scispace - formally typeset
W

Wenjie Bai

Researcher at Purdue University

Publications -  5
Citations -  12

Wenjie Bai is an academic researcher from Purdue University. The author has contributed to research in topics: Password & Authentication server. The author has an hindex of 2, co-authored 5 publications receiving 7 citations.

Papers
More filters
Proceedings ArticleDOI

DAHash: Distribution Aware Tuning of Password Hashing Costs.

TL;DR: Distribution Aware Password Hashing (DAHash) as mentioned in this paper uses a Stackelberg game to model the interaction between a defender (authentication server) and an offline attacker, where the defender can optimize the parameters of DAHash e.g. how much effort is spent in hashing weak/moderate/high strength passwords.
Posted Content

Information Signaling: A Counter-Intuitive Defense Against Password Cracking.

TL;DR: This work introduces password strength information signaling as a novel, yet counter-intuitive, defense against password cracking attacks and gives a (heuristic) algorithm to compute the optimal signaling scheme for a defender.
Posted Content

DAHash: Distribution Aware Tuning of Password Hashing Costs

TL;DR: Distribution Aware Password Hashing (DAHash) as mentioned in this paper is a novel mechanism which reduces the number of passwords that an attacker will crack by dynamically tuning the hardness parameters of a password hash function based on the estimated strength of the user's password.
Book ChapterDOI

Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking

TL;DR: In this article, the authors explore the feasibility of applying ideas from Bayesian Persuasion to password authentication and introduce password strength signaling as a potential defense against password cracking, where the authentication server stores a signal about the strength of each user password for an offline attacker to find.
Posted Content

Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking

TL;DR: In this article, the authors introduce password strength information signaling as a defense mechanism against password cracking attacks, where the authentication server stores a (noisy) signal about the strength of each user password for an offline attacker to find.