skip to main content
10.1145/1242572.1242661acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

A large-scale study of web password habits

Published:08 May 2007Publication History

ABSTRACT

We report the results of a large scale study of password use andpassword re-use habits. The study involved half a million users over athree month period. A client component on users' machines recorded a variety of password strength, usage and frequency metrics. This allows us to measure or estimate such quantities as the average number of passwords and average number of accounts each user has, how many passwords she types per day, how often passwords are shared among sites, and how often they are forgotten. We get extremely detailed data on password strength, the types and lengths of passwords chosen, and how they vary by site. The data is the first large scale study of its kind, and yields numerous other insights into the role the passwords play in users' online experience.

References

  1. http://www.rsasecurity.com.Google ScholarGoogle Scholar
  2. http://www.passwordresearch.com.Google ScholarGoogle Scholar
  3. A. Adams and M. A. Sasse. Users are not the Enemy. Comm. ACM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Efron and R. Thisted. Estimating the number of unknown species: How many words did Shakespeare know? Biometrika, 1976.Google ScholarGoogle Scholar
  5. D. V. Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. Usenix Security Workshop, 1990.Google ScholarGoogle Scholar
  6. F. T. Grampp and R. H. Morris. UNIX Operating System Security. Bell System Tech. Jorunal, 1984.Google ScholarGoogle Scholar
  7. E. Gaber, P. Gibbons, Y. Matyas, and A. Mayer. How to make personalized web browsing simple, secure and anonymous. Proc. Finan. Crypto '97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Gale. Good-Turing Smoothing Without Tears. Statistics Research Reports from AT&T Laboratories 94.5, AT&T Bell Laboratories, 1994.Google ScholarGoogle Scholar
  9. J. Yan and A. Blackwell and R. Anderson and A. Grant. Password Memorability and Security: Empirical Results. IEEE Security & Privacy, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jefferson Wells Inc. Microsoft Phishing Filter Feature in Internet Explorer 7 and Windows Live Toolbar. 2006. http://www.jeffersonwells.com/clientauditreports/Microsoft PF IE7IEToolbarFeature Privacy Audit 20060728.pdf.Google ScholarGoogle Scholar
  11. Anti-Phishing Working Group. http://www.antiphishing.org.Google ScholarGoogle Scholar
  12. R. Morris and K. Thompson. Password Security: A Case History. Comm. ACM, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. Proceedings of the 14th Usenix Security Symposium, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. E. Russinovich and D. A. Solomon. Microsoft Windows Internals. Microsoft Press, 2005.Google ScholarGoogle Scholar

Index Terms

  1. A large-scale study of web password habits

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WWW '07: Proceedings of the 16th international conference on World Wide Web
      May 2007
      1382 pages
      ISBN:9781595936547
      DOI:10.1145/1242572

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 May 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader