A security analysis of honeywords
A security analysis of honeywords
Honeywords are decoy passwords associated with each user account, and they contribute a promising approach to detecting password leakage. This approach was first proposed by Juels and Rivest at CCS’13, and has been covered by hundreds of medias and also adopted in various research domains. The idea of honeywords looks deceptively simple, but it is a deep and sophisticated challenge to automatically generate honeywords that are hard to differentiate from real passwords. In Juels-Rivest’s work, four main honeyword-generation methods are suggested but only justified by heuristic security arguments. In this work, we for the first time develop a series of practical experiments using 10 large-scale datasets, a total of 104 million real-world passwords, to quantitatively evaluate the security that these four methods can provide. Our results reveal that they all fail to provide the expected security: real passwords can be distinguished with a success rate of 29.29%∼32.62% by our basic trawling-guessing attacker, but not the expected 5%, with just one guess (when each user account is associated with 19 honeywords as recommended). This figure reaches 34.21%∼49.02% under the advanced trawling-guessing attackers who make use of various state-of-the-art probabilistic password models. We further evaluate the security of Juels-Rivest’s methods under a targeted-guessing attacker who can exploit the victim’ personal information, and the results are even more alarming: 56.81%∼67.98%. Overall, our work resolves three open problems in honeyword research, as defined by Juels and Rivest.
Wang, Ding
dea90a6e-5c3c-4438-87bc-d2fd25602923
Cheng, Haibo
9f106ff3-46fd-44b4-a4fa-31508a73a41a
Wang, Ping
5256bf1d-c73b-47ae-875c-b1a8e5c95175
Yan, Jeff
a2c03187-3722-46c8-b73b-439eb9d1a10e
Huang, Xinyi
7492b4ab-34ad-4016-b879-c062e21deef5
2018
Wang, Ding
dea90a6e-5c3c-4438-87bc-d2fd25602923
Cheng, Haibo
9f106ff3-46fd-44b4-a4fa-31508a73a41a
Wang, Ping
5256bf1d-c73b-47ae-875c-b1a8e5c95175
Yan, Jeff
a2c03187-3722-46c8-b73b-439eb9d1a10e
Huang, Xinyi
7492b4ab-34ad-4016-b879-c062e21deef5
Wang, Ding, Cheng, Haibo, Wang, Ping, Yan, Jeff and Huang, Xinyi
(2018)
A security analysis of honeywords.
In 25th Annual Network and Distributed System Security Symposium, NDSS 2018.
The Internet Society..
(doi:10.14722/ndss.2018.23142).
Record type:
Conference or Workshop Item
(Paper)
Abstract
Honeywords are decoy passwords associated with each user account, and they contribute a promising approach to detecting password leakage. This approach was first proposed by Juels and Rivest at CCS’13, and has been covered by hundreds of medias and also adopted in various research domains. The idea of honeywords looks deceptively simple, but it is a deep and sophisticated challenge to automatically generate honeywords that are hard to differentiate from real passwords. In Juels-Rivest’s work, four main honeyword-generation methods are suggested but only justified by heuristic security arguments. In this work, we for the first time develop a series of practical experiments using 10 large-scale datasets, a total of 104 million real-world passwords, to quantitatively evaluate the security that these four methods can provide. Our results reveal that they all fail to provide the expected security: real passwords can be distinguished with a success rate of 29.29%∼32.62% by our basic trawling-guessing attacker, but not the expected 5%, with just one guess (when each user account is associated with 19 honeywords as recommended). This figure reaches 34.21%∼49.02% under the advanced trawling-guessing attackers who make use of various state-of-the-art probabilistic password models. We further evaluate the security of Juels-Rivest’s methods under a targeted-guessing attacker who can exploit the victim’ personal information, and the results are even more alarming: 56.81%∼67.98%. Overall, our work resolves three open problems in honeyword research, as defined by Juels and Rivest.
This record has no associated files available for download.
More information
Published date: 2018
Additional Information:
Publisher Copyright:
© 2018 25th Annual Network and Distributed System Security Symposium, NDSS 2018. All Rights Reserved.
Venue - Dates:
25th Annual Network and Distributed System Security Symposium, NDSS 2018, , San Diego, United States, 2018-02-18 - 2018-02-21
Identifiers
Local EPrints ID: 504146
URI: http://eprints.soton.ac.uk/id/eprint/504146
PURE UUID: 0ce0ea19-6c33-47b3-9110-ec6a178edf2e
Catalogue record
Date deposited: 27 Aug 2025 16:50
Last modified: 27 Aug 2025 16:50
Export record
Altmetrics
Contributors
Author:
Haibo Cheng
Author:
Ping Wang
Author:
Jeff Yan
Author:
Xinyi Huang
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics