Publications

How users choose and reuse passwords

Abstract

Weak or reused passwords are guilty for many contemporary security breaches. It is critical to study both how users choose and reuse passwords, and the causes that lead users to adopt unsafe practices. Existing literature on these topics is limited as it either studies patterns but not the causes (using leaked or contributed datasets), or it studies artificial patterns and causes that may not align with the real ones (lab interviews and/or fictional servers). Our research complements the existing works by studying the semantic structure, strength and reuse of real passwords, as well as conscious and unconscious causes of unsafe practices, in a population of 50 participants. The participants took part in a carefully designed, ethical and IRB-approved lab study, where we harvested their existing online credentials, and interviewed them about their password strategies and their risk perceptions. We found that:(1) an average password is weak and used at more than four sites,(2) importantsite passwords are only 1-2 characters longer and 10 times stronger than those for non-important sites,(3) main causes of weak passwords are security fatigue and short password length,(4) 98% of users reuse their passwords with no changes and the rest make slight changes, which can be easily brute-forced,(5) 84% of users reuse passwords between important and nonimportant sites, and (6) main causes for password reuse are misconceptions about risk, and preference for memorability over security.

Metadata

publication
Information Sciences Institute, 2016
year
2016
publication date
2016
authors
Ameya Hanamsagar, Simon Woo, Christopher Kanich, Jelena Mirkovic
link
https://www.academia.edu/download/118085852/isi-tr-715.pdf
resource_link
https://www.academia.edu/download/118085852/isi-tr-715.pdf
journal
Information Sciences Institute
pages
43