This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

trusted source

proofread

Largest study of its kind shows outdated password practices are putting millions at risk

password
Credit: CC0 Public Domain

Three out of four of the world's most popular websites are putting tens of millions of users and their data at risk by failing to meet minimum password requirement standards.

The findings are part of a new Georgia Tech cybersecurity study that examines the current state of password policies across the internet.

Using a first-of-its-kind automated tool that can assess a 's password creation policies, researchers also discovered that 12% of websites completely lacked password length requirements.

Assistant Professor Frank Li and Ph.D. student Suood Al Roomi in Georgia Tech's School of Cybersecurity and Privacy created the automated assessment tool to explore the Google Chrome User Experience Report (CrUX), a database of 1 million websites and pages.

The study is based on 20,000 randomly sampled websites from the CrUX database and showed that many sites:

  • Permit very short passwords.
  • Do not block common passwords.
  • Use outdated requirements like complex characters.

The researchers also discovered that only a few sites fully follow standard guidelines, while most stick to outdated guidelines from 2004. The project was 135 times larger than previous works that relied on manual methods and smaller sample sizes.

More than half of the websites in the study accepted passwords with six characters or less, with 75% failing to require the recommended eight-character minimum. About 12% had no length requirements, and 30% did not support spaces or special characters.

Only 12% of the websites studied enforced a password block list, which means more than 17,000 sites were vulnerable to cyber criminals who might try to use common passwords to break into a user's account, also known as a password spraying attack.

"Both Professor Li and I were excited to take on the challenge," said Al Roomi. "With his guidance and our continuous work on both algorithm design and the , we were able to fully develop an automated measurement of password creation policy and apply it at scale."

Al Roomi and Li designed an algorithm that automatically determines a website's password . With the help of machine learning, the pair could see the consistency of length requirements and restrictions for numbers, upper- and lower-case letters, special symbols, combinations, and starting letters. They could also see if sites permitted dictionary words or known breached passwords.

"As a security community, we've identified and developed various solutions and for improving internet and web security," said Li. "It's crucial that we investigate whether those solutions or guidelines are actually adopted in practice to understand whether security is improving in reality."

The began during the height of the pandemic when Al Roomi found a gap in the research literature surrounding website password policies. Through his reading, he discovered that a consensus of his peers did not think a large-scale survey of policies was possible due to the variety of web design.

"It was exciting to see an identified challenge in the literature and to develop and apply a vision we turned into the measurement tool," said Al Roomi. "This research was my first in my Ph.D. program at Georgia Tech and SCP. It is one of the most challenging yet rewarding endeavors I've worked on."

The full report will be presented at the ACM Conference on Computer and Communications Security (CCS) in Copenhagen, Denmark, later this month. The article, "A Large-Scale Measurement of Website Login Policies" was also accepted to the 32nd USENIX Security Symposium earlier this year.

More information: A Large-Scale Measurement of Website Login Policies. www.usenix.org/conference/usen … resentation/al-roomi

Citation: Largest study of its kind shows outdated password practices are putting millions at risk (2023, November 20) retrieved 27 April 2024 from https://techxplore.com/news/2023-11-largest-kind-outdated-password-millions.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

Complex passwords aren't always best

35 shares

Feedback to editors