dc.contributor.author |
Peach, S
|
|
dc.contributor.author |
Vorster, J
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2010-10-22T10:53:47Z |
|
dc.date.available |
2010-10-22T10:53:47Z |
|
dc.date.issued |
2010-05 |
|
dc.identifier.citation |
Peach, S, Vorster, J and Van Heerden, R. 2010. Heuristic attacks against graphical password generators. Proceedings of the South African Information Security Multi-Conference, Port Elizabeth, South Africa, 17-18 May 2010, pp 13 |
en |
dc.identifier.isbn |
978-1-84102-256-7 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/4487
|
|
dc.description |
Proceedings of the South African Information Security Multi-Conference, Port Elizabeth, South Africa, 17-18 May 2010 |
en |
dc.description.abstract |
In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example - operating system authentication. They report on the development of a generic tool for password generation using such a graphical click-driven interface. This stand-alone tool can be used for generating passwords on the fly. They describe the approach and the usability of such a project. The project is available as an open-source project. Next they investigate heuristic attacks against such generated passwords. By using a classifier methodology it is possible to develop specific attack-scenarios based on the category. Specific heuristic attacks are used to reduce the key-space such that brute-force cracking approaches become feasible. They report on these heuristic attacks and their success. Lastly they give criteria for images that should be used in such password generation applications to avoid these types of heuristic attacks. |
en |
dc.language.iso |
en |
en |
dc.relation.ispartofseries |
Conference Paper |
en |
dc.subject |
Graphical passwords |
en |
dc.subject |
Heuristic password attack |
en |
dc.subject |
Password cracking |
en |
dc.subject |
Graphical password generator |
en |
dc.subject |
Heuristic attacks |
en |
dc.title |
Heuristic attacks against graphical password generators |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Peach, S., Vorster, J., & Van Heerden, R. P. (2010). Heuristic attacks against graphical password generators. http://hdl.handle.net/10204/4487 |
en_ZA |
dc.identifier.chicagocitation |
Peach, S, J Vorster, and Renier P Van Heerden. "Heuristic attacks against graphical password generators." (2010): http://hdl.handle.net/10204/4487 |
en_ZA |
dc.identifier.vancouvercitation |
Peach S, Vorster J, Van Heerden RP, Heuristic attacks against graphical password generators; 2010. http://hdl.handle.net/10204/4487 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Peach, S
AU - Vorster, J
AU - Van Heerden, Renier P
AB - In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example - operating system authentication. They report on the development of a generic tool for password generation using such a graphical click-driven interface. This stand-alone tool can be used for generating passwords on the fly. They describe the approach and the usability of such a project. The project is available as an open-source project. Next they investigate heuristic attacks against such generated passwords. By using a classifier methodology it is possible to develop specific attack-scenarios based on the category. Specific heuristic attacks are used to reduce the key-space such that brute-force cracking approaches become feasible. They report on these heuristic attacks and their success. Lastly they give criteria for images that should be used in such password generation applications to avoid these types of heuristic attacks.
DA - 2010-05
DB - ResearchSpace
DP - CSIR
KW - Graphical passwords
KW - Heuristic password attack
KW - Password cracking
KW - Graphical password generator
KW - Heuristic attacks
LK - https://researchspace.csir.co.za
PY - 2010
SM - 978-1-84102-256-7
T1 - Heuristic attacks against graphical password generators
TI - Heuristic attacks against graphical password generators
UR - http://hdl.handle.net/10204/4487
ER -
|
en_ZA |