Author URLs
Professor Breitinger's Faculty Profile
Professor Breitinger's web page
Professor Breitinger's Full Bibliography
Professor Baggili's Faculty Profile
UNHcFREG (UNH Cyber Forensics Research & Education Group / Lab)
Document Type
Conference Proceeding
Publication Date
1-6-2018
Subject: LCSH
Computers--Access control--Passwords, Application software, Computer security
Disciplines
Computer Engineering | Computer Sciences | Electrical and Computer Engineering | Forensic Science and Technology | Information Security
Abstract
The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.
DOI
10.1007/978-3-319-73697-6_15
Repository Citation
Knierem, Brandon; Zhang, Xiaolu; Levine, Philip; Breitinger, Frank; and Baggili, Ibrahim, "An Overview of the Usage of Default Passwords" (2018). Electrical & Computer Engineering and Computer Science Faculty Publications. 69.
https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/69
Publisher Citation
Knieriem B., Zhang X., Levine P., Breitinger F., Baggili I. (2018) An Overview of the Usage of Default Passwords. In: Matoušek P., Schmiedecker M. (eds) Digital Forensics and Cyber Crime. ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 216, pp. 195-203. Springer, Cham.
Included in
Computer Engineering Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons
Comments
This is the authors' accepted version of the paper published in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST). The volume encompasses the proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime, October 9-11 in Prague. The version of record for the proceedings volume may be purchased from the Springer web site.
The authors' extended version of the paper is attached below as a supplementary file.
Dr. Baggili was appointed to the University of New Haven’s Elder Family Endowed Chair in 2015.