{"id":"https://openalex.org/W2796769806","doi":"https://doi.org/10.1109/tdsc.2018.2824323","title":"Generation of Secure and Reliable Honeywords, Preventing False Detection","display_name":"Generation of Secure and Reliable Honeywords, Preventing False Detection","publication_year":2018,"publication_date":"2018-04-09","ids":{"openalex":"https://openalex.org/W2796769806","doi":"https://doi.org/10.1109/tdsc.2018.2824323","mag":"2796769806"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2018.2824323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2824323","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032031289","display_name":"Akshima","orcid":null},"institutions":[{"id":"https://openalex.org/I40347166","display_name":"University of Chicago","ror":"https://ror.org/024mw5h28","country_code":"US","type":"education","lineage":["https://openalex.org/I40347166"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akshima","raw_affiliation_strings":["University of Chicago, Chicago, IL, US"],"affiliations":[{"raw_affiliation_string":"University of Chicago, Chicago, IL, US","institution_ids":["https://openalex.org/I40347166"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071111742","display_name":"Donghoon Chang","orcid":"https://orcid.org/0000-0003-1249-2869"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Donghoon Chang","raw_affiliation_strings":["Indraprastha Institute of Information Technology Delhi, New Delhi, Delhi, IN"],"affiliations":[{"raw_affiliation_string":"Indraprastha Institute of Information Technology Delhi, New Delhi, Delhi, IN","institution_ids":["https://openalex.org/I119939252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023235206","display_name":"Aarushi Goel","orcid":"https://orcid.org/0000-0002-8903-6354"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aarushi Goel","raw_affiliation_strings":["Johns Hopkins University, Baltimore, MD, US"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Baltimore, MD, US","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022785822","display_name":"Sweta Mishra","orcid":"https://orcid.org/0000-0003-1240-5841"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sweta Mishra","raw_affiliation_strings":["Indraprastha Institute of Information Technology Delhi, New Delhi, Delhi, IN"],"affiliations":[{"raw_affiliation_string":"Indraprastha Institute of Information Technology Delhi, New Delhi, Delhi, IN","institution_ids":["https://openalex.org/I119939252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015932261","display_name":"Somitra Kumar Sanadhya","orcid":"https://orcid.org/0000-0003-1046-184X"},"institutions":[{"id":"https://openalex.org/I119241673","display_name":"Indian Institute of Technology Ropar","ror":"https://ror.org/02qkhhn56","country_code":"IN","type":"education","lineage":["https://openalex.org/I119241673"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Somitra Kumar Sanadhya","raw_affiliation_strings":["Indian Institute of Technology Ropar, Rupnagar, Punjab, IN"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Ropar, Rupnagar, Punjab, IN","institution_ids":["https://openalex.org/I119241673"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5032031289"],"corresponding_institution_ids":["https://openalex.org/I40347166"],"apc_list":null,"apc_paid":null,"fwci":2.8757,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.92630533,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"16","issue":"5","first_page":"757","last_page":"769"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9162505269050598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8406715393066406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.756542444229126},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5501037240028381},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.5001528263092041},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.4567602276802063},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4109458029270172},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.32330167293548584}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9162505269050598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8406715393066406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.756542444229126},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5501037240028381},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.5001528263092041},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.4567602276802063},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4109458029270172},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.32330167293548584},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2018.2824323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2824323","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W284774977","https://openalex.org/W1549671385","https://openalex.org/W1811376871","https://openalex.org/W1896997982","https://openalex.org/W1980697618","https://openalex.org/W2027670258","https://openalex.org/W2080270662","https://openalex.org/W2093397575","https://openalex.org/W2103279797","https://openalex.org/W2119545418","https://openalex.org/W2135359429","https://openalex.org/W2136829745","https://openalex.org/W2137395708","https://openalex.org/W2149929743","https://openalex.org/W2159675343","https://openalex.org/W2171920515","https://openalex.org/W2252481337","https://openalex.org/W2538793708","https://openalex.org/W3099042773","https://openalex.org/W4255523917","https://openalex.org/W6610221942","https://openalex.org/W6639678852","https://openalex.org/W6691556263"],"related_works":["https://openalex.org/W2359085393","https://openalex.org/W2969720675","https://openalex.org/W2949495265","https://openalex.org/W85711018","https://openalex.org/W2021087413","https://openalex.org/W2163113603","https://openalex.org/W2105351390","https://openalex.org/W2400890210","https://openalex.org/W3088784215","https://openalex.org/W1959666775"],"abstract_inverted_index":{"Breach":[0],"in":[1,9,43,193],"password":[2,71,104],"databases":[3],"has":[4],"been":[5],"a":[6,53,65,100,167,267],"frequent":[7],"phenomena":[8],"the":[10,22,29,44,48,89,103,114,148,158,181,210,213,217,227,246,274],"software":[11],"industry.":[12],"Often":[13],"these":[14,231],"breaches":[15],"go":[16],"undetected":[17],"for":[18,52,69,134],"years.":[19],"Sometimes,":[20],"even":[21],"companies":[23],"involved":[24],"are":[25,34,109,126,233],"not":[26,40,110,191],"aware":[27],"of":[28,47,102,123,129,147,160,245,257,269],"breach.":[30],"Even":[31],"after":[32],"they":[33],"detected,":[35],"publicizing":[36],"such":[37],"attacks":[38],"might":[39],"always":[41],"be":[42],"best":[45],"interest":[46],"companies.":[49],"This":[50],"calls":[51],"strong":[54],"breach":[55],"detection":[56],"mechanism.":[57],"Juels":[58],"et":[59,188],"al.":[60],"(in":[61],"ACM-CCS":[62],"2013)":[63],"suggest":[64],"method":[66],"called":[67,82,171],"\u2018Honeywords\u2019,":[68],"detecting":[70],"database":[72],"breaches.":[73],"Their":[74],"idea":[75,125],"is":[76,97,190],"to":[77,112,117,281],"generate":[78],"multiple":[79],"fake":[80],"passwords,":[81],"honeywords":[83,96,115,228],"and":[84,143,201,207,216,248],"store":[85],"them":[86,209],"along":[87],"with":[88,95,237,251,273],"real":[90],"password.":[91],"Any":[92],"login":[93],"attempt":[94],"identified":[98],"as":[99],"compromise":[101],"database,":[105],"since":[106],"legitimate":[107],"users":[108],"expected":[111],"know":[113],"corresponding":[116],"their":[118,124],"passwords.":[119],"The":[120],"key":[121],"components":[122],"(i)":[127],"generation":[128,163,205],"honeywords,":[130],"(ii)":[131],"typo-safety":[132],"measures":[133],"preventing":[135],"false":[136],"alarms,":[137],"(iii)":[138],"alarm":[139],"policy":[140],"upon":[141],"detection,":[142],"(iv)":[144],"testing":[145],"robustness":[146],"system":[149],"against":[150],"various":[151,278],"attacks.":[152],"In":[153],"this":[154,194],"work,":[155],"we":[156],"analyze":[157],"limitations":[159,249],"existing":[161,252,275],"honeyword":[162,204],"techniques.":[164,253],"We":[165,178,197,254,265],"propose":[166,199],"new":[168,200],"attack":[169,175,195,279],"model":[170],"\u2018Multiple":[172],"System":[173],"Intersection":[174],"considering":[176],"Input\u2019.":[177],"show":[179],"that":[180,226],"\u2018Paired":[182],"Distance":[183],"Protocol\u2019":[184],"proposed":[185,241,271],"by":[186],"Chakraborty":[187],"al.,":[189],"secure":[192],"model.":[196],"also":[198],"more":[202],"practical":[203],"techniques":[206,221,232,242],"call":[208],"\u2018evolving-password":[211,259],"model\u2019,":[212,215],"\u2018user-profile":[214],"\u2018append-secret":[218],"model\u2019.":[219],"These":[220],"achieve":[222],"\u2018approximate":[223],"flatness\u2019,":[224],"implying":[225],"generated":[229],"using":[230],"indistinguishable":[234],"from":[235],"passwords":[236],"high":[238],"probability.":[239],"Our":[240],"overcome":[243],"most":[244],"risks":[247],"associated":[250],"prove":[255],"flatness":[256],"our":[258,270,283],"model\u2019":[260],"technique":[261],"through":[262],"experimental":[263],"analysis.":[264],"provide":[266],"comparison":[268],"models":[272,280],"ones":[276],"under":[277],"justify":[282],"claims.":[284]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
