The University of Southampton
University of Southampton Institutional Repository

A security analysis of honeywords

A security analysis of honeywords
A security analysis of honeywords

Honeywords are decoy passwords associated with each user account, and they contribute a promising approach to detecting password leakage. This approach was first proposed by Juels and Rivest at CCS’13, and has been covered by hundreds of medias and also adopted in various research domains. The idea of honeywords looks deceptively simple, but it is a deep and sophisticated challenge to automatically generate honeywords that are hard to differentiate from real passwords. In Juels-Rivest’s work, four main honeyword-generation methods are suggested but only justified by heuristic security arguments. In this work, we for the first time develop a series of practical experiments using 10 large-scale datasets, a total of 104 million real-world passwords, to quantitatively evaluate the security that these four methods can provide. Our results reveal that they all fail to provide the expected security: real passwords can be distinguished with a success rate of 29.29%∼32.62% by our basic trawling-guessing attacker, but not the expected 5%, with just one guess (when each user account is associated with 19 honeywords as recommended). This figure reaches 34.21%∼49.02% under the advanced trawling-guessing attackers who make use of various state-of-the-art probabilistic password models. We further evaluate the security of Juels-Rivest’s methods under a targeted-guessing attacker who can exploit the victim’ personal information, and the results are even more alarming: 56.81%∼67.98%. Overall, our work resolves three open problems in honeyword research, as defined by Juels and Rivest.

The Internet Society
Wang, Ding
dea90a6e-5c3c-4438-87bc-d2fd25602923
Cheng, Haibo
9f106ff3-46fd-44b4-a4fa-31508a73a41a
Wang, Ping
5256bf1d-c73b-47ae-875c-b1a8e5c95175
Yan, Jeff
a2c03187-3722-46c8-b73b-439eb9d1a10e
Huang, Xinyi
7492b4ab-34ad-4016-b879-c062e21deef5
Wang, Ding
dea90a6e-5c3c-4438-87bc-d2fd25602923
Cheng, Haibo
9f106ff3-46fd-44b4-a4fa-31508a73a41a
Wang, Ping
5256bf1d-c73b-47ae-875c-b1a8e5c95175
Yan, Jeff
a2c03187-3722-46c8-b73b-439eb9d1a10e
Huang, Xinyi
7492b4ab-34ad-4016-b879-c062e21deef5

Wang, Ding, Cheng, Haibo, Wang, Ping, Yan, Jeff and Huang, Xinyi (2018) A security analysis of honeywords. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society.. (doi:10.14722/ndss.2018.23142).

Record type: Conference or Workshop Item (Paper)

Abstract

Honeywords are decoy passwords associated with each user account, and they contribute a promising approach to detecting password leakage. This approach was first proposed by Juels and Rivest at CCS’13, and has been covered by hundreds of medias and also adopted in various research domains. The idea of honeywords looks deceptively simple, but it is a deep and sophisticated challenge to automatically generate honeywords that are hard to differentiate from real passwords. In Juels-Rivest’s work, four main honeyword-generation methods are suggested but only justified by heuristic security arguments. In this work, we for the first time develop a series of practical experiments using 10 large-scale datasets, a total of 104 million real-world passwords, to quantitatively evaluate the security that these four methods can provide. Our results reveal that they all fail to provide the expected security: real passwords can be distinguished with a success rate of 29.29%∼32.62% by our basic trawling-guessing attacker, but not the expected 5%, with just one guess (when each user account is associated with 19 honeywords as recommended). This figure reaches 34.21%∼49.02% under the advanced trawling-guessing attackers who make use of various state-of-the-art probabilistic password models. We further evaluate the security of Juels-Rivest’s methods under a targeted-guessing attacker who can exploit the victim’ personal information, and the results are even more alarming: 56.81%∼67.98%. Overall, our work resolves three open problems in honeyword research, as defined by Juels and Rivest.

This record has no associated files available for download.

More information

Published date: 2018
Additional Information: Publisher Copyright: © 2018 25th Annual Network and Distributed System Security Symposium, NDSS 2018. All Rights Reserved.
Venue - Dates: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, , San Diego, United States, 2018-02-18 - 2018-02-21

Identifiers

Local EPrints ID: 504146
URI: http://eprints.soton.ac.uk/id/eprint/504146
PURE UUID: 0ce0ea19-6c33-47b3-9110-ec6a178edf2e

Catalogue record

Date deposited: 27 Aug 2025 16:50
Last modified: 27 Aug 2025 16:50

Export record

Altmetrics

Contributors

Author: Ding Wang
Author: Haibo Cheng
Author: Ping Wang
Author: Jeff Yan
Author: Xinyi Huang

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×