Password security, protection, and management. US Computer Emergency Readiness Team ( 2012 ). Alexa Huth, Michael Orlando, and Linda Pesante. 2012. Password security, protection, and management. US Computer Emergency Readiness Team (2012)."},{"key":"e_1_3_2_1_31_1","unstructured":"Noopa Jagadeesh and Miguel\u00a0Vargas Martin. 2021. Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases. arxiv:2112.03359\u00a0[cs.CR] Noopa Jagadeesh and Miguel\u00a0Vargas Martin. 2021. Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases. arxiv:2112.03359\u00a0[cs.CR]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Zeinab Joudaki Julie Thorpe and Miguel\u00a0Vargas Martin. 2018. Reinforcing system-assigned passphrases through implicit learning. In CCS\u201918. 1533\u20131548. Zeinab Joudaki Julie Thorpe and Miguel\u00a0Vargas Martin. 2018. Reinforcing system-assigned passphrases through implicit learning. In CCS\u201918. 1533\u20131548.","DOI":"10.1145\/3243734.3243764"},{"key":"e_1_3_2_1_33_1","volume-title":"A theory of reading: from eye fixations to comprehension.Psychological review 87 4","author":"Just Marcel\u00a0Adam","year":"1980","unstructured":"Marcel\u00a0Adam Just and Patricia\u00a0 A. Carpenter . 1980. A theory of reading: from eye fixations to comprehension.Psychological review 87 4 ( 1980 ), 329\u201354. Marcel\u00a0Adam Just and Patricia\u00a0A. Carpenter. 1980. A theory of reading: from eye fixations to comprehension.Psychological review 87 4 (1980), 329\u201354."},{"key":"e_1_3_2_1_34_1","unstructured":"Keepass. 2023. Keepass passphrase generation. https:\/\/keepass.info\/plugins.html#ppgen. Keepass. 2023. Keepass passphrase generation. https:\/\/keepass.info\/plugins.html#ppgen."},{"key":"e_1_3_2_1_35_1","volume-title":"A Behavioral Analysis of Passphrase Design and Effectiveness. JAIS 10 (02","author":"Keith Mark","year":"2009","unstructured":"Mark Keith , Benjamin Shao , and Paul Steinbart . 2009. A Behavioral Analysis of Passphrase Design and Effectiveness. JAIS 10 (02 2009 ), 63\u201389. Mark Keith, Benjamin Shao, and Paul Steinbart. 2009. A Behavioral Analysis of Passphrase Design and Effectiveness. JAIS 10 (02 2009), 63\u201389."},{"key":"e_1_3_2_1_36_1","volume-title":"Measuring Password Strength by Simulating Password-Cracking Algorithms","author":"Kelley Patrick\u00a0Gage","unstructured":"Patrick\u00a0Gage Kelley , Saranga Komanduri , Michelle\u00a0 L. Mazurek , Richard Shay , Timothy\u00a0 M. Vidas , Lujo Bauer , Nicolas Christin , Lorrie\u00a0Faith Cranor , and Julio\u00a0L\u00f3pez Hernandez . 2012. Guess Again (and Again and Again) : Measuring Password Strength by Simulating Password-Cracking Algorithms . IEEE S &P, 523\u2013537. Patrick\u00a0Gage Kelley, Saranga Komanduri, Michelle\u00a0L. Mazurek, Richard Shay, Timothy\u00a0M. Vidas, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, and Julio\u00a0L\u00f3pez Hernandez. 2012. Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE S&P, 523\u2013537."},{"key":"e_1_3_2_1_37_1","volume-title":"2nd USENIX Security Workshop. 5\u201314","author":"Klein V","year":"1990","unstructured":"Daniel\u00a0 V Klein . 1990 . Foiling the cracker: A survey of, and improvements to, password security . In 2nd USENIX Security Workshop. 5\u201314 . Daniel\u00a0V Klein. 1990. Foiling the cracker: A survey of, and improvements to, password security. In 2nd USENIX Security Workshop. 5\u201314."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Per\u00a0Ola Kristensson and Keith Vertanen. 2012. Performance comparisons of phrase sets and presentation styles for text entry evaluations. In IUI\u201912. 29\u201332. Per\u00a0Ola Kristensson and Keith Vertanen. 2012. Performance comparisons of phrase sets and presentation styles for text entry evaluations. In IUI\u201912. 29\u201332.","DOI":"10.1145\/2166966.2166972"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Cynthia Kuo Sasha Romanosky and Lorrie\u00a0Faith Cranor. 2006. Human selection of mnemonic phrase-based passwords. In SOUPS\u201906. 67\u201378. Cynthia Kuo Sasha Romanosky and Lorrie\u00a0Faith Cranor. 2006. Human selection of mnemonic phrase-based passwords. In SOUPS\u201906. 67\u201378.","DOI":"10.1145\/1143120.1143129"},{"key":"e_1_3_2_1_40_1","volume-title":"CISW","author":"Lee Kok-Wah","year":"2007","unstructured":"Kok-Wah Lee and Hong-Tat Ewe . 2007 . Passphrase with semantic noises and a proof on its higher information rate . In CISW 2007. 652\u2013655. Kok-Wah Lee and Hong-Tat Ewe. 2007. Passphrase with semantic noises and a proof on its higher information rate. In CISW 2007. 652\u2013655."},{"key":"e_1_3_2_1_41_1","volume-title":"Testing statistical hypotheses","author":"Lehmann L.","unstructured":"E.\u00a0 L. Lehmann and Joseph\u00a0 P. Romano . 2005. Testing statistical hypotheses ( third ed.). Springer . xiv+784 pages. E.\u00a0L. Lehmann and Joseph\u00a0P. Romano. 2005. Testing statistical hypotheses (third ed.). Springer. xiv+784 pages."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Luis\u00a0A Leiva and Germ\u00e1n Sanchis-Trilles. 2014. Representatively memorable: sampling the right phrase set to get the text entry experiment right. In CHI\u201914. 1709\u20131712. Luis\u00a0A Leiva and Germ\u00e1n Sanchis-Trilles. 2014. Representatively memorable: sampling the right phrase set to get the text entry experiment right. In CHI\u201914. 1709\u20131712.","DOI":"10.1145\/2556288.2557024"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Lucy Li Bijeeta Pal Junade Ali Nick Sullivan Rahul Chatterjee and Thomas Ristenpart. 2019. Protocols for checking compromised credentials. In CCS\u201919. 1387\u20131403. Lucy Li Bijeeta Pal Junade Ali Nick Sullivan Rahul Chatterjee and Thomas Ristenpart. 2019. Protocols for checking compromised credentials. In CCS\u201919. 1387\u20131403.","DOI":"10.1145\/3319535.3354229"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Yi Liu Ruilin Li Xingtong Liu Jian Wang Lei Zhang Chaojing Tang and Hongyan Kang. 2017. An efficient method to enhance Bitcoin wallet security. In ASID\u201917. 26\u201329. Yi Liu Ruilin Li Xingtong Liu Jian Wang Lei Zhang Chaojing Tang and Hongyan Kang. 2017. An efficient method to enhance Bitcoin wallet security. In ASID\u201917. 26\u201329.","DOI":"10.1109\/ICASID.2017.8285737"},{"key":"e_1_3_2_1_45_1","volume-title":"A Study of Probabilistic Password Models","author":"Ma Jerry","unstructured":"Jerry Ma , Weining Yang , Min Luo , and Ninghui Li. 2014. A Study of Probabilistic Password Models . In IEEE S &P. 689\u2013704. Jerry Ma, Weining Yang, Min Luo, and Ninghui Li. 2014. A Study of Probabilistic Password Models. In IEEE S&P. 689\u2013704."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"I\u00a0Scott MacKenzie and R\u00a0William Soukoreff. 2002. A character-level error analysis technique for evaluating text entry methods. In NordCHI\u201902. 243\u2013246. I\u00a0Scott MacKenzie and R\u00a0William Soukoreff. 2002. A character-level error analysis technique for evaluating text entry methods. In NordCHI\u201902. 243\u2013246.","DOI":"10.1145\/572020.572056"},{"key":"e_1_3_2_1_47_1","unstructured":"William Melicher Blase Ur Sean\u00a0M. Segreti Saranga Komanduri Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2016. Fast Lean and Accurate: Modeling Password Guessability Using Neural Networks. In USENIX SEC\u201916. 175\u2013191. William Melicher Blase Ur Sean\u00a0M. Segreti Saranga Komanduri Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2016. Fast Lean and Accurate: Modeling Password Guessability Using Neural Networks. In USENIX SEC\u201916. 175\u2013191."},{"key":"e_1_3_2_1_48_1","unstructured":"OpenAI. 2019. Better Language Models and Their Implications. https:\/\/openai.com\/blog\/better-language-models\/. OpenAI. 2019. Better Language Models and Their Implications. https:\/\/openai.com\/blog\/better-language-models\/."},{"key":"e_1_3_2_1_49_1","unstructured":"OpenSSH. 2013. ssh-keygen(1) - Linux man page. https:\/\/linux.die.net\/man\/1\/ssh-keygen. OpenSSH. 2013. ssh-keygen(1) - Linux man page. https:\/\/linux.die.net\/man\/1\/ssh-keygen."},{"key":"e_1_3_2_1_50_1","volume-title":"Beyond credential stuffing: Password similarity models using neural networks","author":"Pal Bijeeta","unstructured":"Bijeeta Pal , Tal Daniel , Rahul Chatterjee , and Thomas Ristenpart . 2019. Beyond credential stuffing: Password similarity models using neural networks . In IEEE S &P. 417\u2013434. Bijeeta Pal, Tal Daniel, Rahul Chatterjee, and Thomas Ristenpart. 2019. Beyond credential stuffing: Password similarity models using neural networks. In IEEE S&P. 417\u2013434."},{"key":"e_1_3_2_1_51_1","unstructured":"pcmag. 2022. Survey of password managers. https:\/\/bit.ly\/3ukEWKf. Accessed: 2022-01-31. pcmag. 2022. Survey of password managers. https:\/\/bit.ly\/3ukEWKf. Accessed: 2022-01-31."},{"key":"e_1_3_2_1_52_1","unstructured":"P.Norvig. 2012. English Letter Frequency Counts: Mayzner Revisited or ETAOIN SRHLDCU. http:\/\/norvig.com\/mayzner.html. P.Norvig. 2012. English Letter Frequency Counts: Mayzner Revisited or ETAOIN SRHLDCU. http:\/\/norvig.com\/mayzner.html."},{"key":"e_1_3_2_1_53_1","volume-title":"Language models are unsupervised multitask learners. OpenAI blog 1, 8","author":"Radford Alec","year":"2019","unstructured":"Alec Radford , Jeffrey Wu , Rewon Child , David Luan , Dario Amodei , and Ilya Sutskever . 2019. Language models are unsupervised multitask learners. OpenAI blog 1, 8 ( 2019 ), 9. Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language models are unsupervised multitask learners. OpenAI blog 1, 8 (2019), 9."},{"key":"e_1_3_2_1_54_1","unstructured":"AG Reinhold. 1995. The Diceware Passphrase Home Page. https:\/\/theworld.com\/\u00a0reinhold\/diceware.html. AG Reinhold. 1995. The Diceware Passphrase Home Page. https:\/\/theworld.com\/\u00a0reinhold\/diceware.html."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability.","author":"R\u00e9nyi Alfr\u00e9d","year":"1961","unstructured":"Alfr\u00e9d R\u00e9nyi 1961 . On measures of entropy and information . In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability. Alfr\u00e9d R\u00e9nyi 1961. On measures of entropy and information. In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Sena Sahin and Frank Li. 2021. Don\u2019t Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. In CCS\u201921. 252\u2013270. Sena Sahin and Frank Li. 2021. Don\u2019t Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. In CCS\u201921. 252\u2013270.","DOI":"10.1145\/3460120.3484791"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Richard Shay Patrick\u00a0Gage Kelley Saranga Komanduri Michelle\u00a0L Mazurek Blase Ur Timothy Vidas Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2012. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In SOUPS\u201912. 1\u201320. Richard Shay Patrick\u00a0Gage Kelley Saranga Komanduri Michelle\u00a0L Mazurek Blase Ur Timothy Vidas Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2012. Correct horse battery staple: Exploring the usability of system-assigned passphrases. In SOUPS\u201912. 1\u201320.","DOI":"10.1145\/2335356.2335366"},{"key":"e_1_3_2_1_58_1","unstructured":"Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In SOUPS\u201914. 243\u2013255. Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In SOUPS\u201914. 243\u2013255."},{"key":"e_1_3_2_1_59_1","unstructured":"Blase Ur Patrick\u00a0Gage Kelley Saranga Komanduri Joel Lee Michael Maass Michelle\u00a0L. Mazurek Timothy Passaro Richard Shay Timothy Vidas Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In USENIX SEC\u201912. 65\u201380. Blase Ur Patrick\u00a0Gage Kelley Saranga Komanduri Joel Lee Michael Maass Michelle\u00a0L. Mazurek Timothy Passaro Richard Shay Timothy Vidas Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In USENIX SEC\u201912. 65\u201380."},{"key":"e_1_3_2_1_60_1","unstructured":"Blase Ur Sean\u00a0M. Segreti Lujo Bauer Nicolas Christin Lorrie\u00a0Faith Cranor Saranga Komanduri Darya Kurilova Michelle\u00a0L. Mazurek William Melicher and Richard Shay. 2015. Measuring Real-World Accuracies and Biases in Modeling Password Guessability. In USENIX SEC\u201915. 463\u2013481. Blase Ur Sean\u00a0M. Segreti Lujo Bauer Nicolas Christin Lorrie\u00a0Faith Cranor Saranga Komanduri Darya Kurilova Michelle\u00a0L. Mazurek William Melicher and Richard Shay. 2015. Measuring Real-World Accuracies and Biases in Modeling Password Guessability. In USENIX SEC\u201915. 463\u2013481."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Steven Van\u00a0Acker Daniel Hausknecht Wouter Joosen and Andrei Sabelfeld. 2015. Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. In CODASPY\u201915. Steven Van\u00a0Acker Daniel Hausknecht Wouter Joosen and Andrei Sabelfeld. 2015. Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. In CODASPY\u201915.","DOI":"10.1145\/2699026.2699118"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Ding Wang Zijian Zhang Ping Wang Jeff Yan and Xinyi Huang. 2016. Targeted online password guessing: An underestimated threat. In CCS\u201916. 1242\u20131254. Ding Wang Zijian Zhang Ping Wang Jeff Yan and Xinyi Huang. 2016. Targeted online password guessing: An underestimated threat. In CCS\u201916. 1242\u20131254.","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_1_63_1","unstructured":"Grady Ward. 2002. Moby Word Lists by Grady Ward. http:\/\/www.gutenberg.org\/ebooks\/3201. Grady Ward. 2002. Moby Word Lists by Grady Ward. http:\/\/www.gutenberg.org\/ebooks\/3201."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Matt Weir Sudhir Aggarwal Michael Collins and Henry Stern. 2010. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. In CCS\u201910. 162\u2013175. Matt Weir Sudhir Aggarwal Michael Collins and Henry Stern. 2010. Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords. In CCS\u201910. 162\u2013175.","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Simon\u00a0S Woo. 2020. How Do We Create a Fantabulous Password?. In WWW\u201920. 1491\u20131501. Simon\u00a0S Woo. 2020. How Do We Create a Fantabulous Password?. In WWW\u201920. 1491\u20131501.","DOI":"10.1145\/3366423.3380222"},{"key":"e_1_3_2_1_66_1","volume-title":"10th International Conference on Passwords (Passwords\u201916)","author":"Woo S","year":"2016","unstructured":"Simon\u00a0 S Woo and Jelena Mirkovic . 2016 . Improving recall and security of passphrases through use of mnemonics . In 10th International Conference on Passwords (Passwords\u201916) . Simon\u00a0S Woo and Jelena Mirkovic. 2016. Improving recall and security of passphrases through use of mnemonics. In 10th International Conference on Passwords (Passwords\u201916)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:28Z","timestamp":1750182688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":67,"alternative-id":["10.1145\/3579856.3582839","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582839","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}