Academic literature on the topic 'Credential stuffing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credential stuffing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Credential stuffing"

1

Tankard, Colin. "Credential stuffing – the new hack." Network Security 2021, no. 2 (February 2021): 20. http://dx.doi.org/10.1016/s1353-4858(21)00021-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rees-Pullman, Steven. "Is credential stuffing the new phishing?" Computer Fraud & Security 2020, no. 7 (July 2020): 16–19. http://dx.doi.org/10.1016/s1361-3723(20)30076-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nathan, Mike. "Credential stuffing: new tools and stolen data drive continued attacks." Computer Fraud & Security 2020, no. 12 (December 2020): 18–19. http://dx.doi.org/10.1016/s1361-3723(20)30130-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hussain, Maria. "Unholy Wars." American Journal of Islam and Society 20, no. 1 (January 1, 2003): 140–43. http://dx.doi.org/10.35632/ajis.v20i1.1881.

Full text
Abstract:
Reading this book is a lot like trying to eat undercooked meat – there is proteinin there, but it is flavorless and tedious. You can chew and chew, but youjust cannot bring yourself to swallow it. The author presents his case with anauthoritative tone, stuffing each paragraph with names, dates, and historicaldata, but a closer look reveals the use of manipulative language that stringstogether half-truths and repeated insinuations with conclusions that do notdirectly relate to the given evidence. The “Acknowledgements” mention thatthe author has important friends in media and politics, yet his credentials(e.g., for whom he is working, or what his political motivations are) are notgiven. This is a serious weakness.Even more serious is his clear contempt for Islam, for he makes no genuinedistinction between Muslims’ desire for self-rule based upon their beliefsystem (often called “Islamism”) and terrorism. The CIA’s use of Muslimlives to advance American corporate interests is taken for granted, whileMuslims are portrayed as untrustworthy imbeciles or ungrateful servants.Such mainstream and moderate organizations and intellectuals as TablighiJamaat, Jamaat Islami, Maududi of Pakistan, and Hassan al-Turabi of Sudanare given as examples of dangerous extremism. American terrorism againstIraq, Sudan, and Afghanistan, and its support of Israel, are unquestioned asbeing justified, noble, and necessary, while any attack on western interests orAmerican lives is described with emotionally loaded terms. The only seriouscriticism of the United States is that it ever trusted Muslims as allies ...
APA, Harvard, Vancouver, ISO, and other styles
5

Patra, Rohan, and Sandip Patra. "Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques." Journal of Student Research 10, no. 3 (October 10, 2021). http://dx.doi.org/10.47611/jsrhs.v10i3.1764.

Full text
Abstract:
Recently, there has been a rise in impactful data breaches releasing billions of people’s online accounts and financial data into the public domain. The result is an increased importance of effective cybersecurity measures, especially regarding the storage of user passwords. Strong password storage security means that an actor cannot use the passwords in vectors such as credential-stuffing attacks despite having access to breached data. It will also limit user exposure to threats such as unauthorized account charges or account takeovers. This research evaluates the effectiveness of different password storage techniques. The storage techniques to be tested are: BCRYPT Hashing, SHA-256 Hashing, SHA-256 with Salt, and SHA-256 with MD5 Chaining. Following the National Institute of Standards and Technology (NIST) guidelines on password strength, both a weak and robust password will be passed through the stated techniques. Reversal of each of the results will be attempted using Rainbow Tables and dictionary attacks. The study results show that pairing a strong password that has not been exposed in a data breach with the BCRYPT hashing algorithm results in the most robust password security. However, SHA-256 hashing with a salt results in a very similar level of security while maintaining better performance. While plain SHA-256 hashing or chaining multiple hashing algorithms together is theoretically as secure, in practice, they are easily susceptible to simple attacks and thus should not be used in a production environment. Requiring strong password which have not been exposed in previous data breaches was also found to greatly increase security.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Credential stuffing"

1

Zhang, Qi. "Detecting Credential Stuffing Between Servers." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 454–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science, 89–101. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.

Full text
Abstract:
AbstractMillions of user accounts have been exposed by data breaches within the last years. The leaked credentials pose a huge threat to many because they can be used for credential stuffing and brute-force attacks across all online services. The best solution for this problem seems to be the use of 2nd-factor authentication, like hardware tokens or one-time passwords. While these are great solutions, they cause many problems for users because they are too expensive, difficult to manage, or just not user-friendly. In this paper, we will present the results of a study that shows that users need and want secure authentication, as long as it is quick, easy, and free of charge. Hence, we investigate how recent advancements in smartphone security and authentications standards can be used to build a mobile authenticator that is easy to use, free of charge, and as secure as a hardware token. Therefore we leverage the Trusted Execution Environment of the Android platform to implement a FIDO compliant authentication mechanism on the smartphone. Furthermore, we integrate this mobile authenticator into a password manager app, to reduce user interaction, simplify the setup and provide an encompassing solution for the user.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Credential stuffing"

1

Pal, Bijeeta, Tal Daniel, Rahul Chatterjee, and Thomas Ristenpart. "Beyond Credential Stuffing: Password Similarity Models Using Neural Networks." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nguyen Ba, Minh Hieu, Jacob Bennett, Michael Gallagher, and Suman Bhunia. "A Case Study of Credential Stuffing Attack: Canva Data Breach." In 2021 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2021. http://dx.doi.org/10.1109/csci54926.2021.00187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography