{"id":"https://openalex.org/W2735788045","doi":"https://doi.org/10.1109/icdcs.2017.64","title":"SPHINX: A Password Store that Perfectly Hides Passwords from Itself","display_name":"SPHINX: A Password Store that Perfectly Hides Passwords from Itself","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2735788045","doi":"https://doi.org/10.1109/icdcs.2017.64","mag":"2735788045"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2017.64","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045531459","display_name":"Maliheh Shirvanian","orcid":"https://orcid.org/0000-0001-9735-3723"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maliheh Shirvanian","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074744414","display_name":"Stanislaw Jareckiy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stanislaw Jareckiy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076825881","display_name":"Hugo Krawczykz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hugo Krawczykz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.545,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":20,"citation_normalized_percentile":{"value":0.944221,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":null,"issue":null,"first_page":"1094","last_page":"1104"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.58765936},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.50293154}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9412677},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7525946},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.66337043},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.60828435},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.58765936},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.5821206},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.50293154},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.45874768},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.42969626}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs.2017.64","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.69}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1447429957","https://openalex.org/W1501932514","https://openalex.org/W1540780277","https://openalex.org/W1550000763","https://openalex.org/W1607915502","https://openalex.org/W1884689072","https://openalex.org/W1889757464","https://openalex.org/W19399978","https://openalex.org/W1959803714","https://openalex.org/W1985816353","https://openalex.org/W2030993695","https://openalex.org/W2037202491","https://openalex.org/W2048755632","https://openalex.org/W2100783932","https://openalex.org/W2110495618","https://openalex.org/W2123544182","https://openalex.org/W2124926080","https://openalex.org/W2125011234","https://openalex.org/W2129768690","https://openalex.org/W2139842203","https://openalex.org/W2145994642","https://openalex.org/W2148327104","https://openalex.org/W2149929743","https://openalex.org/W2406790903","https://openalex.org/W2534419286","https://openalex.org/W27238938","https://openalex.org/W2950492851"],"related_works":["https://openalex.org/W4302810031","https://openalex.org/W4294993944","https://openalex.org/W3131491961","https://openalex.org/W2969720675","https://openalex.org/W2953105088","https://openalex.org/W2916013051","https://openalex.org/W2596766976","https://openalex.org/W2017283799","https://openalex.org/W1982158666","https://openalex.org/W1847856596"],"abstract_inverted_index":{"Password":[0],"managers":[1,52,120,329],"(aka":[2],"stores":[3],"or":[4,35,182,223,416],"vaults)":[5],"allow":[6],"a":[7,24,33,44,131,373],"user":[8,201,361],"to":[9,55,76,89,92,104,109,134,249,395,407],"store":[10,93],"and":[11,242,269,292,308,325,339,350,387,391],"retrieve":[12],"(usually":[13],"high-entropy)":[14],"passwords":[15,69,80,95,241,253],"for":[16,246,289,305,411],"her":[17],"multiple":[18],"password-protected":[19],"services":[20],"by":[21,295],"interacting":[22],"with":[23,190,203,254],"\"device\"":[25],"serving":[26],"the":[27,30,41,65,82,84,90,94,98,102,106,110,144,153,157,164,173,179,183,194,198,200,208,212,218,247,255,276,286,336,359,412],"role":[28],"of":[29,43,67,78,163,193,271,280,299,342,363,377,384,414],"manager":[31,146],"(e.g.,":[32],"smartphone":[34,114,348],"an":[36,169,188,408,418],"online":[37,309,409],"third-party":[38],"service)":[39],"on":[40,156,232,275,316,320,355,372],"basis":[42,288],"single":[45],"memorable":[46],"(low-entropy)":[47],"master":[48,99,107,166,180,209],"password.":[49],"Existing":[50],"password":[51,100,108,119,135,145,167,181,210,213,328,420],"work":[53],"well":[54],"defeat":[56],"offline":[57,261],"dictionary":[58,262],"attacks":[59],"upon":[60,264,366],"web":[61,256],"service":[62,265,410],"compromise,":[63],"assuming":[64],"use":[66],"high-entropy":[68,240],"is":[70,86,159,214,273,293,303,389],"enforced.":[71],"However,":[72],"they":[73],"are":[74],"vulnerable":[75],"leakage":[77],"all":[79],"in":[81,113,220,224,311],"event":[83],"device":[85,111,158,174,219,307],"compromised,":[87],"due":[88],"need":[91,103],"encrypted":[96],"under":[97],"and/or":[101],"input":[105],"(as":[112],"managers).":[115],"Evidence":[116],"exists":[117],"that":[118,228,284,381],"can":[121],"be":[122,405],"attractive":[123],"attack":[124,263],"targets.":[125],"In":[126,151],"this":[127,290,312],"paper,":[128,313],"we":[129,314,400],"introduce":[130],"novel":[132],"approach":[133],"management,":[136],"called":[137],"SPHINX,":[138,152,343,378],"which":[139,379],"remains":[140],"secure":[141],"even":[142,196,331],"when":[143,393],"itself":[147],"has":[148],"been":[149],"compromised.":[150],"information":[154,160,177,231],"stored":[155],"theoretically":[161],"independent":[162,419],"user's":[165,184],"-":[168,211],"attacker":[170,189],"breaking":[171],"into":[172,217],"learns":[175,205],"no":[176],"about":[178,207],"site-specific":[185],"passwords.":[186],"Moreover,":[187],"full":[191],"control":[192],"device,":[195],"at":[197],"time":[199],"interacts":[202],"it,":[204],"nothing":[206],"not":[215],"entered":[216],"plaintext":[221],"form":[222],"any":[225],"other":[226],"way":[227],"may":[229,404],"leak":[230],"it.":[233],"Unlike":[234],"existing":[235],"managers,":[236],"SPHINX":[237,272,302,364,385,403],"produces":[238],"strictly":[239],"makes":[243],"it":[244],"compulsory":[245],"users":[248],"register":[250],"these":[251],"randomized":[252],"services,":[257],"hence":[258],"fully":[259],"defeating":[260],"compromise.":[266],"The":[267],"design":[268],"security":[270,386],"based":[274],"device-enhanced":[277],"PAKE":[278],"model":[279],"Jarecki":[281],"et":[282],"al.":[283],"provides":[285],"theoretical":[287],"construction":[291],"backed":[294],"rigorous":[296],"cryptographic":[297],"proofs":[298],"security.":[300],"While":[301],"suitable":[304],"different":[306],"platforms,":[310],"report":[315,371],"its":[317],"concrete":[318],"instantiation":[319],"smartphones":[321],"given":[322],"their":[323],"popularity":[324],"trustworthiness":[326],"as":[327,417],"(or":[330],"two-factor":[332],"authentication).":[333],"We":[334,369],"present":[335],"design,":[337],"implementation":[338],"performance":[340],"evaluation":[341],"offering":[344],"prototype":[345],"browser":[346],"plugins,":[347],"apps":[349],"transparent":[351],"device-client":[352],"communication.":[353],"Based":[354],"our":[356],"inspection":[357],"analysis,":[358],"overall":[360],"experience":[362],"improves":[365],"current":[367],"managers.":[368],"also":[370],"lab-based":[374],"usability":[375,388],"study":[376],"indicates":[380],"users'":[382],"perception":[383],"high":[390],"satisfactory":[392],"compared":[394],"regular":[396],"password-based":[397],"authentication.":[398],"Finally,":[399],"discuss":[401],"how":[402],"extended":[406],"purpose":[413],"back-up":[415],"manager.":[421]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2735788045","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2024-12-07T22:41:16.236708","created_date":"2017-07-21"}