TY - JOUR
T1 - Centralized vs Decentralized Targeted Brute-Force Attacks
T2 - Guessing with Side-Information
AU - Salamatian, Salman
AU - Huleihel, Wasim
AU - Beirami, Ahmad
AU - Cohen, Asaf
AU - Medard, Muriel
N1 - Funding Information:
Manuscript received July 27, 2019; revised February 3, 2020; accepted March 20, 2020. Date of publication June 29, 2020; date of current version July 9, 2020. This work was supported by the Defense Advanced Research Projects Agency (DARPA) under Contract HR001117C0050. This article was presented in part at the 2017 IEEE Symposium on Information Theory. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Xiaodong Lin. (Corresponding author: Salman Salamatian.) Salman Salamatian, Ahmad Beirami, and Muriel Médard are with the Department of Electrical Engineering and Computer Science, MIT, Cambridge, 02139 MA USA (e-mail: salmansa@mit.edu; beirami@mit.edu; medard@mit.edu).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which m adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords X of length n, generated independently and identically from a distribution PX, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information Y(m) are generated independently from passing X through a memoryless channel PY|X, as the length of the password n goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.
AB - According to recent empirical studies, a majority of users have the same, or very similar, passwords across multiple password-secured online services. This practice can have disastrous consequences, as one password being compromised puts all the other accounts at much higher risk. Generally, an adversary may use any side-information he/she possesses about the user, be it demographic information, password reuse on a previously compromised account, or any other relevant information to devise a better brute-force strategy (so called targeted attack). In this work, we consider a distributed brute-force attack scenario in which m adversaries, each observing some side information, attempt breaching a password secured system. We compare two strategies: an uncoordinated attack in which the adversaries query the system based on their own side-information until they find the correct password, and a fully coordinated attack in which the adversaries pool their side-information and query the system together. For passwords X of length n, generated independently and identically from a distribution PX, we establish an asymptotic closed-form expression for the uncoordinated and coordinated strategies when the side-information Y(m) are generated independently from passing X through a memoryless channel PY|X, as the length of the password n goes to infinity. We illustrate our results for binary symmetric channels and binary erasure channels, two families of side-information channels which model password reuse. We demonstrate that two coordinated agents perform asymptotically better than any finite number of uncoordinated agents for these channels, meaning that sharing side-information is very valuable in distributed attacks.
KW - Brute-force attacks
KW - guesswork
KW - passwords
KW - targeted attacks
UR - http://www.scopus.com/inward/record.url?scp=85089190591&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2020.2998949
DO - 10.1109/TIFS.2020.2998949
M3 - Article
AN - SCOPUS:85089190591
SN - 1556-6013
VL - 15
SP - 3749
EP - 3759
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
M1 - 9127480
ER -