Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information

Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Medard

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which m adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords X of length n, generated independently and identically from a distribution PX, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information Y(m) are generated independently from passing X through a memoryless channel PY|X, as the length of the password n goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.

Original languageEnglish
Article number9127480
Pages (from-to)3749-3759
Number of pages11
JournalIEEE Transactions on Information Forensics and Security
Volume15
DOIs
StatePublished - 1 Jan 2020
Externally publishedYes

Keywords

  • Brute-force attacks
  • guesswork
  • passwords
  • targeted attacks

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information'. Together they form a unique fingerprint.

Cite this