{"id":"https://openalex.org/W4417100299","doi":"https://doi.org/10.48550/arxiv.2510.10246","title":"System Password Security: Attack and Defense Mechanisms","display_name":"System Password Security: Attack and Defense Mechanisms","publication_year":2025,"publication_date":"2025-10-11","ids":{"openalex":"https://openalex.org/W4417100299","doi":"https://doi.org/10.48550/arxiv.2510.10246"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2510.10246","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.10246","pdf_url":"https://arxiv.org/pdf/2510.10246","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2510.10246","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036775341","display_name":"C.\u2010J. Richard Shi","orcid":"https://orcid.org/0000-0002-3157-3464"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shi, Chaofang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100767413","display_name":"Zhongwen Li","orcid":"https://orcid.org/0000-0002-0846-4219"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Zhongwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5112984909","display_name":"Xiaoqi Li","orcid":"https://orcid.org/0000-0001-6393-102X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaoqi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036775341"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.8087999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.8087999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.06710000336170197,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.04820000007748604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8583999872207642},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.7585999965667725},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.7146999835968018},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6168000102043152},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.5874999761581421},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.4544000029563904},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.3928000032901764},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.3538999855518341}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8583999872207642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7804999947547913},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.7585999965667725},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.7146999835968018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6585999727249146},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6168000102043152},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.5874999761581421},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.4544000029563904},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.3928000032901764},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.35370001196861267},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.32440000772476196},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.3068000078201294},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.2827000021934509},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.2508000135421753}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2510.10246","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.10246","pdf_url":"https://arxiv.org/pdf/2510.10246","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2510.10246","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2510.10246","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2510.10246","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2510.10246","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.10246","pdf_url":"https://arxiv.org/pdf/2510.10246","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"System":[0],"passwords":[1,44],"serve":[2],"as":[3,88,114,172],"critical":[4],"credentials":[5],"for":[6],"user":[7],"authentication":[8],"and":[9,31,65,94,118,124,144,159,174,198,214,224],"access":[10,28],"control":[11],"when":[12],"logging":[13],"into":[14,60],"operating":[15],"systems":[16],"or":[17],"applications.":[18],"Upon":[19],"entering":[20],"a":[21,47],"valid":[22],"password,":[23],"users":[24],"pass":[25],"verification":[26],"to":[27,50,120],"system":[29,43,52,77],"resources":[30],"execute":[32],"corresponding":[33],"operations.":[34],"In":[35],"recent":[36,207],"years,":[37],"frequent":[38],"password":[39,61,78,84,160],"cracking":[40,62,85],"attacks":[41],"targeting":[42],"have":[45],"posed":[46],"severe":[48],"threat":[49],"information":[51],"security.":[53],"To":[54],"address":[55],"this":[56,182,184],"challenge,":[57],"in-depth":[58],"research":[59,75,208],"attack":[63],"methods":[64,86],"defensive":[66,104,169],"technologies":[67],"holds":[68],"significant":[69],"importance.":[70],"This":[71],"paper":[72,185],"conducts":[73],"systematic":[74],"on":[76,81],"security,":[79],"focusing":[80],"analyzing":[82],"typical":[83],"such":[87,113,171],"brute":[89,122],"force":[90,123],"attacks,":[91,93,97,165],"dictionary":[92,125],"rainbow":[95],"table":[96],"while":[98,219],"evaluating":[99],"the":[100,116,152,166,212],"effectiveness":[101,167],"of":[102,155,168,216],"existing":[103],"measures.":[105],"The":[106],"experimental":[107,204],"section":[108],"utilizes":[109],"common":[110],"cryptanalysis":[111],"tools,":[112],"John":[115],"Ripper":[117],"Hashcat,":[119],"simulate":[121],"attacks.":[126],"Five":[127],"test":[128],"datasets,":[129],"each":[130,217],"generated":[131],"using":[132],"Message":[133],"Digest":[134],"Algorithm":[135,140],"5":[136],"(MD5),":[137],"Secure":[138],"Hash":[139],"256-bit":[141],"(SHA":[142],"256),":[143],"bcrypt":[145],"hash":[146,157],"functions,":[147],"are":[148],"analyzed.":[149],"By":[150,202],"comparing":[151],"overall":[153],"performance":[154],"different":[156],"algorithms":[158,177],"complexity":[161],"strategies":[162],"against":[163],"these":[164],"measures":[170],"salting":[173],"slow":[175],"hashing":[176],"is":[178],"validated.":[179],"Building":[180],"upon":[181],"foundation,":[183],"further":[186],"evaluates":[187],"widely":[188],"adopted":[189],"defense":[190],"mechanisms,":[191],"including":[192],"account":[193],"lockout":[194],"policies,":[195],"multi-factor":[196],"authentication,":[197],"risk":[199],"adaptive":[200],"authentication.":[201],"integrating":[203],"data":[205],"with":[206],"findings,":[209],"it":[210],"analyzes":[211],"strengths":[213],"limitations":[215],"approach":[218],"proposing":[220],"feasible":[221],"improvement":[222],"recommendations":[223],"optimization":[225],"strategies.":[226]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-15T00:00:00"}
