Next Article in Journal
Joint User Association and Deployment Optimization for Energy-Efficient Heterogeneous UAV-Enabled MEC Networks
Previous Article in Journal
An Approach for the Estimation of Concentrations of Soluble Compounds in E. coli Bioprocesses
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Systematic Review on Password Guessing Tasks

1
The 30th Research Institute of China Electronics Technology Group Corporation, Chuangye Road, Chengdu 610093, China
2
Unit 95835 of PLA, Urumqi 841700, China
3
Wuhan Maritime Communication Research Institute, Canglong Avenue, Wuhan 430205, China
4
College of Computer, National University of Defense Technology, Deya Road, Changsha 410003, China
5
Northwest Institute of Mechanical and Electrical Engineering, Biyuan East Road, Xianyang 712000, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(9), 1303; https://doi.org/10.3390/e25091303
Submission received: 26 June 2023 / Revised: 28 July 2023 / Accepted: 31 July 2023 / Published: 7 September 2023
(This article belongs to the Section Entropy Reviews)

Abstract

:
Recently, many password guessing algorithms have been proposed, seriously threatening cyber security. In this paper, we systematically review over thirty methods for password guessing published between 2016 and 2023. First, we introduce a taxonomy for classifying the existing methods into trawling guessing and targeted guessing. Second, we present an extensive benchmark dataset that can assist researchers and practitioners in successive works. Third, we conduct a bibliometric analysis to present trends in this field and cross-citation between reviewed papers. Further, we discuss the open challenges of password guessing in terms of diverse application scenarios, guessing efficiency, and the combination of traditional and deep learning methods. Finally, this review presents future research directions to guide successive research and development of password guessing.

1. Introduction

Information and communication technology represented by the Internet has profoundly changed people’s daily life. Although the application of the Internet provides convenience, cyber security risks inevitably follow. From a global perspective, the dangers posed by cyber security are becoming more and more prominent. They continue to penetrate various fields, such as politics, the economy, culture, society, and national defense. To protect the hardware, software, and data of the network system from being damaged, changed, or leaked, various cyber security protection methods are proposed. Among them, identity authentication plays a significant role in securing network systems.
The existing identity authentications can be broadly divided into the following four categories [1]:
  • Based on what the user knows, such as passwords, PINs, etc.;
  • Based on what the user owns, such as U-shields, encryption cards, etc.;
  • Based on what the user is, such as human physiological characteristics (fingerprints, iris, face, voice, etc.) and user behavior characteristics (handwriting, mouse movement speed, keyboard tapping frequency, etc.);
  • Multi-factor authentication technology, that is, multiple combinations of the above three authentications.
Figure 1 illustrates password-based authentication. The user is authenticated by entering a password through the public network to obtain the appropriate access rights. This kind of authentication is one of the most important methods to protect user information in the industry due to its strong practicability and ease of deployment [2].
With the continuous improvement of Internet application ecology, people have to set many passwords that satisfy different password policies to protect the corresponding software applications. As a result, each person has to remember many passwords in daily life. However, human memory capacity is relatively limited. Only five to seven passwords can be remembered [2]. Under this contradiction, users inevitably take measures to help memorize passwords, such as using weak passwords with low information entropy [3], using personal-related information in passwords [4,5], or reusing the same password in multiple systems [6,7]. Although these methods reduce the difficulty of password memorization, they are associated with serious security threats, allowing password guessing attacks to take advantage. Furthermore, a great deal of well-known websites’ password files have been leaked, which provides a constant source of material for password guessing to improve the attacking algorithm. In addition, with the prosperity of artificial intelligence, a large number of neural approaches for password guessing are emerging and the guessing ability has been continuously enhanced. In such circumstances, password security faces unprecedented pressure. Therefore, it is incredibly urgent and vital to sort out the research related to password guessing systematically. This review can present a reference for developers to design password authentication and provide password security researchers with a comprehensive understanding of the research dynamics in related fields. Table 1 lists all the abbreviations we make use of throughout this review.

1.1. Related Surveys and Reviews

Password guessing has multiple perspectives involving heuristic search, probabilistic models, and deep learning (DL). Some recently published survey papers have contributed overviews on password guessing, as Table 2 shows. In the following part of this section, we will present the related works in tabular order and compare them with our review at the end.
A password is a particular text sequence that has the characteristics of short length and rich semantics. Hence, taking full advantage of passwords’ semantics and language patterns is beneficial for password guessing. A comprehensive evaluation of semantic password grammar in terms of sample size, probabilistic smoothing, and linguistic information is presented in the survey [8], and it is compared with state-of-the-art Probabilistic Context-Free Grammar (PCFG) and neural network models in a cross-validation context. The experimental results reveal the contribution of syntax and semantic patterns to password guessing and show that the former has more impact on password security. Moreover, the paper illustrates that PCFG is often still competitive with the latest neural network counterpart models. A slight performance improvement has been achieved when training PCFG with more than 1 million passwords.
In the paper [9], the authors survey state-of-the-art deep learning methods for password guessing and password strength evaluation, including password pattern extraction, candidate password generation, and password strength measurement. However, due to its publication in 2020, the paper is only a statistics-relevant paper up to 2019. Various AI techniques have been rapidly iterated in recent years, and the paradigm has changed from models to machine learning theories. Therefore, there is an urgent need to update the relevant content.
A brief review of various existing typical password guessing algorithms in terms of assumptions, identification information, and theoretical models is presented in [10]. Multiple metrics are also used to understand and evaluate the performance of these algorithms. The characteristics of different password guessing algorithms are summarized by analyzing experimental results. It is demonstrated that two algorithms guess more passwords than one when the number of guesses is the same. In addition, the authors propose a hybrid password guessing algorithm, PaMLGuess, which has both strong interpretability and generalization ability and uses probability mapping to solve the problem that the probability sizes given by different password guessing algorithms vary greatly.
Artificial intelligence technology has advanced by leaps and bounds in recent years, blossoming and landing in many fields. Artificial intelligence is a double-edged sword. While it provides a variety of services to humans, threat actors use AI to conduct cyber attacks on society. Artificial intelligence is combined with traditional attack techniques to cause more damage. The paper [11] aims to explore existing research on AI-based cyber attacks and map it to a proposed framework that provides insight into new threats. The framework includes classifying several aspects of the malicious use of AI in the cyber attack lifecycle and provides a basis for its detection to predict future threats. Eleven case studies are found and classified into five categories: next-generation malware, voice synthesis, password-based attacks, social bots, and adversarial training.
A comparative analysis of deep learning algorithms and traditional probabilistic models for password guessing is presented in [12]. The authors analyze the password patterns of the leaked dataset and further present a comparative study of two mainstream probabilistic models, i.e., Markov-based and PCFG-based models, and the PassGAN model, which is a representative approach based on deep learning.
An empirical study of password management with 154 participants is reported in the paper [13]. The participants’ computers are instrumented to record detailed information about password characteristics and usage and many other computational behaviors. The study of these data enables a more accurate analysis of the password characteristics and behavior of the participants’ full web-based accounts. The findings include that the use of symbols and numbers in passwords predicts an increased likelihood of reuse, while increasing password strength predicts a decreased likelihood of reuse; password reuse is more common than previously thought, especially when partial reuse is considered; and password managers may have no effect on password reuse or strength. It is also observed that users could be grouped into a small number of behavioral clusters representing various password management policies. The findings suggest that, once users need to manage more passwords, they respond by partially and fully reusing passwords in most accounts.
A study that combined self-reported survey responses with measures of actual online behavior collected over six weeks from 134 participants is conducted in [13]. It is found that people tend to reuse passwords on 1.7–3.4 different websites, and most of them tend to reuse more complex and frequently entered passwords. The authors also investigate whether self-reported measures are accurate indicators of actual behavior and find that, although people understand password security, their self-reported intentions are only weakly correlated with reality. These findings suggest that users respond to the challenge of having many passwords by choosing a complex password to remember on a site.
The above reviews have different focuses on user habits, language patterns, AI threats, etc. Although some work attempts to compare deep learning with traditional probabilistic models, the selected deep models are homogeneous (i.e., GAN and RNN), and the statistical literature is very old. In this review, we collate the latest papers up to March 2023 and compare a large number of password guessing algorithms with different structures. Therefore, our work covers a broad range of methods, providing a holistic view of password guessing for password-based authentication.

1.2. Objectives and Contributions

A password is a widely used authentication method that aims to confirm the user’s identity through text matching. Although password-based authentication has some security and usability flaws and many new authentication techniques have been proposed, it will remain the dominant authentication method in the foreseeable future due to its simplicity, low cost, and ease of change. This work aims at providing an overview of recent neural approaches for password guessing, shaping the landscape of challenges and solutions in this field. Such a review is needed to help successive scientists and practitioners in the industry have a starting point for the research in password guessing.
The major contribution of this work are summarized as follows.
  • First, we classify password-guessing-related research into two categories according to the application scenarios: trawling password guessing and targeted password guessing. We compare and analyze those methods for researchers to understand the current status of password guessing.
  • Second, we provide an extensive list of benchmark datasets for password guessing tasks so that interested researchers can easily find out baselines for their works.
  • Third, we conduct an extensive bibliometric analysis from multiple perspectives to comprehensively depict the relationships among the existing password guessing studies.
  • Finally, we discuss the open challenges of password guessing in terms of diverse application scenarios, guessing efficiency, and the combination of traditional and deep learning methods. Thus, this review helps to ease the efforts to find these requirements.

1.3. Paper Structure

The remainder of this paper is organized as follows. Section 2 outlines the methods for searching and selecting works for this review. Section 3 provides a summary of datasets for password guessing. Section 4 introduces a taxonomy to categorize password guessing methods and review the guessing method in detail. Section 5 presents the bibliometric analysis. Section 6 discusses the open challenges for this field. Section 7 provides the concluding remarks.

2. Research Method

This review for password guessing follows a systematic literature review methodology. We follow the procedure proposed by [14] to retrieve research papers from the existing literature, select relevant works out of the results, and summarize them afterward. Therefore, the systematic review process is reproducible and mitigates selection biases toward the works in the literature. Section 2.1, Section 2.2 and Section 2.3 outline research questions, the search strategy, and the study selection for the making of this review.

2.1. Research Questions

Research questions are the cornerstone of a literature review since every step of the review process relies on them. To come up with this review, we answer the following research questions:
  • What are the current neural approaches for password guessing?
  • How can the literature on password guessing be organized into a taxonomy that categorizes similar approaches based on the DL model, type of data, and application scenario?
  • Which benchmark datasets are available for password guessing?
  • What bibliometric relationships exist between the existing research studies?
  • What are the open challenges regarding password guessing?

2.2. Search Strategy

The works we review in this paper were retrieved from top venues for NLP, machine learning, security, and privacy, which are indexed by either ACM Digital Library, IEEE Xplore, SpringerLink, Science Direct, or Web of Science. In addition to papers indexed by the aforementioned electronic scientific libraries, we also included valuable works in the e-Prints archive since this repository stores the most up-to-date research results. Once the list of electronic libraries was defined, we extracted search strings from the primary research questions and technical descriptions to retrieve relevant papers.
Table 3 lists the search terms we derived from the research questions and technical descriptions in two columns. The first seven rows of Term 1 are different descriptions of the password guessing task and the last two terms are the different guessing strategies. Term 2 contains technical terms. All 18 search terms are listed in the table combined to create search strings for the electronic libraries.

2.3. Study Selection

We applied the search terms in Table 3 to retrieve a total of 917 relevant works. Figure 2 shows a statistical histogram of the search results in each electronic library. Searches on ACM DL and IEEE Xplore returned most of the results, which account for 728 papers and 79% of the total. There is a certain amount of duplication and irrelevance in the retrieved works. Therefore, we must apply some inclusion and exclusion criteria to select the most relevant jobs. Published papers that satisfied all the following inclusion criteria were selected for this review.
  • Works that employed deep learning or traditional probabilistic method to model password guessability, such as PCFG, GAN, and VAE.
  • Works published from the year 2016 onward. Since previous works have been reviewed in some works and this review aims to describe recent developments in the field of password guessing, we limited the publication time.
  • Long papers or regular papers published in the main track of the conference or journal.
  • Works published by top-tier venues, especially cybersecurity-related conferences or journals, such as S&P, CCS, NDSS, USENIX Conference, IEEE TDSC, or IEEE TIFS.
Published works that satisfied any of the following exclusion criteria were removed from this review.
  • Works published before 2016.
  • Published works that did not contain the content of modeling password guessing.
  • The experimental platform is not a desktop computer.
  • Duplicated works.
After applying the above inclusion and exclusion criteria, we screened 41 papers that span from 2016 to March 2023.

3. Datasets

In this section, we provide an extensive list of benchmark datasets for password guessing tasks so that interested researchers can find out the basic information of baselines for their works. The list covers mainstream leaked password datasets and the datasets used in the reviewed papers. Since passwords are sensitive and private personal data, we cannot provide the relevant data or links directly.
As shown in Table 4, we summarized the dataset in seven aspects. The first column is the name of the leaked source system. A description of the services provided by the leaked source system is in the second column. The affiliation column and language column are statistics on which country the leaked source system is affiliated with and what official language is used. The fifth and sixth columns present the time and cause of the password leakage. The size column is used to describe the scale of the leaked dataset. The last column counts the times it was used in the reviewed papers.
Some preliminary conclusions can be drawn from the analysis of Table 4. First of all, most of the leaked data originated from well-known companies in large countries, such as the United States and China. Hence, English and Chinese are the dominant languages in the leaked password dataset. Second, most of the password data were leaked around 2010. Finally, in general, the larger the size of the dataset, the higher the probability of it being used as a research corpus. For example, the Rockyou is the largest English dataset in the table in terms of data size and it is also the most frequently used corpus in our reviewed works.

4. Password Guessing

Currently, the most serious security threat to password-based authentication systems is password guessing attacks. The research on password guessing has a long history and various methods and techniques have emerged. Based on different criteria, these studies can be classified into the following different categories.
  • According to whether the attack process requires interaction with the server, the password guessing attack can be classified into offline password guessing and online password guessing. The former attack requires the authentication server to store the user account password file and then the attacker makes a password guess on the local host. In this situation, the number of guesses that can be attempted is limited only by the attacker’s computing resources. The latter does not require a password file, and the attacker only needs to be connected to the network. However, the number of guesses that can be attempted is often limited by the server’s security policy, such as the US National Identity Standards NIST-800-63-3, which stipulates that the maximum number of failed logins allowed for a government website system in a month is 100, and the account will be locked if it exceeds 100 [15].
  • According to whether the attack process utilizes the user’s personal information, password guessing attacks can be classified into trawling password guessing and targeted password guessing. While trawling guessing mainly exploits the user’s tendency to choose popular passwords, targeted guessing not only exploits the vulnerability of ordinary users to use popular passwords but also exploits the vulnerability of users to reuse passwords and construct passwords using personal information. With the help of information such as personally identifiable information and historical passwords, the success rate of targeted password guessing is significantly higher than trawling guessing with the same number of guesses.
  • According to whether deep neural network methods of artificial intelligence are used in the attack process, password guessing attacks can be classified into neural attacks and traditional attacks. The former treats password guessing as a text generation task and relies on AI-related techniques to generate text passwords on a large-scale password training corpus. The latter encapsulates other methods, excluding deep neural network guessing methods.
In the remainder of this section, we divide the retrieved related work into trawling password guessing and targeted password guessing according to the second classification criterion above. In each category, we perform a secondary classification according to the third classification criterion to better compare and present the related works. The reason why the first taxonomy is not used is that almost all existing work is offline guessing and online guessing is too difficult to guess a password within 100 guesses.

4.1. Trawling Password Guessing

Trawling attacking aims to guess as many passwords as possible within the allowed guesses times and does not care who the specific target of the attack is. This means that the optimal attacker sequentially performs password guessing based on the ranking of the guessing probability. In this section, we review the existing methods in terms of both traditional trawling password guessing and neural trawling password guessing.

4.1.1. Traditional Trawling Password Guessing Methods

Currently, heuristic search, Probabilistic Context-Free Grammar (PCFG) [16], and Markov sequence decision [17] are the mainstream backbone techniques for traditional trawling password guessing. In this section, the three methods mentioned above are introduced and analyzed.
Heuristic Algorithms. Early password guessing algorithms are basically trawling attack algorithms. These algorithms do not have a rigorous theoretical system and rely heavily on fragmented whimsy, for example, constructing unique guess dictionaries [18,19,20] using well-designed guess sequences [21] based on open-source software. As [3] points out, these heuristics are difficult to reproduce and to compare fairly with each other. Therefore, here, we only present some commonly used heuristic password guessing tools.
  • John the Ripper (JTR), https://github.com/openwall/john (accessed on 20 June 2023). Originally, JTR was a password guessing tool that focuses on cracking UNIX/ Linux system weak passwords. There are four modes in JTR—single crack mode, wordlist crack mode, incremental mode, and external mode. Simple crack mode is specifically for users who use the account as the password. For example, an account username is ’admin’; the corresponding password may be ’admin888’ or ’admin123’. The wordlist crack mode requires the user to specify a dictionary file. Then, JTR performs password cracking based on the dictionary file. The incremental mode automatically tries all possible combinations of characters to be used as passwords. This mode is powerful but has a high time and space overhead. The external mode allows the user to develop a cracking module in C and then hook up the cracking module to the JTR environment to crack the password.
  • HashCat, https://github.com/hashcat/hashcat (accessed on 20 June 2023). HashCat is the world’s fastest and most advanced password recovery utility, supporting five unique attack modes for over 300 highly optimized hashing algorithms. Hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and MacOS, and has facilities to help enable distributed password cracking.
  • L0phtCrack, https://l0phtcrack.gitlab.io/ (accessed on 20 June 2023). The L0phtCrack project was created in 1997 by a group of hackers. After development and maintenance, the password auditing tool L0phtCrack was officially announced as open source. As a dedicated tool, L0phtCrack can be used to evaluate the strength of passwords and to help people in need recover lost passwords through brute force, dictionary, rainbow attacks, and other technical means.
There is also some analysis and optimization work for the above attack tools. In [22], the authors introduced techniques to reason analytically and efficiently about transformation-based password cracking in software tools like John the Ripper and Hashcat. They defined two new operations, rule inversion and guess counting, with which they analyze these tools without needing to enumerate guesses. Furthermore, they presented four applications showing how their techniques enable increased scientific rigor in optimizing these attacks’ configurations. In addition, work [23] discussed the measurement bias generated by using static policies for password strength estimation. To reduce this inherent measurement bias, the authors proposed a new generation of dictionary attacks called Adaptive Dynamic Mangling rules attack (AdaMs) that automates the advanced guessing strategies adopted by attackers and cast an adversary model that is consistently more resilient to inaccurate configurations to describe real-world attackers’ capabilities.
PCFG. In 2009, ref. [16] proposed the first fully automated trawling password guessing algorithm based on probabilistic context-independent grammar (PCFG). The core assumption of this algorithm is that the alphabetic segment L, numeric segment D, and special character segment S of the password are independent of each other. It first splits the password according to the three character types above. For example, “yu123456!” is split into the following structures— L 2 : y u , D 6 : 123456 , a n d S 1 : ! . The L 2 D 6 S 1 is called the pattern of that password. The algorithm includes training and guessing phases. In the training phase, the most critical thing is to calculate the frequency of password patterns (Structure) and character components (Semantic) based on the leaked password dataset. In the guessing phase, a set with frequency guesses is generated based on the pattern frequency table and semantic frequency table obtained in the training phase to simulate the probability distribution of the real password.
After years of development, some improved PCFG-based password guessing models have been proposed. Character is the primary processing unit of the traditional PCFG algorithm in password guessing. This processing granularity is too fine to obtain the semantic relationships between characters. To address this issue, ref. [24] extracted the semantic segments in the password based on word cohesion and freedom degree and improved the PCFG algorithm based on the semantic segments. Differently, in work [25], the authors regarded the password as a composition of several chunks, where a chunk is a sequence of related characters that appear together frequently to model passwords. This chunk segmentation method, called PwdSegment, extends the Byte-Pair Encoding (BPE) [26] algorithm by using the configurable parameter of an average length of chunk vocabularies to replace the number of the merge operations. In addition, to address the difficulty of long password guessing, ref. [27] proposed an improved PCFG-based long password guessing method named TransPCFG in which the knowledge learned by the short password PCFG algorithm is transferred to guess long passwords.
Markov. In 2005, ref. [28] introduced the Markov chain to password guessing for the first time. The core assumption of this algorithm is that users construct passwords sequentially from front to back. Instead of segmenting the password like PCFG, it trains the entire password and calculates the probability of the password by linking the characters from left to right.
The traditional Markov model is widely used in password guessing work due to its simple structure and fast inference. However, it also has certain drawbacks, such as overfitting, high repetition rate, and low coverage of the generated password based on random sampling. To address the above problems, some improved Markov-based password guessing models have been proposed.
To alleviate overfitting, ref. [17] applied Laplace smoothing and End-Symbol regularization techniques to the Markov model. The smoothing strategy eliminates the overfitting problem in the dataset, and the regularization technique makes the probabilities of the guesses generated by the attack algorithm always sum to 1.
To reduce the repetition rate of generated passwords, ref. [29] designed a dynamic distribution mechanism based on a random sampling method. This mechanism allows the probability distribution of the password to be dynamically adjusted and strictly converge to a uniform distribution during the guessing process. The authors proposed a dynamic Markov model based on the above dynamic distribution mechanism. Meanwhile, in order to model the semantic segments in the password, ref. [30] proposed a model named WordMarkov to extract the word cohesion and freedom degrees from the password through the semantic segments.
Random Forest. At USENIX’23, Wang et al. [31] proposed RFGuess, a random-forest-based framework that characterizes the three most representative password guessing scenarios. In the work, the authors assumed that the order in which users create passwords is from left to right, and each character is only related to a few characters before it. Under this assumption, the password generation process can be regarded as a multi-class classification problem. Assume that T = { ( x 1 , y 1 ) , ( x 2 , y 2 ) , , ( x n , y n ) } is the training set, and then use the random forest to build a mapping f from the input space X to the output space Y . Here, X = { n _ o r d e r s t r i n g s o f a p a s s w o r d s e t } , and Y = { 95 p r i n t a b l e A S C I I c o d e s } { e n d s y m b o l } . The RFGuess is similar to the Markov 7-gram model [28]. Firstly, it processed the password into the form of 6-order character prefixes and their corresponding characters. Then, it represented the 6-order prefix as a 26-dimensional vector; the single character following this prefix in an ASCII value. During the training step, RFGuess traversed the 26-dimensional prefix feature vectors as training input and took the numerical label of the corresponding characters as training output.

4.1.2. Neural Trawling Password Guessing Methods

With the rapid development of artificial intelligence, many studies have treated the password guessing task as a text generation problem and introduced some neural models in natural language processing.
In their pioneering work, in 2006, ref. [32] introduced shallow neural networks for password guessing. After years of development, in 2016, ref. [33] proposed FLA, which uses recurrent neural networks to estimate password distribution. This model follows the sequential decision procedure of the Markovian model but relaxes the n-markovian assumption. FLA can enumerate password space by a tree traversal algorithm to produce new guessing results. Since then, various generative neural networks based on have been observed repeatedly for trawling password guessing. In the following part of this section, we present the neural trawling password guessing methods by the neural model.
Recurrent Neural Network (RNN). As shown in Figure 3a, RNN is a recursive neural network that takes sequence data as input, recursion in the direction of sequence evolution, and all nodes (recurrent units) are connected in a chain. RNNs can be used not only as basic text generators but also can be embedded into other network as generative units. There are many variants of RNNs, such as LSTM [34], GRU [35], Bi-LSTM [36], etc.
The basic premise of the password guessing method using RNNs is that password guessing can be considered as a sequential text generation task. As shown in Figure 3b, the activations in the forward pass when the RNN is fed the characters yu1 as input. The output layer contains confidences the RNN assigns for the next character (vocabulary is ‘y,u1,2,3’). We can see that, in the first time step, when the RNN saw the character y, it assigned a confidence of 1.0 to the next letter being y, 2.2 to the letter u, −3.0 to 1, 4.1 to 2, and 2.0 to 3. Since in our training data (the password string yu123) the next correct character is u, we would like to increase its confidence (red) and decrease the confidence of all other letters (black).
The RNN-based password guessing methods usually have the following two steps:
  • The password sequence from the training set is input to the RNN model for training in sequential text generation.
  • The trained RNN guessing model aims to generate the next password character based on the existing password characters until the output termination character position.
Throughout the password generation process, the RNN calculates the probability of any character as the next password token. For a given threshold, a password with the probability that is higher than the threshold will be put into the password guessing set as a valid password.
Some researchers took RNN as a password generator with slight differences in the specific structure. Specifically, ref. [37] used the original RNN for password generation, and [38] segmented the password words and used Bi-LSTM to generate the password on the basis of word segments. In [39], the authors proposed a hierarchical semantic model called HSM, which combined LSTM with semantic analysis to mine the potential probabilistic relationships between words for password guessing. For Chinese passwords, ref. [40] proposed a password guessing method based on Chinese syllables. The method treated Chinese syllables as integral elements to parse and process passwords. And then, the processed passwords were trained in an LSTM neural network to generate the password.
Differently, in work [41], the authors used deep learning, specifically RNN with attention mechanism, to combine and interpolate information about users in the same group to define a robust and accurate prior over their password distribution. They presented the first self-configurable password model that uses auxiliary data to adapt to the target password distribution at inference time. In this way, a fully automatic approach to exploit auxiliary information and instantiate context-aware password meters and guessing attacks without requiring any plaintext samples from the target password distribution was developed.
Generative Adversarial Network (GAN). GAN [42] was proposed by Google researcher-Ian Goodfellow in 2014. It is an unsupervised learning method that unsupervised learning that makes the samples generated by the generative network obey the natural data distribution through adversarial training. As shown in Figure 4, the GAN-based password guessing model consists of a password generator and discriminator. The password generator takes random samples from the latent space as input, and its output needs to mimic the real password samples in the training set as much as possible. The input of the password discriminator network is the real password sample or the output of the generator network. The purpose of the discriminator is to distinguish the password output of the generator network from the real password sample. The two networks confront each other and continuously adjust the parameters. With the ultimate goal of making the discriminator network unable to determine whether the output of the generator network is real or not, so as to achieve the effect of password generation.
Further, ref. [43] proposed the first GAN-based trawling password guessing method called PassGAN in 2019, which does not rely on manual password analysis and autonomously learns the real password distribution from actually leaked passwords. Although the GAN-based guessing method provides a new way for trawling password guessing, there are several problems: the non-differentiability of discrete password data may lead to gradient back-propagation failure, the training of GAN-based password guessing model is difficult to converge, and the password generated by GAN model has a high repetition rate.
To address the problem of non-differentiability of the password discrete data sampling process, works [44,45] used Gumbel-Softmax [46] relaxation technique to train the GAN-based password guessing model. In addition, an alternative solution is provided in the work [44], which uses a smooth representation of the real password obtained by an additional autoencoder. In contrast, ref. [47] proposed RLPassGAN, a SeqGAN-based [48] password guessing method that uses policy gradients to ensure that the model parameters can be continuously optimized.
To alleviate the problem of convergence difficulties, ref. [49] designed a guessing algorithm based on a bidirectional generative adversarial network to improve the convergence rate. It can generate the same number of samples in a shorter time compared to the traditional GAN.
To deal with the problem of high repetition rate, ref. [47] argued that the root problem is that the output of the intermediate layer of the generator is an incomplete sequence of passwords that cannot be directly evaluated by the discriminator before reaching the output layer resulting in many redundant synthetic passwords. To address this problem, the authors proposed an improved method that uses Monte Carlo search [50] to evaluate the incomplete password sequences at the output of the intermediate layer. Differently, ref. [49] build an additional controller network using a discriminator and a controller to learn the metric between the generated password distribution and the true password distribution and uniform distribution, respectively. And then used these two metrics to teach the generator, thus reducing the repetition rate of password generation.
In addition to the above three issues, RLPass [51] innovatively used representation learning for password guessing. Specifically, the password is projected into the hidden space and the distance between password representations in the hidden space is used to define the similarity of the password. Based on the phenomena of strong locality and weak locality of passwords, the authors proposed a dynamic password guessing and conditional password algorithm. To address the low quality of long passwords generated by GAN-based models, ref. [52] designed a DenseNet-based [53] GAN structure for password guessing called DenseGAN, and two novel password guessing DenseGAN models are proposed, which both can generate high-quality password guesses.
AutoEncoder (AE). AE is an unsupervised learning model. It is based on back-propagation algorithms and optimization methods that use the input data themselves as supervision to guide the neural network to learn a mapping relationship to obtain a reconstructed output. The AE contains both encoder and decoder parts. According to the learning paradigm, AE can be classified as Undercomplete Autoencoder, Regularized Autoencoder, and Variational AutoEncoder (VAE), where the first two are discriminative models and the latter is a generative model. In the study of trawling password guessing, the Variational AutoEncoder [54] is usually used to generate password guesses.
As shown in Figure 5, the password sample (yu123) is input to the encoder of VAE to obtain the representation, and then the sample is reconstructed based on this representation using a decoder. The password generator is trained based on the reconstruction loss between the input x and generated x .
Although several trawling password guessing algorithms [47,51,55,56] use the VAE model to generate password guesses, each approach has a slightly different focus. In [55], the authors use the classical VAE framework to guess passwords without any change. Differently, ref. [47] combines VAE with the GAN technique and replaces the generator of GAN with VAE, aiming to solve back-propagation of discrete password data. Focusing on the light weight of the model, in [56], the complex RNN generation units are replaced by gated convolutional neural networks (GCNN) [57] to greatly reduce the complexity of the model.
Transformer. The Transformer model was proposed by Google in 2017 in the paper-Attention Is All You Need [58]. As shown in Figure 6, the Transformer model took the encoder–decoder architecture and used Attention [59] to replace the recurrent structure in the Seq2Seq model to parallelize sequence modeling. This parallelized structure provides a great shock to the field of natural language processing (NLP). As research progressed, related techniques gradually flowed from NLP to other fields, such as computer vision (CV), speech, biology, chemistry, etc. Similarly, there are some Transformer-based approaches in the research related to trawling password guessing [60,61].
The work [60] aims to study the probability of password cracking in common password rules and provide a reference for password setting. The authors collected a large number of users’ personal information and passwords and analyzed the correlation between personal information and passwords. Then, a password guessing model based on the improved Transformer was implemented. The work introduces message weights to data preprocessing and uses an improved beam search algorithm in the model to quickly search for the top-ranked password guesses. Differently, in [61], the authors proposed a bi-directional-Transformer-based guessing framework called PassBERT, which applied the paradigm of pre-training/fine-tuning to the password cracking for the first time. Specifically, first, the authors designed generalized password pre-training models that contain the knowledge of general password distributions. Then, three attack-specific fine-tuning approaches were proposed to tailor the pre-trained password model to the following real-world attack scenarios: conditional password guessing, targeted password guessing, and adaptive-rule-based password guessing. Finally, they further proposed a hybrid password strength meter to mitigate the risks from the three attacks.
Reinforcement Learning (RL). RL is one of the paradigms and methodologies of machine learning that is used to describe and address the problem of learning strategies to maximize reward or achieve specific goals by an intelligent agent during its interaction with the environment. Reinforcement learning theory, inspired by behaviorist psychology, focuses on online learning and tries to maintain a balance between exploration–utilization. Unlike supervised and unsupervised learning, reinforcement learning does not require any data to be given in advance, but, rather, learning information is obtained and model parameters are updated by receiving rewards (feedback) for actions from the environment.
As shown in Figure 7, the password generator is the agent, each generated password sequence represents a complete trajectory, and each character from the generation process is considered as an action. For example, a character generated by timestamp t is action a t . Each action a t is generated according to a random policy on the current state S t , which is determined by the generated incomplete sequence. The generator generates the password from arbitrary characters under a set of random policies until a predetermined length is satisfied. The discriminator is viewed as a reward function that evaluates the generated password sequence to update the parameters of the neural network.
In [47], the authors proposed a trawling password guessing model called RLPassGAN based on reinforcement learning and GAN. Specifically, the work follows the SeqGAN [48] to treat the password guess as a sequential decision and uses the policy gradient to ensure the parameters can be continuously optimized. Furthermore, the incomplete password sequences of the output are evaluated by Monte Carlo search [50]. Monte Carlo is a computational method that use a large number of random samples to learn about a specific system. It is very powerful and flexible, yet simple to understand and implement. It was proposed in 1940 in the Manhattan Project. The name came from the gambling city of Monte Carlo, symbolizing probability. In addition to the above applications, Monte Carlo has also been applied to estimate the guessing number of a given password [62,63].
Flow. Generative models GAN and VAE have been introduced in the above; neither of them explicitly learns the probability density function of real data p ( x ) . In the case of generative models with latent variables, it is almost impossible to compute them p ( x ) = p ( x | z ) p ( z ) because it is difficult to traverse all possible values of the hidden variable z.
This challenge is solved by the generative model-normalizing flows [64], which is a powerful statistical tool for density estimation. One very distinctive feature of the flow model is that its transitions are usually reversible. As shown in Figure 8, the flow model not only finds a network pathway to transfer from distribution Entropy 25 01303 i001 to distribution 𝒳 but that pathway also allows 𝒳 to change to Entropy 25 01303 i001. In short, the flow model finds a duplex pathway between distributions Entropy 25 01303 i001 and 𝒳 . Of course, such reversibility comes at the cost that the data dimensions of Entropy 25 01303 i001 and 𝒳 must be the same.
The transition between Entropy 25 01303 i001 and 𝒳 distributions is a tough job. The flow model goes through three steps. First, the Non-linear Independent Components Estimation (NICE) [65] achieves a reversible solution from the 𝒳 distribution to the Gaussian distribution. Later, RealNVP [66] proposes a reversible solution from the 𝒳 distribution to the conditional non-Gaussian distribution. Then, GLOW [67] designs a reversible solution from distribution Entropy 25 01303 i001 to the 𝒳 distribution, where the 𝒳 distribution can be the same complex as the Entropy 25 01303 i001 distribution.
With the development of Flow, the Flow generative model has also been used for password guessing. In [68], Giulio Pagnotta et al. proposed PassFlow, a password guessing method based on a generative model of Flow. The Flow-based password guessing model uses exact log-likelihood computation and optimization to make the inference of latent variables accurate. In addition, a meaningful representation of the latent space is provided, which makes operations such as exploring specific subspaces of the latent space and interpolation possible. The authors demonstrate the applicability of the generative Flow model for password guessing. The experimental results show that PassFlow is able to outperform current GAN-based approaches in password guessing using a training set that is several orders of magnitude smaller than the previous method.
The above analysis reveals a wealth of research on trawling password guessing. Both traditional guessing methods and deep neural guessing methods have a large number of research. Since the datasets used in each work are different, it is difficult to make a cross-sectional comparison. Here, we take the widely used Rockyou dataset as an example to roughly illustrate the guessing effect of the existing methods. On the Rockyou dataset, the guessing accurate rate of the current trawling password guessing model is around 70% when the size of the guess set is 10 9 , and around 90% when the size of the guess set is 10 12 .

4.2. Targeted Password Guessing

For the given personal identifiable information (PII), the goal of the targeted password guessing attack is to guess the password as fast as possible [5,69]. Therefore, the attacker uses personal information related to the target person to enhance the guess. There are various kinds of personal identifiable information, such as demographic-related information (name, birthday, age, education, gender, etc.), expired passwords, and leaked passwords from other websites or systems. In this section, we follow the classification criteria in the above section to discuss targeted password guessing from traditional and neural models.

4.2.1. Traditional Targeted Password Guessing Methods

Targeted-Markov. In 2015, ref. [69] first proposed a targeted attack guessing method based on a trawling Markov attack model [70]. The basic idea is that, regarding the percentage of the population that uses certain personal information, the target of the attack will also have the same likelihood percentage of using that personal information. To implement this idea, the literature [71] first divides the PIIs into several types, such as username-A, email prefix-E, and name-N, and further subdivides each broad type according to the desired granularity. Then, all PIIs in each password of the training set are replaced with the corresponding PII type. The remaining steps of the training phase are the same as those of the walking Markov model [71]. The guess set generation phase is divided into two steps. In the first step, the walking Markov model [71] is run to generate an intermediate guess set, which contains both directly usable guesses, such as 123456, and intermediate guesses with basic characters of PII type (e.g., N1, N2123). The second step replaces the basic PII-type characters in the intermediate guesses with the corresponding PII information.
Personal-PCFG. In 2016, ref. [5] proposed a targeted attack guessing method based on PCFG, called Personal-PCFG. It follows the trawling PCFG attack model [16]. The basic idea is the same as the PCFG attack model: slice the password by character type and length. To implement this idea, the literature [5] divides the PIIs into six major types (i.e., username-A, email prefix-E, name-N, birthday-B, phone number-P, and ID-G) and treats these six PI character types as equal to L, D, and S in the trawling PCFG model so that there are nine types of characters in the Personal-PCFG. Then, during the training process, each password in the training set is segmented by the corresponding character type and its length as in the trawling PCFG attack model [16].
TarGuess Wang et al. [4] proposed a framework that systematically characterizes typical targeted guessing scenarios with four mathematical probabilistic models. The first scenario, TarGuess-I, aims to utilize the PII of the user to create an online targeted password guessing. To represent the PII tokens in the password, the authors defined 28 PII labels based on the type of personal information (e.g., N 1 N 7 and B 1 B 10 ), in addition to the L, D, and S labels in the PCFG [16] model. For each PII label, its subscript number represents a subdivision of the PII usage of this type instead of the subscript number indicating the corresponding length, as in the case of L, D, and S labels. For example, N represents the name information, while N 1 represents the full name and N 2 represents the abbreviation of the full name. The second, Targuess-II, aims to guess the user password in a target website (e.g., CSDN) given the user’s leaked password in other websites (e.g., Dodonew). Specifically, the authors propose six structural-level and two character-level mnemonic transformations to depict password reuse and a Markov model is used to carve a context-independent transformation grammar based on the above reuse rules. The third, TarGuess-III, aims to guess the user’s password using a sister password and some PII information. TarGuess-III introduces PII information to the TarGuess-II model, allowing PII information to be embedded in structure-level password reuse. Compared to TarGuess-III, the attacker in the TarGuess-IV scenario knows additional PII that is difficult to quantify (e.g., gender, education). To solve the problem that some of the PII is difficult in terms of being directly embodied in the password, the authors cleverly introduce Bayesian theory to compute the reuse probability of the password based on this difficult-to-quantify PII.
RFGuess-PII. Based on RFGuess introduced in Section 4.1.1, Wang et al. [31] proposed a new targeted password guessing model called RFGuess-PII. The password training and generating process is similar to the trawling guessing scenario. The difference is that the PII string in the password is replaced with the corresponding digital tag through the new PII matching. This new PII matching aims to minimize the information entropy and tries to accurately extract the PII usage behavior of the entire user group. The first step of the PII matching algorithm is to subdivide the various possible transformations of PII and use digital tags to represent them. The second step is to list all the possible representations with PII tags for each password in the training set. Then, the representations were sorted by frequency from high to low.
RFGuess-Reuse. In addition to PII-based targeted password cracking research, in [31], the authors also focused on modeling users’ password reuse behavior. They also considered both structure-level and segment-level transformations, like TarGuess-II [4]. Specifically, they count structure-level transformations by calculating the editing matrix for each password pair in the training set, and a segment-level transformation (i.e., a transformation within a string of the same type, e.g., passwordpasswor in letter segment) model based on random forest was trained.
TG-SPSR. In [72], the authors transpose both Markov and PCFG models to targeted attacks and propose a systematically targeted attack model based on structure partitioning and string reorganization, called TG-SPSR. In the structure partition phase, in addition to dividing the password into a basic structure similar to PCFG [16], the authors define a trajectory-based keyboard in the basic syntax pattern and introduce index bits to accurately describe the location of special characters. In addition, a BiLSTM classifier is constructed to reuse and modify the behavior of passwords based on the defined nine modification rules.

4.2.2. Neural Targeted Password Guessing Methods

With the development of natural language processing techniques, some sophisticated neural networks are applied to the field of targeted password guessing. In [73], the authors proposed a targeted password guessing model called PG-Pass composed of the pointer generator network. This work innovatively considers targeted password guessing as a summarization task and applies pointer network techniques commonly used in the field of intelligent summarization to it.
It should be noted that, in addition to the user’s demographic-related information (name, birthday, etc.), the user’s leaked passwords on other websites can also be exploited by attackers to perform targeted attacks. It can be expected that such targeted attacks that exploit the vulnerable behavior of user password reuse may be more harmful than attacks based on demographic-related information.
Based on the fact that users are always eager to generate new passwords by reusing or fine-tuning old ones, ref. [74] proposed a password Transformer-based reuse model and simulated credential tampering attacks. At the IEEE S&P’19 conference, Pal et al. [75] introduced deep learning techniques to characterize users’ password reuse behavior. More specifically, they trained a sequence-to-sequence (seq2seq) model to predict the modifications required to transform an existing password to their sister passwords and carried out validation on a large-scale dataset (i.e., 4iQ dataset [76]). In addition, Wang et al. [77] proposed a targeted password guessing algorithm, PASS2EDIT, to model the increasingly damaging credential tweaking attack, in which an attacker exploits the victim’s leaked passwords to increase her success rate of guessing the victim’s passwords at other sites. Particularly, they proposed a multi-step decision making training mechanism and built a classification neural network to learn the reaction of one-step edit operations to the existing password.
Since the datasets used in each work are different, it is difficult to make a cross-sectional comparison. Taking the 12306 dataset as an example, the existing targeted password guessing methods have a guess accuracy rate of about 41.07% when the guessing set is 100 [73]. In the reuse guessing scenario, when the victim’s password at site A (namely p w A ) is known, within 100 guesses, the cracking success rate of the SOTA method [77] in guessing her password at site B ( p w B = p w A ) is 24.2% (for common users) and 11.7% (for security-savvy users), respectively.

5. Bibliometric Analysis

Bibliometrics is a cross-science that analyzes all knowledge carriers quantitatively using mathematical and statistical methods. It is a comprehensive system that integrates mathematics, statistics and bibliography and focuses on quantification. To better present the quantitative relationships among the reviewed papers, we conduct a bibliometric analysis in this section.

5.1. Statistics of Technology

To present the development trend of password guessing research, we perform detailed technical statistics in this section. In Section 5.1, we present comprehensive statistics of the various techniques and models used in the reviewed papers.

Fine-Grained Technical Statistics

To present a comprehensive view of the categories, adopted technologies, and release times of the reviewed papers, we design a fine-grained technology statistics chart as shown in Figure 9. The names (the correspondence between method name and paper is detailed in Appendix A Table A1.) of password guessing methods in the reviewed papers in descending order by proposed time are shown on the left side of Figure 9. The timeline and the number of technologies are presented on the right and below Figure 9, respectively. In the following part, we will analyze and explain the technical statistics from a different dimension.
From the perspective of time, it can be seen that a small amount were published sporadically from 2016 to 2018 and the publication number in 2021 increased to nine. This quantitative increase indicates the overall research on password guessing shows a rising trend. In terms of the technology distributed location, the guessing methods based on deep neural networks are mainly concentrated in the upper left corner of the figure, while the guessing methods based on traditional methods are mainly concentrated in the lower right corner. This phenomenon indicates that the research on neural password guessing has been hot in recent years. It also reflects that the focus of password guessing technology is changing from the traditional method to the deep neural network method.
From the perspective of numbers, the techniques used in neural password guessing methods are more diversified in many studies. Among them, GAN, RNN, and CNN are the most-used techniques. For traditional password guessing methods, the PCFG and Markov are the most widely used guessing techniques.
From the perspective of categories, the existing research mainly focuses on trawling password guessing with as many as 37 guessing techniques, and there are only six works about targeted password guessing research. This indicates that the existing studies are more concerned with trawling password guessing, and even less research has been conducted on targeted password guessing.
Although many parties are very concerned about password-related research, password guessing research is still not perfect and mature. On the one hand, as mentioned earlier, there is a lack of systematic research on password guessing attacks, and most of them focus on individual attack scenarios, such as offline trawling guessing. further, the increasingly realistic targeted online guessing has rarely been addressed. On the other hand, even though a few studies focus on targeted password guessing, they mostly stay at the level of simple statistics on user behavior and reliance on heuristic whims, lacking theoretical and principled research. Some fundamental problems need to be solved.

5.2. Cross-Citation Analysis

In order to investigate the cross-citation relationships among the reviewed papers, we conducted a cross-citation analysis in this section. As shown in Figure 10, we used a chord chart to visualize the cross-citation relationships. The left part of the chord chart reflects the number of papers cited by others, and the right half indicates the number of papers citing others. The middle arc represents the existence of a cross-citation relationship between two papers. A closer look at the chord chart can easily reveal that FLA [33] and PassGan [43] are the most-cited works by others. This indirectly illustrates the influence of the two works. Since FLA and PassGAN are the first methods to use RNN [34] and GAN [42] to model password guessability, respectively, it can confirm why RNN and GAN are used in high frequency.
To further explore the cross-citation of the reviewed papers, we conducted a statistical analysis in terms of the nationality of the institution to which the first author belongs. As shown in Figure 11, we colored the country regions on the world map with the number of publications. At a glance, it is clear that the Chinese region has the deepest coloring. It means that China is the country that published the most papers in the password guessing field. The United States follows China in second place. Looking further at the graph, we can observe an interesting phenomenon that almost all citations revolve around these two countries with a large number of publications. The arrows in the figure represent the citation direction, and the numbers on the arrows represent the number of citations. For example, the number 35 on the arrow points to the United States from China. This means that twenty-five papers published by China cite six papers published by the United States a total of 46 times. To quantitatively estimate the influence of the country in the field of password guessing, we follow the impact factor (IF) method in the Journal Citation Reports produced by Thomson Reuters to calculate. Specifically, the impact factor of each country is calculated as follows: I F = C i t a t i o n s P u b l i c a t i o n s . After calculation, the IF of China is 0.28 and the IF of the United States is 11. This value indicates that, although China has a large number of publications, its influence in this field is far less than the United States, which has a smaller number of publications.

6. Challenges and Future Trends

Despite the progress made in password guessing, many issues remain to address. In this section, we point out the main challenges and future trends that emerged from the analysis presented in this paper.

6.1. Diverse Application Scenarios

The existing research mainly focuses on the scenario of trawling guessing, but, in real application scenarios, there are often the requirements of targeted guessing, few-shot guessing, and low resources. These application scenarios are real and highly demanded. Taking the few-shot targeted password guessing as an example, it means that the attacker can guess the password of a given user in a given service according to relevant targeted information (user personal information, system password policy, etc.). For this scenario, the existing methods have difficulty solving the problem of few-shot. Although techniques such as data augmentation can be used to alleviate the lack of samples, it is still tricky to fundamentally break through the dilemma. Likewise, various deep learning algorithms also rely heavily on the size and quality of the samples, and the collection of sensitive information such as passwords is difficult. Therefore, guessing targeted passwords against limited password samples is a complicated problem.

6.2. Improving Guessing Efficiency

The existing password guessing methods are designed without considering the space–time complexity. However, in real applications, time and computing resources are often limited. Both traditional and neural password guessing methods require enormous computing power to support. As the neural network models become increasingly complex, the storage requirements also increase tremendously. Therefore, quickly performing password guessing with low resources is also challenging. In the reviewed papers, only one work discussed a lightweight password guessing model [56]. Thus, a great deal of work in this area still needs to be advanced urgently.

6.3. Combing Traditional and Deep Learning Methods

As the analysis in Section 5 shows, the techniques used in password guessing are relatively outdated compared to related research. With the rapid development of technology, as researchers of password guessing, we should embrace emerging technologies to give full play to traditional methods. As a typical generative task, password guessing should theoretically pay close attention to the latest developments in the field of intelligent generation. However, looking at the existing research, emerging generative models, such as flow [64] and diffusion models [78,79,80], are rarely applied in password guessing. In addition, the current neural password guessing methods have a premise that the password string is a sequence of characters, and the sequence encoding is used to process the password. In fact, we can make more attempts, such as organizing passwords into graphs according to their semantic dependencies and using the latest graph neural network (GNN)-related technologies [81,82,83,84] for sampling and generation. Moreover, the pre-trained language models [85,86,87,88] have been in full swing in the field of natural language processing in recent years. However, only one work [61] has discussed the paradigm of pre-training/fine-tuning regarding password guessing. Therefore, it might also be a good idea to combine the powerful general language modeling capabilities of pre-trained language models with the existing password guessing efforts.

7. Conclusions

In this paper, we present a systematic review for modeling password guessability, covering datasets, methodology, and bibliometric analysis. We propose a taxonomy structure to classify the existing password guessing works as a guide to readers, with the advantage of enabling this structure to be extended to future works and neural methods. Our review covers over 37 methods for password guessing published between 2016 and 2023, which crack passwords from the perspective of guessing scenario: trawling and targeted.
To summarize, we investigated the question of how to guess the password. Firstly, we approached this endeavor by considering different scenarios and divided into traditional and neural categories for comparison and discussion. Secondly, we collected extensive benchmark datasets to assist researchers and practitioners in successive works. Finally, we conducted an extensive bibliometric analysis to present trends in this field and cross-citation between reviewed papers.

Author Contributions

W.Y. wrote the main manuscript text, Q.Y., H.Y. and W.X. prepared figures, T.C. and L.N. prepared the dataset, W.Y., L.H. and Q.J. designed the search strategy. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported by the National Defense Science and Technology Key Laboratory Foundation under Grant 6142103032203.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

We would like to express our gratitude towards the reviewers for their insightful comments on our article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. The name list of password guessing methods in this review.
Table A1. The name list of password guessing methods in this review.
NameTitle
Pass2EditPass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords [77]
PassBertImproving Real-world Password Guessing Attacks via Bi-directional Transformers [61]
UNCMUniversal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data [41]
RFGuessPassword Guessing Using Random Forest [31]
PG-PassPG-Pass: Targeted Online Password Guessing Model based on Pointer Generator Network [73]
Pass2PathBeyond Credential Stuffing: Password Similarity Models Using Neural Networks [75]
BiPassPassMon: A Technique for Password Generation and Strength Estimation [49]
GHDRA Honeywords Generation Method Based on Deep Learning and Rule-Based Password Attack [89]
G-PassPassword Guessing Based on GAN with Gumbel-Softmax [45]
VAEPassVAEPass: A lightweight passwords guessing model based on variational auto-encoder [56]
PassTransPASSTRANS: An improved password reuse model based on Transformer [74]
RLPassGanRLPassGAN: Password Guessing Model Based on GAN with Policy Gradient [47]
WordMarkovWordMarkov: a new password probability model of semantics [30]
passflowPassFlow: Guessing Passwords with Generative Flows [68]
dynamic MarkovDynamic Markov model: Password guessing using probability adjustment method [29]
PGGANPGGAN: Improve Password Cover Rate Using the Controller [90]
PGVAEModeling Password Guessability via Variational Auto-Encoder [55]
DenseGANDenseGAN: A Password Guessing Model Based on DenseNet and PassGAN [52]
Corpora PCFGCorpora-based Password Guessing: An Effcient Approach for Small Training Sets [91]
S-PassGANA GAN-based approach for password guessing [44]
TransPCFGTransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively [27]
TarGuess-1+A New Targeted Password Guessing Model [92]
improved transfromerResearch on Password Cracking Technology Based on Improved Transformer [60]
REDPACKGenerating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN [93]
CSNNCSNN: Password guessing method based on Chinese syllables and neural network [40]
HSMPassword Guessing Based on Semantic Analysis and Neural Networks [39]
Password_GuessEfficient Password Guessing based on a Password Segmentation Approach [94]
Unit-Based RNNA Coarse-Grained Password Model with Memorable Unit-Based Recurrent Neural Networks [38]
TG-SPSRTg-spsr: A systematic targeted password attacking model [72]
PassGanPassGAN: A Deep Learning Approach for Password Guessing [43]
GENPassGENPass: A Multi-Source Deep Learning Model for Password Guessing [95]
TPGXNNAn Analysis of Targeted Password Guessing Using Neural Networks [96]
PpredictorPassword Predictability Using Neural Networks [37]
TarGuessTargeted Online Password Guessing: An Underestimated Threat [4]
Personal PCFGA study of personal information in human-chosen passwords and its security implications [5]
FLAFast, Lean, and Accurate: Modeling Password Guessability using Neural Networks [33]
RLPassImproving Password Guessing via Representation Learning [51]

References

  1. Wang, D. Research on Key Issues in Password Security. Ph.D. Thesis, Peking University, Beijing, China, 2017. [Google Scholar]
  2. Bonneau, J.; Herley, C.; van Oorschot, P.C.; Stajano, F. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In Proceedings of the IEEE Symposium on Security and Privacy (SP 2012), San Francisco, CA, USA, 21–23 May 2012; pp. 553–567. [Google Scholar]
  3. Bonneau, J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In Proceedings of the IEEE Symposium on Security and Privacy (SP 2012), San Francisco, CA, USA, 21–23 May 2012; pp. 538–552. [Google Scholar]
  4. Wang, D.; Zhang, Z.; Wang, P.; Yan, J.; Huang, X. Targeted Online Password Guessing: An Underestimated Threat. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S., Eds.; ACM: New York, NY, USA, 2016; pp. 1242–1254. [Google Scholar]
  5. Li, Y.; Wang, H.; Sun, K. A study of personal information in human-chosen passwords and its security implications. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM 2016), San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  6. Das, A.; Bonneau, J.; Caesar, M.; Borisov, N.; Wang, X. The Tangled Web of Password Reuse. In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 2014), San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
  7. Ives, B.; Walsh, K.R.; Schneider, H. The domino effect of password reuse. Commun. ACM 2004, 47, 75–78. [Google Scholar] [CrossRef]
  8. Veras, R.; Collins, C.; Thorpe, J. A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. ACM Trans. Priv. Secur. 2021, 24, 20:1–20:21. [Google Scholar] [CrossRef]
  9. Zhang, T.; Cheng, Z.; Qin, Y.; Li, Q.; Shi, L. Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China, 29 December 2020–1 January 2021; Wang, G., Ko, R.K.L., Bhuiyan, M.Z.A., Pan, Y., Eds.; pp. 1162–1166. [Google Scholar]
  10. Zhang, J.; Yang, C.; Zheng, Y.; You, W.; Su, R.; Ma, J. A Preliminary Analysis of Password Guessing Algorithm. In Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN 2020), Honolulu, HI, USA, 3–6 August 2020; pp. 1–9. [Google Scholar]
  11. Kaloudi, N.; Li, J. The AI-Based Cyber Threat Landscape: A Survey. ACM Comput. Surv. 2020, 53, 20:1–20:34. [Google Scholar] [CrossRef]
  12. Linghu, Y.; Li, X.; Zhang, Z. Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing. In Proceedings of the Algorithms and Architectures for Parallel Processing—19th International Conference (ICA3PP 2019), Melbourne, VIC, Australia, 9–11 December 2019; Proceedings Part I—Lecture Notes in Computer Science. Wen, S., Zomaya, A.Y., Yang, L.T., Eds.; Springer: Cham, Switzerland, 2019; Volume 11944, pp. 468–483. [Google Scholar]
  13. Pearman, S.; Thomas, J.; Naeini, P.E.; Habib, H.; Bauer, L.; Christin, N.; Cranor, L.F.; Egelman, S.; Forget, A. Let’s Go in for a Closer Look: Observing Passwords in Their Natural Habitat. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX, USA, 30 October–3 November 2017; Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D., Eds.; ACM: New York, NY, USA, 2017; pp. 295–310. [Google Scholar]
  14. Kitchenham, B. Procedures for Performing Systematic Reviews. Keele 2004, 33, 1–26. [Google Scholar]
  15. Grassi, P.A.; Perlner, R.A.; Fenton, J.L.; Burr, W.E. NIST Special Publication 800-63B Digital Identity Guidelines; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. [Google Scholar]
  16. Weir, M.; Aggarwal, S.; de Medeiros, B.; Glodek, B. Password Cracking Using Probabilistic Context-Free Grammars. In Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), Oakland, CA, USA, 17–20 May 2009; IEEE Computer Society: Washington, DC, USA, 2009; pp. 391–405. [Google Scholar]
  17. Ma, J.; Yang, W.; Luo, M.; Li, N. A Study of Probabilistic Password Models. In Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP 2014), Berkeley, CA, USA, 18–21 May 2014; pp. 689–704. [Google Scholar]
  18. Morris, R.; Thompson, K. Password Security—A Case History. Commun. ACM 1979, 22, 594–597. [Google Scholar] [CrossRef]
  19. Riddle, B.L.; Miron, M.S.; Semo, J.A. Passwords in use in a university timesharing environment. Comput. Secur. 1989, 8, 569–579. [Google Scholar] [CrossRef]
  20. Wu, T.D. A Real-World Analysis of Kerberos Password Security. In Proceedings of the Network and Distributed System Security Symposium (NDSS 1999), San Diego, CA, USA, 3–5 February 1999. [Google Scholar]
  21. Klein, D.V. Foiling the cracker: A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Security Workshop, Portland, OR, USA, 27–28 August 1990; pp. 5–14. [Google Scholar]
  22. Liu, E.; Nakanishi, A.; Golla, M.; Cash, D.; Ur, B. Reasoning Analytically about Password-Cracking Software. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP 2019), San Francisco, CA, USA, 19–23 May 2019; pp. 380–397. [Google Scholar]
  23. Pasquini, D.; Cianfriglia, M.; Ateniese, G.; Bernaschi, M. Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), Online, 11–13 August 2021; pp. 821–838. [Google Scholar]
  24. Cheng, H.; Li, W.; Wang, P.; Liang, K. Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2021), Toronto, ON, Canada, 6–11 June 2021; pp. 2690–2694. [Google Scholar]
  25. Xu, M.; Wang, C.; Yu, J.; Zhang, J.; Zhang, K.; Han, W. Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. In Proceedings of the CCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Online, 15–19 November 2021; Kim, Y., Kim, J., Vigna, G., Shi, E., Eds.; ACM: New York, NY, USA, 2021; pp. 5–20. [Google Scholar]
  26. Gage, P. A New Algorithm for Data Compression. C Users J. 1994, 12, 23–38. [Google Scholar]
  27. Han, W.; Xu, M.; Zhang, J.; Wang, C.; Zhang, K.; Wang, X.S. TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively. IEEE Trans. Inf. Forensics Secur. 2021, 16, 451–465. [Google Scholar] [CrossRef]
  28. Narayanan, A.; Shmatikov, V. Fast dictionary attacks on passwords using time-space tradeoff. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, 7–11 November 2005; Atluri, V., Meadows, C.A., Juels, A., Eds.; ACM: New York, NY, USA, 2005; pp. 364–372. [Google Scholar] [CrossRef]
  29. Guo, X.; Liu, Y.; Tan, K.; Mao, W.; Jin, M.; Lu, H. Dynamic Markov Model: Password Guessing Using Probability Adjustment Method. Appl. Sci. 2021, 11, 4607. [Google Scholar] [CrossRef]
  30. Xie, J.; Cheng, H.; Zhu, R.; Wang, P.; Liang, K. WordMarkov: A New Password Probability Model of Semantics. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Online, 23–27 May 2022; pp. 3034–3038. [Google Scholar]
  31. Wang, D.; Zou, Y.; Zhang, Z.; Xiu, K. Password Guessing Using Random Forest. In Proceedings of the 32th USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, 9–11 August 2023. [Google Scholar]
  32. Ciaramella, A.; D’Arco, P.; Santis, A.D.; Galdi, C.; Tagliaferri, R. Neural Network Techniques for Proactive Password Checking. IEEE Trans. Dependable Secur. Comput. 2006, 3, 327–339. [Google Scholar] [CrossRef]
  33. Melicher, W.; Ur, B.; Komanduri, S.; Bauer, L.; Christin, N.; Cranor, L.F. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC 2017), Santa Clara, CA, USA, 12–14 July 2017. [Google Scholar]
  34. Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
  35. Chung, J.; Gülçehre, Ç.; Cho, K.; Bengio, Y. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv 2014, arXiv:1412.3555. [Google Scholar]
  36. Huang, Z.; Xu, W.; Yu, K. Bidirectional LSTM-CRF Models for Sequence Tagging. arXiv 2015, arXiv:1508.01991. [Google Scholar]
  37. Dahiya, M. Password Predictability Using Neural Networks. Int. J. Adv. Res. Comput. Sci. 2017, 8, 248–250. [Google Scholar]
  38. Xu, R.; Chen, X.; Shi, J. A coarse-grained password model with memorable unit-based recurrent neural networks. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Limassol, Cyprus, 8–12 April 2019; Hung, C., Papadopoulos, G.A., Eds.; ACM: New York, NY, USA, 2019; pp. 1890–1897. [Google Scholar]
  39. Fang, Y.; Liu, K.; Jing, F.; Zuo, Z. Password guessing based on semantic analysis and neural networks. In Proceedings of the Chinese Conference on Trusted Computing and Information Security, Wuhan, China, 17–18 October 2018; Springer: Cham, Switzerland, 2018; pp. 84–98. [Google Scholar]
  40. Zhang, Y.; Xian, H.; Yu, A. CSNN: Password guessing method based on Chinese syllables and neural network. Peer-to-Peer Netw. Appl. 2020, 13, 2237–2250. [Google Scholar] [CrossRef]
  41. Pasquini, D.; Ateniese, G.; Troncoso, C. Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. arXiv 2023, arXiv:2301.07628. [Google Scholar]
  42. Goodfellow, I.J.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.C.; Bengio, Y. Generative Adversarial Networks. arXiv 2014, arXiv:1406.2661. [Google Scholar] [CrossRef]
  43. Hitaj, B.; Gasti, P.; Ateniese, G.; Pérez-Cruz, F. PassGAN: A Deep Learning Approach for Password Guessing. In Proceedings of the Applied Cryptography and Network Security—17th International Conference (ACNS 2019), Bogota, Colombia, 5–7 June 2019; Lecture Notes in Computer Science. Deng, R.H., Gauthier-Umaña, V., Ochoa, M., Yung, M., Eds.; Springer: Cham, Switzerland, 2019; Volume 11464, pp. 217–237. [Google Scholar]
  44. Vi, B.N.; Tran, N.N.; The, T.G.V. A GAN-based approach for password guessing. In Proceedings of the RIVF International Conference on Computing and Communication Technologies (RIVF 2021), Hanoi, Vietnam, 19–21 August 2021; pp. 1–5. [Google Scholar]
  45. Zhou, T.; Wu, H.T.; Lu, H.; Xu, P.; Cheung, Y.M. Password Guessing Based on GAN with Gumbel-Softmax. Secur. Commun. Netw. 2022, 2022, 5670629. [Google Scholar] [CrossRef]
  46. Jang, E.; Gu, S.; Poole, B. Categorical Reparameterization with Gumbel-Softmax. In Proceedings of the 5th International Conference on Learning Representations (ICLR 2017), Toulon, France, 24–26 April 2017. [Google Scholar]
  47. Huang, D.; Wang, Y.; Chen, W. RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient. In Proceedings of the International Conference on Security and Privacy in New Computing Environments, Online, 10–11 December 2021; Springer: Cham, Switzerland, 2021; pp. 159–174. [Google Scholar]
  48. Yu, L.; Zhang, W.; Wang, J.; Yu, Y. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017; Singh, S., Markovitch, S., Eds.; AAAI Press: Atlanta, GA, USA, 2017; pp. 2852–2858. [Google Scholar]
  49. Murmu, S.; Kasyap, H.; Tripathy, S. PassMon: A Technique for Password Generation and Strength Estimation. J. Netw. Syst. Manag. 2022, 30, 13. [Google Scholar] [CrossRef]
  50. Browne, C.; Powley, E.J.; Whitehouse, D.; Lucas, S.M.; Cowling, P.I.; Rohlfshagen, P.; Tavener, S.; Liebana, D.P.; Samothrakis, S.; Colton, S. A Survey of Monte Carlo Tree Search Methods. IEEE Trans. Comput. Intell. AI Games 2012, 4, 1–43. [Google Scholar] [CrossRef]
  51. Pasquini, D.; Gangwal, A.; Ateniese, G.; Bernaschi, M.; Conti, M. Improving Password Guessing via Representation Learning. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (SP 2021), San Francisco, CA, USA, 24–27 May 2021; pp. 1382–1399. [Google Scholar]
  52. Fu, C.; Duan, M.; Dai, X.; Wei, Q.; Wu, Q.; Zhou, R. DenseGAN: A Password Guessing Model Based on DenseNet and PassGAN. In Proceedings of the 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China, 23–25 December 2021; pp. 296–305. [Google Scholar]
  53. Huang, G.; Liu, Z.; van der Maaten, L.; Weinberger, K.Q. Densely Connected Convolutional Networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2017), Honolulu, HI, USA, 21–26 July 2017; pp. 2261–2269. [Google Scholar]
  54. Kingma, D.P.; Welling, M. Auto-Encoding Variational Bayes. In Proceedings of the 2nd International Conference on Learning Representations (ICLR 2014), Banff, AB, Canada, 14–16 April 2014. [Google Scholar]
  55. Wang, J.; Li, Y.; Chen, X.; Zhou, Y. Modeling Password Guessability via Variational Auto-Encoder. In Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2021), Dalian, China, 5–7 May 2021; pp. 348–353. [Google Scholar]
  56. Yang, K.; Hu, X.; Zhang, Q.; Wei, J.; Liu, W. VAEPass: A lightweight passwords guessing model based on variational auto-encoder. Comput. Secur. 2022, 114, 102587. [Google Scholar] [CrossRef]
  57. Dauphin, Y.N.; Fan, A.; Auli, M.; Grangier, D. Language Modeling with Gated Convolutional Networks. In Proceedings of the 34th International Conference on Machine Learning (ICML 2017), Sydney, NSW, Australia, 6–11 August 2017; Volume 70, pp. 933–941. [Google Scholar]
  58. Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, L.; Polosukhin, I. Attention is All you Need. In Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, Long Beach, CA, USA, 4–9 December 2017; Guyon, I., von Luxburg, U., Bengio, S., Wallach, H.M., Fergus, R., Vishwanathan, S.V.N., Garnett, R., Eds.; Curran Associates Inc.: Red Hook, NY, USA, 2017; pp. 5998–6008. [Google Scholar]
  59. Bahdanau, D.; Cho, K.; Bengio, Y. Neural Machine Translation by Jointly Learning to Align and Translate. In Proceedings of the 3rd International Conference on Learning Representations (ICLR 2015), San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
  60. He, S.; Fu, J.; Chen, C.; Guo, Z. Research on password cracking technology based on improved transformer. Proc. J. Phys. Conf. Ser. 2020, 1631, 012161. [Google Scholar] [CrossRef]
  61. Xu, M.; Yu, J.; Zhang, X.; Wang, C.; Zhang, S.; Wu, H.; Han, W. Improving Real-world Password Guessing Attacks via Bi-directional Transformers. In Proceedings of the 32th USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, 9–11 August 2023; USENIX Association: Berkeley, CA, USA, 2023. [Google Scholar]
  62. Dell’Amico, M.; Filippone, M. Monte Carlo Strength Evaluation: Fast and Reliable Password Checking. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; Ray, I., Li, N., Kruegel, C., Eds.; ACM: New York, NY, USA, 2015; pp. 158–169. [Google Scholar]
  63. Albrecht, M.R.; Mareková, L.; Paterson, K.G.; Stepanovs, I. Four Attacks and a Proof for Telegram. In Proceedings of the 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, 22–25 May 2023; pp. 87–106. [Google Scholar]
  64. Papamakarios, G.; Nalisnick, E.T.; Rezende, D.J.; Mohamed, S.; Lakshminarayanan, B. Normalizing Flows for Probabilistic Modeling and Inference. J. Mach. Learn. Res. 2021, 22, 57:1–57:64. [Google Scholar]
  65. Dinh, L.; Krueger, D.; Bengio, Y. NICE: Non-linear Independent Components Estimation. In Proceedings of the 3rd International Conference on Learning Representations (ICLR 2015), San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
  66. Dinh, L.; Sohl-Dickstein, J.; Bengio, S. Density estimation using Real NVP. In Proceedings of the 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, 24–26 April 2017. [Google Scholar]
  67. Kingma, D.P.; Dhariwal, P. Glow: Generative Flow with Invertible 1 × 1 Convolutions. In Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018 (NeurIPS 2018), Montreal, QC, Canada, 3–8 December 2018; Bengio, S., Wallach, H.M., Larochelle, H., Grauman, K., Cesa-Bianchi, N., Garnett, R., Eds.; Springer: Cham, Switzerland, 2018; pp. 10236–10245. [Google Scholar]
  68. Pagnotta, G.; Hitaj, D.; Gaspari, F.D.; Mancini, L.V. PassFlow: Guessing Passwords with Generative Flows. arXiv 2021, arXiv:2105.06165. [Google Scholar]
  69. Wang, D.; Wang, P. The Emperor’s New Password Creation Policies. In Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, Austria, 21–25 September 2015. [Google Scholar]
  70. Cheswick, W.R. Rethinking passwords. Commun. ACM 2013, 56, 40–44. [Google Scholar] [CrossRef]
  71. Lai, R.W.F.; Egger, C.; Reinert, M.; Chow, S.S.M.; Maffei, M.; Schröder, D. Simple Password-Hardened Encryption Services. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 2018), Baltimore, MD, USA, 15–17 August 2018; pp. 1405–1421. [Google Scholar]
  72. Zhang, M.; Zhang, Q.; Liu, W.; Hu, X.; Wei, J. TG-SPSR: A Systematic Targeted Password Attacking Model. KSII Trans. Internet Inf. Syst. 2019, 13, 2674–2697. [Google Scholar]
  73. Li, Y.; Li, Y.; Chen, X.; Shi, R.; Han, J. PG-Pass: Targeted Online Password Guessing Model based on Pointer Generator Network. In Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2022), Hangzhou, China, 4–6 May 2022; pp. 507–512. [Google Scholar]
  74. He, X.; Cheng, H.; Xie, J.; Wang, P.; Liang, K. Passtrans: An Improved Password Reuse Model Based on Transformer. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2022, Online, 23–27 May 2022; pp. 3044–3048. [Google Scholar]
  75. Pal, B.; Daniel, T.; Chatterjee, R.; Ristenpart, T. Beyond Credential Stuffing: Password Similarity Models Using Neural Networks. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP 2019), San Francisco, CA, USA, 19–23 May 2019; pp. 417–434. [Google Scholar]
  76. 4iQ. Identities in the Wild: The Tsunami of Breached Identities Continues May 2018; Technical Report; 4iQ: Los Altos, CA, USA, 2018. [Google Scholar]
  77. Wang, D.; Zou, Y.; Xiao, Y.A.; Ma, S.; Chen, X. Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. In Proceedings of the 32th USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, 9–11 August 2023. [Google Scholar]
  78. Ho, J.; Jain, A.; Abbeel, P. Denoising Diffusion Probabilistic Models. In Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020 (NeurIPS 2020), Online, 6–12 December 2020. [Google Scholar]
  79. Song, Y.; Ermon, S. Improved Techniques for Training Score-Based Generative Models. In Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020 (NeurIPS 2020), Online, 6–12 December 2020. [Google Scholar]
  80. Nichol, A.Q.; Dhariwal, P. Improved Denoising Diffusion Probabilistic Models. In Proceedings of the 38th International Conference on Machine Learning (ICML 2021), Online, 18–24 July 2021; Volume 139, pp. 8162–8171. [Google Scholar]
  81. Li, Y.; Tarlow, D.; Brockschmidt, M.; Zemel, R.S. Gated Graph Sequence Neural Networks. In Proceedings of the 4th International Conference on Learning Representations (ICLR 2016), San Juan, Puerto Rico, 2–4 May 2016. [Google Scholar]
  82. Kipf, T.N.; Welling, M. Semi-Supervised Classification with Graph Convolutional Networks. In Proceedings of the 5th International Conference on Learning Representations (ICLR 2017), Toulon, France, 24–26 April 2017. [Google Scholar]
  83. Velickovic, P.; Cucurull, G.; Casanova, A.; Romero, A.; Liò, P.; Bengio, Y. Graph Attention Networks. arXiv 2017, arXiv:1710.10903. [Google Scholar]
  84. Hamilton, W.L.; Ying, Z.; Leskovec, J. Inductive Representation Learning on Large Graphs. In Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, Long Beach, CA, USA, 4–9 December 2017; pp. 1024–1034. [Google Scholar]
  85. Lan, Z.; Chen, M.; Goodman, S.; Gimpel, K.; Sharma, P.; Soricut, R. ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In Proceedings of the 8th International Conference on Learning Representations (ICLR 2020), Addis Ababa, Ethiopia, 26–30 April 2020. [Google Scholar]
  86. Liu, Q.; Chen, B.; Lou, J.; Zhou, B.; Zhang, D. Incomplete Utterance Rewriting as Semantic Segmentation. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP 2020), Online, 16–20 November 2020; Association for Computational Linguistics: Cedarville, OH, USA, 2020; pp. 2846–2857. [Google Scholar]
  87. Raffel, C.; Shazeer, N.; Roberts, A.; Lee, K.; Narang, S.; Matena, M.; Zhou, Y.; Li, W.; Liu, P.J. Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer. J. Mach. Learn. Res. 2020, 21, 140:1–140:67. [Google Scholar]
  88. Yang, Z.; Dai, Z.; Yang, Y.; Carbonell, J.G.; Salakhutdinov, R.; Le, Q.V. XLNet: Generalized Autoregressive Pretraining for Language Understanding. In Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019 (NeurIPS 2019), Vancouver, BC, Canada, 8–14 December 2019; pp. 5754–5764. [Google Scholar]
  89. Yang, K.; Hu, X.; Zhang, Q.; Wei, J.; Liu, W. A Honeywords Generation Method Based on Deep Learning and Rule-Based Password Attack. In Proceedings of the Security and Privacy in New Computing Environments, Xi’an, China, 30–31 December 2022; Shi, W., Chen, X., Choo, K.K.R., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 294–306. [Google Scholar]
  90. Guo, X.; Liu, Y.; Tan, K.; Jin, M.; Lu, H. PGGAN: Improve Password Cover Rate Using the Controller. Proc. J. Phys. Conf. Ser. 2021, 1856, 012012. [Google Scholar] [CrossRef]
  91. Gan, X.; Chen, M.; Li, D.; Wu, Z.; Han, W.; Chen, H. Corpora-based Password Guessing: An Efficient Approach for Small Training Sets. In Proceedings of the 2021 IEEE 4th International Conference on Electronics and Communication Engineering (ICECE), Xi’an, China, 17–19 December 2021; pp. 311–319. [Google Scholar]
  92. Xie, Z.; Zhang, M.; Yin, A.; Li, Z. A New Targeted Password Guessing Model. In Proceedings of the Information Security and Privacy—25th Australasian Conference (ACISP 2020), Perth, WA, Australia, 30 November–2 December 2020; Liu, J.K., Cui, H., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2020; Volume 12248, pp. 350–368. [Google Scholar] [CrossRef]
  93. Nam, S.; Jeon, S.; Moon, J. Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN. Appl. Sci. 2020, 10, 7306. [Google Scholar] [CrossRef]
  94. Deng, G.; Yu, X.; Guo, H. Efficient Password Guessing Based on a Password Segmentation Approach. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  95. Xia, Z.; Yi, P.; Liu, Y.; Jiang, B.; Wang, W.; Zhu, T. GENPass: A Multi-Source Deep Learning Model for Password Guessing. IEEE Trans. Multim. 2020, 22, 1323–1332. [Google Scholar] [CrossRef]
  96. Zhou, H.; Liu, Q.; Zhang, F. Poster: An analysis of targeted password guessing using neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, 22–24 May 2017. [Google Scholar]
Figure 1. Schematic diagram of password-based authentication.
Figure 1. Schematic diagram of password-based authentication.
Entropy 25 01303 g001
Figure 2. Search results from electronic libraries.
Figure 2. Search results from electronic libraries.
Entropy 25 01303 g002
Figure 3. An example of basic RNN architecture and an RNN-based char-level password guessing model with 5-dimensional input and output layers. (a) The basic RNN architecture; (b) An illustration of RNN-based char-level password guessing.
Figure 3. An example of basic RNN architecture and an RNN-based char-level password guessing model with 5-dimensional input and output layers. (a) The basic RNN architecture; (b) An illustration of RNN-based char-level password guessing.
Entropy 25 01303 g003
Figure 4. An illustration of GAN-based password guessing model.
Figure 4. An illustration of GAN-based password guessing model.
Entropy 25 01303 g004
Figure 5. An illustration of VAE-based password guessing model.
Figure 5. An illustration of VAE-based password guessing model.
Entropy 25 01303 g005
Figure 6. An illustration of Transformer-based password guessing model.
Figure 6. An illustration of Transformer-based password guessing model.
Entropy 25 01303 g006
Figure 7. An illustration of reinforcement-learning-based password guessing model.
Figure 7. An illustration of reinforcement-learning-based password guessing model.
Entropy 25 01303 g007
Figure 8. An illustration of flow-based password guessing model.
Figure 8. An illustration of flow-based password guessing model.
Entropy 25 01303 g008
Figure 9. A schematic of the fine-grained technical statistics of the reviewed papers.
Figure 9. A schematic of the fine-grained technical statistics of the reviewed papers.
Entropy 25 01303 g009
Figure 10. A schematic diagram of cross-citation relationships among reviewed papers.
Figure 10. A schematic diagram of cross-citation relationships among reviewed papers.
Entropy 25 01303 g010
Figure 11. An illustration of cross-citation by country. Circled numbers represent the number of relevant papers published in that country, and boxed numbers indicates the number of citations by other countries.
Figure 11. An illustration of cross-citation by country. Circled numbers represent the number of relevant papers published in that country, and boxed numbers indicates the number of citations by other countries.
Entropy 25 01303 g011
Table 1. Abbreviations used throughout this review.
Table 1. Abbreviations used throughout this review.
AbbreviationDescription
AEAuto-Encoder
CNNConvolutional Neural Network
CRFConditional Random Field
DLDeep Learning
GANGenerative Adversarial Network
NLPNatural Language Processing
PCFGProbabilistic Context-Free Grammar
RLReinforcement Learning
RNNRecurrent Neural Network
SVMSupport Vector Machine
PIIPersonal Identifiable Information
Table 2. Overview of related surveys on password guessing research.
Table 2. Overview of related surveys on password guessing research.
WorkYearContributions
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords [8]2021Provided a comprehensive evaluation of semantic password grammars in terms of sample size, probabilistic smoothing, and linguistic information.
Deep Learning for Password Guessing and Password Strength Evaluation: A Survey [9]2020Surveyed state-of-the-art deep learning methods for password guessing and password strength evaluation before 2019.
A Preliminary Analysis of Password Guessing Algorithm [10]2020Took the Coverage metric to quantify the involvement of personal information in the creation of an individual password and used the Monte Carlo and zxcvbn methods to assess password strength.
The AI-Based Cyber Threat Landscape: A Survey [11]2020Explored research examples of cyber attacks posed by combining the “dark” side of AI with the attack techniques and introduced an analytic framework for modeling those attacks.
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing [12]2019Focused on the comparative analysis of deep learning algorithms and traditional probabilistic models on strings of short-length passwords.
Let’s Go in for a Closer Look: Observing Passwords in Their Natural Habitat [13]2017Shown that password reuse in both exact and partial form is extremely rampant.
Table 3. Password guessing terms used to create search expressions.
Table 3. Password guessing terms used to create search expressions.
Term 1Term 2
password guessingneural network
password crackingneural approach
password attackingmachine learning
password guessabilitydeep learning
password predictabilityVAE
password reuseTransformer
password probability modelPCFG
trawlingGAN
targetedMarkov
Table 4. Statistics of the leaked passwords datasets.
Table 4. Statistics of the leaked passwords datasets.
NameTypeAffiliationLanguageTimestampCauses of LeakageSizeTimes
TianyaSocial WebsiteChinaChineseDec. 2011Hacker Attacks30,233,6333
DodonewGames and E-commerceChinaChineseDec. 2011Hacker Attacks16,231,2718
CSDNProgrammer ForumChinaChineseDec. 2011Hacker Attacks6,428,28714
12306Railway WebsiteChinaChineseDec. 2014Crash Attack131,6536
126EmailChinaChineseOct. 2015Crash Attack136,711,1262
163EmailChinaChineseOct. 2015Crash Attack118,100,2722
17173Games WebsiteChinaChineseDec. 2011Crash Attack18,333,8100
RockyouGamesUSAEnglishDec. 2009SQL Injection32,603,38818
000webhostFree Web HostingUSAEnglishOct. 2015Programming Errors15,251,0738
BattlefieldGames WebsiteUSAEnglishJun. 2011Hacker Attacks417,4530
Single.orgDating WebsiteUSAEnglishOct. 2010SQL Injection16,2500
FaithwritersWriting ForumUSAEnglishMar. 2009SQL Injection97090
Hak5Hacking ForumUSAEnglishJul. 2009Hacker Attacks29870
MyspaceSocial WebsiteUSAEnglishMay 2016Hacker Attacks30,213,0245
TwitterSocial WebsiteUSAEnglishMay 2012Hacker Attacks22,805,9662
GmailEmailRussiaRussianSep. 2014Phishing Attacks4,929,0902
Mail.ruEmailRussiaRussianSep. 2014Phishing Attacks4,932,6880
Yandex.ruSearch EngineRussiaRussianSep. 2014Phishing Attacks1,261,8100
Flirtlife.deMarriage WebsiteGermanyGermanMay 2006Hacker Attacks115,5890
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, W.; Yin, Q.; Yin, H.; Xiao, W.; Chang, T.; He, L.; Ni, L.; Ji, Q. A Systematic Review on Password Guessing Tasks. Entropy 2023, 25, 1303. https://doi.org/10.3390/e25091303

AMA Style

Yu W, Yin Q, Yin H, Xiao W, Chang T, He L, Ni L, Ji Q. A Systematic Review on Password Guessing Tasks. Entropy. 2023; 25(9):1303. https://doi.org/10.3390/e25091303

Chicago/Turabian Style

Yu, Wei, Qingsong Yin, Hao Yin, Wei Xiao, Tao Chang, Liangliang He, Lulin Ni, and Qingbing Ji. 2023. "A Systematic Review on Password Guessing Tasks" Entropy 25, no. 9: 1303. https://doi.org/10.3390/e25091303

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop