{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T06:33:20Z","timestamp":1751610800606,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1845300"],"award-info":[{"award-number":["1845300"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613905.3650741","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:15:21Z","timestamp":1715415321000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Analysis of Password Managers\u2019 Password Checkup Tools"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0824-8969","authenticated-orcid":false,"given":"Adryana","family":"Hutchinson","sequence":"first","affiliation":[{"name":"Computer Science, The George Washington University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-1685","authenticated-orcid":false,"given":"Collins W.","family":"Munyendo","sequence":"additional","affiliation":[{"name":"Computer Science, The George Washington University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J","family":"Aviv","sequence":"additional","affiliation":[{"name":"Computer Science, The George Washington University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6267-4874","authenticated-orcid":false,"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","unstructured":"1Password. 2022. 1Password password quality algorithm. https:\/\/1password.community\/discussion\/130158\/1password-password-quality-algorithm"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.582"},{"key":"e_1_3_3_3_3_1","volume-title":"Exploring Credential Management Strategies and Obstacles during Password Manager Setup. (Aug.","author":"Amft Sabrina","year":"2023","unstructured":"Sabrina Amft, Sandra H\u00f6ltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. 2023. \u201cWould You Give the Same Priority to the Bank and a Game? I Do Not!\u201d Exploring Credential Management Strategies and Obstacles during Password Manager Setup. (Aug. 2023), 171\u2013190."},{"volume-title":"Hawaii International Conference on System Sciences. https:\/\/api.semanticscholar.org\/CorpusID:11088576","author":"Aurigemma Salvatore","key":"e_1_3_3_3_4_1","unstructured":"Salvatore Aurigemma, Thomas Mattson, and Lori N.\u00a0K. Leonard. 2017. So Much Promise, So Little Use: What is Stopping Home End-Users from Using Password Manager Applications?. In Hawaii International Conference on System Sciences. https:\/\/api.semanticscholar.org\/CorpusID:11088576"},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.7903\/cmr.19394"},{"key":"e_1_3_3_3_6_1","unstructured":"Sruti Bhagavatula Lujo Bauer and Apu Kapadia. 2020. (How) Do people change their passwords after a breach?http:\/\/arxiv.org\/abs\/2010.09853 arXiv:2010.09853 [cs]."},{"key":"e_1_3_3_3_7_1","unstructured":"Bitwarden. Last Accessed: 2024-01-11. Vault Health Reports | Bitwarden Help Center. https:\/\/bitwarden.com\/help\/reports\/"},{"key":"e_1_3_3_3_8_1","unstructured":"Bitwarden. Last Accessed: 2024-03-12. password-strength.service.spec.ts. https:\/\/github.com\/bitwarden\/clients\/blob\/9e8f20a8731a16a06d165b4744ddeabc2ed5b84d\/libs\/common\/src\/tools\/password-strength\/password-strength.service.spec.ts#L10"},{"key":"e_1_3_3_3_9_1","unstructured":"Crossword. Last Accessed: 2024-01-11. Arc. https:\/\/www.crosswordcybersecurity.com\/arc"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_3_3_11_1","unstructured":"Dashlane. Last Accessed: 2024-01-11. Manage the Password Health of your Starter Team or Business plan. https:\/\/support.dashlane.com\/hc\/en-us\/articles\/360016225300-Manage-the-Password-Health-of-your-Starter-Team-or-Business-plan"},{"key":"e_1_3_3_3_12_1","unstructured":"Dashlane. Last Accessed: 2024-01-17. Security alerts and Dark Web Monitoring in Dashlane. https:\/\/support.dashlane.com\/hc\/en-us\/articles\/360000038180-Security-alerts-and-Dark-Web-Monitoring-in-Dashlane"},{"key":"e_1_3_3_3_13_1","unstructured":"Enpass. Last Accessed: 2024-01-11. Miscellaneous \u2014 Enpass Security Whitepaper documentation. https:\/\/support.enpass.io\/docs\/security-whitepaper-enpass\/miscellaneous.html#password-strength-estimation"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_3_3_16_1","volume-title":"Perceptions of Chrome\u2019s Compromised Credential Notification. (Aug.","author":"Huang Yue","year":"2022","unstructured":"Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2022. Users\u2019 Perceptions of Chrome\u2019s Compromised Credential Notification. (Aug. 2022)."},{"key":"e_1_3_3_3_17_1","volume-title":"Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. (Aug.","author":"Karunakaran Sowmya","year":"2018","unstructured":"Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu. 2018. Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. (Aug. 2018)."},{"key":"e_1_3_3_3_18_1","unstructured":"KeePassXC. Last Accessed: 2024-01-11. How KeePassXC\u2019s Password Health Check Feature Works \u2013 KeePassXC. https:\/\/keepassxc.org\/blog\/2020-08-15-keepassxc-password-healthcheck\/"},{"key":"e_1_3_3_3_19_1","unstructured":"LastPass. Last Accessed: 2024-01-17. Dark Web Monitoring & Alerts - LastPass. https:\/\/www.lastpass.com\/features\/dark-web-monitoring"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705627"},{"key":"e_1_3_3_3_21_1","unstructured":"Kali Linux. Last Accessed: 2024-01-05. rsmangler | Kali Linux Tools. https:\/\/www.kali.org\/tools\/rsmangler\/"},{"key":"e_1_3_3_3_22_1","unstructured":"Kali Linux. Last Accessed: 2024-01-05. Seclists Kali Linux Tools. https:\/\/www.kali.org\/tools\/seclists\/"},{"key":"e_1_3_3_3_23_1","volume-title":"Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. (Aug","author":"Lyastani Sanam\u00a0Ghorbani","year":"2018","unstructured":"Sanam\u00a0Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, and Sven Bugiel. 2018. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. (Aug. 2018)."},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601223"},{"key":"e_1_3_3_3_25_1","unstructured":"Peter Mayer Collins\u00a0W Munyendo Adam\u00a0J Aviv and Michelle\u00a0L Mazurek. 2022. Why Users (Don\u2019t) Use Password Managers at a Large Educational Institution. (2022)."},{"key":"e_1_3_3_3_26_1","volume-title":"Individuals","author":"Mayer Peter","year":"2021","unstructured":"Peter Mayer, Yixin Zou, Florian Schaub, and Adam\u00a0J Aviv. 2021. \u201cNow I\u2019m a bit angry:\u201d Individuals\u2019 Awareness, Perception, and Responses to Data Breaches that Affected Them. (2021)."},{"key":"e_1_3_3_3_27_1","unstructured":"Microsoft. Last Accessed: 2024-01-17. Protect your online accounts using Password Monitor - Microsoft Support. https:\/\/support.microsoft.com\/en-au\/topic\/protect-your-online-accounts-using-password-monitor-6f660aae-65aa-476c-871a-7fe2bcb0c4c1"},{"key":"e_1_3_3_3_28_1","unstructured":"Daniel Miessler. 2020. SecLists\/Passwords\/2020-200mostusedpasswords.txt at master \u00b7 danielmiessler\/SecLists. https:\/\/github.com\/danielmiessler\/SecLists\/blob\/master\/Passwords\/2020-200-most-used-passwords.txt"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623150"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517534"},{"key":"e_1_3_3_3_31_1","unstructured":"Openwall. 2023. John the Ripper password cracker. https:\/\/www.openwall.com\/john\/"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133973"},{"key":"e_1_3_3_3_33_1","volume-title":"Why people (don\u2019t) use password managers effectively. (Aug","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman, Shikun\u00a0Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2019. Why people (don\u2019t) use password managers effectively. (Aug. 2019)."},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0051067"},{"key":"e_1_3_3_3_35_1","unstructured":"Have I\u00a0Been Pwned. Last Accessed: 2024-01-05. Have I Been Pwned: Pwned Passwords. https:\/\/haveibeenpwned.com\/Passwords"},{"key":"e_1_3_3_3_36_1","volume-title":"Why Older Adults (Don\u2019t) Use Password Managers. (Aug","author":"Ray Hirak","year":"2021","unstructured":"Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam\u00a0J. Aviv. 2021. Why Older Adults (Don\u2019t) Use Password Managers. (Aug. 2021), 73\u201390."},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"crossref","unstructured":"Elissa\u00a0M. Redmiles. 2019. \"Should I Worry?\" A Cross-Cultural Examination of Account Security Incident Response. http:\/\/arxiv.org\/abs\/1808.08177 arXiv:1808.08177 [cs].","DOI":"10.1109\/SP.2019.00059"},{"key":"e_1_3_3_3_38_1","unstructured":"Roboform. Last Accessed: 2024-01-11. How Secure Is My Password?https:\/\/www.roboform.com\/how-secure-is-my-password"},{"key":"e_1_3_3_3_39_1","unstructured":"SafeInCloud. 2022. Compromised passwords. \/\/safeincloud.ladesk.com\/767071-Compromised-passwords"},{"key":"e_1_3_3_3_40_1","unstructured":"SafeInCloud. Last Accessed: 2024-01-11. What is the crack time for password. https:\/\/safeincloud.ladesk.com\/709198-What-is-the-crack-time-for-password"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354192"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29938-9-1"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417882"},{"key":"e_1_3_3_3_44_1","unstructured":"Kurt Thomas Jennifer Pullman Kevin Yeo Ananth Raghunathan Patrick\u00a0Gage Kelley Luca Invernizzi Borbala Benko Tadek Pietraszek Sarvar Patel Dan Boneh and Elie Bursztein. 2019. Protecting accounts from credential stuf\ufb01ng with password breach alerting. (2019)."},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"e_1_3_3_3_46_1","unstructured":"Blase Ur Patrick\u00a0Gage Kelley Saranga Komanduri Joel Lee Michael Maass Michelle\u00a0L Mazurek Timothy Passaro Richard Shay Timothy Vidas Lujo Bauer Nicolas Christin and Lorrie\u00a0Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. (2012)."},{"key":"e_1_3_3_3_47_1","series-title":"July 2015","volume-title":"I Added \u2018!\u2019 at the End to Make It Secure\u201d: Observing Password Creation in the Lab.","author":"Ur Blase","unstructured":"Blase Ur, Fumiko Noma, Jonathan Bees, Sean\u00a0M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2015. \u201cI Added \u2018!\u2019 at the End to Make It Secure\u201d: Observing Password Creation in the Lab. (July 2015)."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec"},{"key":"e_1_3_3_3_51_1","volume-title":"Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites. (June","author":"Wash Rick","year":"2016","unstructured":"Rick Wash, Emilee Rader, and Ruthie Berman. 2016. Understanding Password Choices: How Frequently Entered Passwords are Re-used Across Websites. (June 2016)."},{"key":"e_1_3_3_3_52_1","volume-title":"25th USENIX Security Symposium","author":"Wheeler Daniel\u00a0Lowe","year":"2016","unstructured":"Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-Budget Password Strength Estimation. 25th USENIX Security Symposium (2016), 157\u2013173."},{"key":"e_1_3_3_3_53_1","unstructured":"Daniel\u00a0Lowe Wheeler. 2024. dropbox\/zxcvbn. https:\/\/github.com\/dropbox\/zxcvbn original-date: 2012-02-28T03:25:54Z."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978346"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300424"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"],"location":"Honolulu HI USA","acronym":"CHI '24"},"container-title":["Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3650741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613905.3650741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:16Z","timestamp":1750290256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3650741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":55,"alternative-id":["10.1145\/3613905.3650741","10.1145\/3613905"],"URL":"https:\/\/doi.org\/10.1145\/3613905.3650741","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}