Главная
Study mode:
on
1
Introduction
2
Motivation
3
Challenge
4
Research
5
Googles strategy
6
Asymmetry of knowledge
7
Ethics
8
Principles
9
User retention
10
Most predominant threat
11
How we designed this protocol
12
Proof of work
13
Private 10 intersection
14
Challenges
15
Private Center
16
Denial of Service
17
Data Source
18
How we do this
19
Password Checkup
20
Breach Response
21
Warning
22
Chrome Web Store
23
Anonymous telemetry
24
In practice
25
State of password security
26
Where is this threat most prominent
27
The long tail of the Internet
28
Password strength
Description:
Explore a Distinguished Paper Award-winning conference talk from USENIX Security '19 that delves into a privacy-preserving protocol for protecting accounts from credential stuffing attacks. Learn about the asymmetry of knowledge between attackers and users, and discover how a centralized breach repository can be queried without compromising sensitive information. Examine the implementation of a cloud service accessing over 4 billion breached credentials and a Chrome extension client. Analyze findings from anonymous telemetry involving 670,000 users and 21 million logins, revealing that 1.5% of web logins use breached credentials. Understand the impact of breach alerts on user behavior, with 26% of warnings resulting in password changes. Explore the ethical considerations, principles, and challenges in designing this protocol, including private set intersection and denial of service prevention. Gain insights into Google's strategy, password security state, and the prevalence of credential stuffing threats across the internet. Read more

Protecting Accounts from Credential Stuffing with Password Breach Alerting

USENIX
Add to list