Document Type

Conference Proceeding

Publication Date

10-2017

Subject: LCSH

Computers--Access control--Passwords, Application software, Computer security

Disciplines

Computer Engineering | Computer Sciences | Electrical and Computer Engineering | Forensic Science and Technology | Information Security

Abstract

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.

Comments

This is the authors' accepted version of the paper published in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST). The volume encompasses the proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime, October 9-11 in Prague. The version of record or the proceedings volume may be purchased from the Springer web site.

The authors' extended version of the paper is attached below as a supplementary file.

Dr. Baggili was appointed to the University of New Haven’s Elder Family Endowed Chair in 2015.

Publisher Citation

Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili. An Overview of the Usage of Default Passwords. To appear in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST): Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime.

Available for download on Thursday, October 12, 2017

Share

COinS