Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por HASLab

2020

Two-level adaptive sampling for illumination integrals using Bayesian Monte Carlo

Autores
Marques, R; Bouville, C; Santos, LP; Bouatouch, K;

Publicação
European Association for Computer Graphics - 37th Annual Conference, EUROGRAPHICS 2016 - Short Papers

Abstract
Bayesian Monte Carlo (BMC) is a promising integration technique which considerably broadens the theoretical tools that can be used to maximize and exploit the information produced by sampling, while keeping the fundamental property of data dimension independence of classical Monte Carlo (CMC). Moreover, BMC uses information that is ignored in the CMC method, such as the position of the samples and prior stochastic information about the integrand, which often leads to better integral estimates. Nevertheless, the use of BMC in computer graphics is still in an incipient phase and its application to more evolved and widely used rendering algorithms remains cumbersome. In this article we propose to apply BMC to a two-level adaptive sampling scheme for illumination integrals. We propose an efficient solution for the second level quadrature computation and show that the proposed method outperforms adaptive quasi-Monte Carlo in terms of image error and high frequency noise. © 2016 The Eurographics Association.

2020

Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection

Autores
Johnson, SA; Ferreira, JF; Mendes, A; Cordry, J;

Publicação
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020

Abstract
The choice of password composition policy to enforce on a password-protected system represents a critical security decision, and has been shown to significantly affect the vulnerability of user-chosen passwords to guessing attacks. In practice, however, this choice is not usually rigorous or justifiable, with a tendency for system administrators to choose password composition policies based on intuition alone. In this work, we propose a novel methodology that draws on password probability distributions constructed from large sets of real-world password data which have been filtered according to various password composition policies. Password probabilities are then redistributed to simulate different user password reselection behaviours in order to automatically determine the password composition policy that will induce the distribution of user-chosen passwords with the greatest uniformity, a metric which we show to be a useful proxy to measure overall resistance to password guessing attacks. Further, we show that by fitting power-law equations to the password probability distributions we generate, we can justify our choice of password composition policy without any direct access to user password data. Finally, we present Skeptic - -a software toolkit that implements this methodology, including a DSL to enable system administrators with no background in password security to compare and rank password composition policies without resorting to expensive and time-consuming user studies. Drawing on 205,176,321 passwords across 3 datasets, we lend validity to our approach by demonstrating that the results we obtain align closely with findings from a previous empirical study into password composition policy effectiveness. © 2020 ACM.

2020

Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks

Autores
Pereira, D; Ferreira, JF; Mendes, A;

Publicação
2020 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Coimbra, Portugal, October 12-15, 2020

Abstract
In this paper we measure the accuracy of password strength meters (PSMs) using password guessing resistance against off-the-shelf guessing attacks. We consider 13 PSMs, 5 different attack tools, and a random selection of 60,000 passwords extracted from three different datasets of real-world password leaks. Our results show that a significant percentage of passwords classified as strong were cracked, thus suggesting that current password strength estimation methods can be improved. © 2020 IEEE.

2020

Universally Composable Relaxed Password Authenticated Key Exchange

Autores
Abdalla, M; Barbosa, M; Bradley, T; Jarecki, S; Katz, J; Xu, JY;

Publicação
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I

Abstract
Protocols for password authenticated key exchange (PAKE) allow two parties who share only a weak password to agree on a crypto-graphic key. We revisit the notion of PAKE in the universal composability (UC) framework, and propose a relaxation of the PAKE functionality of Canetti et al. that we call lazy-extraction PAKE (lePAKE). Our relaxation allows the ideal-world adversary to postpone its password guess until after a session is complete. We argue that this relaxed notion still provides meaningful security in the password-only setting. As our main result, we show that several PAKE protocols that were previously only proven secure with respect to a "game-based" definition of security can be shown to UC-realize the lePAKE functionality in the random-oracle model. These include SPEKE, SPAKE2, and TBPEKE, the most efficient PAKE schemes currently known.

2020

Provable Security Analysis of FIDO2

Autores
Chen, S; Barbosa, M; Boldyreva, A; Warinschi, B;

Publicação
IACR Cryptol. ePrint Arch.

Abstract

2020

Universally Composable Relaxed Password Authenticated Key Exchange

Autores
Abdalla, M; Barbosa, M; Bradley, T; Jarecki, S; Katz, J; Xu, J;

Publicação
IACR Cryptol. ePrint Arch.

Abstract

  • 60
  • 247