skip to main content
10.1145/2379690.2379702acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

Visualizing semantics in passwords: the role of dates

Published:15 October 2012Publication History

ABSTRACT

We begin an investigation into the semantic patterns underlying user choice in passwords. Understanding semantic patterns provides insight into how people choose passwords, which in turn can be used to inform usable password policies and password guidelines. As semantic patterns are difficult to recognize automatically, we turn to visualization to aid in their discovery. We focus on dates in passwords, designing an interactive visualization for their detailed analysis, and using it to explore the RockYou dataset of over 32 million passwords. Our visualization enabled us to analyze the dataset in many dimensions, including the relationship between dates and their co-occurring text. We use our observations from the visualization to guide further analysis, leading to our findings that nearly 5% of passwords in the RockYou dataset represent pure dates (either purely numerical or mixed alphanumeric representations) and the presence of many patterns within the dates that people choose (such as repetition, the first days of the month, recent years, and holidays).

References

  1. W. Aigner, S. Miksch, W. Muller, H. Schumann, and C. Tominski. Visualizing time-oriented data:a systematic view. Computers & Graphics, 31(3):401--409, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Aigner, S. Miksch, W. Müller, H. Schumann, and C. Tominski. Visual methods for analyzing time-oriented data. IEEE Trans. on Visualization and Computer Graphics, 14(1):47--60, Jan 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Aigner, S. Miksch, H. Schumann, and C. Tominski. Visualization of Time-Oriented Data, chapter 7, pages 15--44. Number 1997 in Human-Computer Interaction Series. Springer London, 2011.Google ScholarGoogle Scholar
  4. J. Bonneau. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In IEEE Symp. on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Bonneau and S. Preibusch. A birthday present every eleven wallets? the security of customer-chosen banking pins. In FC '12: Proc. of the Int. Conf. on Financial Cryptography, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Bostock, V. Ogievetsky, and J. Heer. D3 data-driven documents. IEEE Trans. on Visualization and Computer Graphics, 17(12):2301--2309, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. A. Brewer. Colorbrewer. URL http://colorbrewer2.org/. Last accessed July 09, 2012.Google ScholarGoogle Scholar
  8. J. V. Carlis and J. a. Konstan. Interactive visualization of serial periodic data. In Proc. of the ACM Symposium on User Interface Software and Technology - UIST '98, pages 29--38. ACM Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Chapman. Google password strength api. URL http://www.codeproject.com/Articles/19245/Google-Password-Strength-API. Last accessed June 24, 2012.Google ScholarGoogle Scholar
  10. G. Conti. Security Data Visualization:Graphical Techniques for Network Analysis. No Starch Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Dörk, S. Carpendale, C. Collins, and C. Williamson. VisGets: Coordinated visualizations for web-based information exploration and discovery. IEEE Trans. on Visualization and Computer Graphics (Proc. of the IEEE Conf. on Information Visualization), 14(6):1205--1213, Nov./Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Florencio and C. Herley. A large-scale study of web password habits. In Proc. of the Int. Conf. on World Wide Web, WWW '07, pages 657--666. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Herley and P. Van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security Privacy, 10(1):28--36, 2012. Google ScholarGoogle ScholarCross RefCross Ref
  14. F.-S. T. Mintz, D. and M. Wayland. Tracking air quality trends with sas/graph. In Proc. of the 22nd Annual SAS User Group Int. Conf., pages 807--812, 1997.Google ScholarGoogle Scholar
  15. D. Schweitzer, J. Boleng, C. Hughes, and L. Murphy. Visualizing keyboard pattern passwords. Information Visualization, 10(2):127--133, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. F. Silva and T. Catarci. Visualization of linear time-oriented data: A survey. In Proc. of the Int. Conf. on Web Information Systems Engineering (WISE), pages 310--, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. SkullSecurity.org. Leaked passwords. http://www.skullsecurity.org/wiki/index.php/Passwords, Last accessed June 27, 2012.Google ScholarGoogle Scholar
  18. J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: Informing user security decisions with system visualization. In Proc. of the SIGCHI Conference on Human Factors in Computing Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Tominski. Enhanced interactive spiral display. In Proc. of the Annual SIGRAD Conf., Special Theme: Interactivity, pages 53--56, 1999.Google ScholarGoogle Scholar
  20. F. B. Viégas, M. Wattenberg, and J. Feinberg. Participatory visualization with Wordle. IEEE Trans. on Visualization and Computer Graphics, 15(6):1137--1144, Nov./Dec. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. of the ACM Conf. on Computer and Communications Security, CCS '10, pages 162--175, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Wicklin and R. Allison. Congestion in the sky: Visualising domestic airline traffic with sas. ASA Statistical Computing and Graphics Data Expo 2009, 2009.Google ScholarGoogle Scholar

Index Terms

  1. Visualizing semantics in passwords: the role of dates

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        VizSec '12: Proceedings of the Ninth International Symposium on Visualization for Cyber Security
        October 2012
        101 pages
        ISBN:9781450314138
        DOI:10.1145/2379690

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate39of111submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader