View Proposal
-
Proposer
-
Mike Just
-
Title
-
Avoiding the dreaded password stuffing
-
Goal
-
To build and test a secure password checking service that implements a variety of checking methods
-
Description
- Password (or more generally, credential) stuffing is a cyber attack in which an attacker takes a user's password that was compromised from one site to break into another account belonging to the same user. Such attacks are possible since users often re-use their passwords at multiple sites.
One way to prevent such attacks is to check whether a password has been compromised. Such a service would take a password (and user ID) as input, and search for the password on various compromised password lists. If the password is present on a list, then it is known to be compromised and should no longer be used. The risk with such "password checking services" is that they need to be trusted, else they might themselves be a nefarious "password harvesting service" that is stealing user passwords. To avoid have to trust the checking service, rather than providing the full password "in the clear", other information can be provided, such as a partial hash of the password.
Your task is to design and implement a password checking service, and test the service using a variety of methods and databases according to different metrics such as security, efficiency, etc.
Some related papers here (the 2nd relates to Google's password checkup service):
Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R. and Ristenpart, T., 2019, November. Protocols for checking compromised credentials. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 1387-1403).
Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley, P.G., Invernizzi, L., Benko, B., Pietraszek, T., Patel, S., Boneh, D. and Bursztein, E., 2019. Protecting accounts from credential stuffing with password breach alerting. In 28th USENIX Security Symposium (USENIX Security 19) (pp. 1556-1571).
- Resources
-
-
Background
-
You should be comfortable with some maths and computing various probabilities related to security and cryptography.
-
Url
-
-
Difficulty Level
-
Moderate
-
Ethical Approval
-
None
-
Number Of Students
-
1
-
Supervisor
-
Mike Just
-
Keywords
-
authentication, cryptography, cyber security, passwords
-
Degrees
-
Bachelor of Science in Computer Science
Master of Engineering in Software Engineering
Master of Science in Computer Science for Cyber Security
Master of Science in Computing (2 Years)
Master of Science in Information Technology (Software Systems)
Master of Science in Network Security
Master of Science in Software Engineering
Bachelor of Science in Computing Science
Bachelor of Engineering in Robotics
Bachelor of Science in Computer Science (Cyber Security)
Master of Science in Robotics with Industrial Application