On the Account Security Risks Posed by Password Strength Meters

📅 2025-05-13
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Password strength meters (PSMs) enhance password security but inadvertently introduce serious privacy and account-security risks—data-driven PSMs suffer from membership inference attacks due to training-data leakage, while rule-based PSMs expose rejected password lists enabling meter-aware account enumeration. Method: The authors propose the first systematic framework for evaluating PSM privacy leakage, integrating membership inference, PCFG/Markov/neural password modeling, and empirical evaluation using zxcvbn. They assess 11 widely deployed PSMs. Contribution/Results: Five data-driven and three rule-based PSMs exhibit significant password leakage; PCFG models leak up to 10⁵ training passwords; attacks against zxcvbn increase account compromise rates by 5.84% within 10 attempts. The study redefines the utility–privacy trade-off boundary for PSMs, providing both theoretical foundations and practical design guidelines for secure PSM development.

Technology Category

Application Category

📝 Abstract
Password strength meters (PSMs) have been widely used by websites to gauge password strength, encouraging users to create stronger passwords. Popular data-driven PSMs, e.g., based on Markov, Probabilistic Context-free Grammar (PCFG) and neural networks, alarm strength based on a model learned from real passwords. Despite their proven effectiveness, the secure utility that arises from the leakage of trained passwords remains largely overlooked. To address this gap, we analyze 11 PSMs and find that 5 data-driven meters are vulnerable to membership inference attacks that expose their trained passwords, and seriously, 3 rule-based meters openly disclose their blocked passwords. We specifically design a PSM privacy leakage evaluation approach, and uncover that a series of general data-driven meters are vulnerable to leaking between 10^4 to 10^5 trained passwords, with the PCFG-based models being more vulnerable than other counterparts; furthermore, we aid in deriving insights that the inherent utility-privacy tradeoff is not as severe as previously thought. To further exploit the risks, we develop novel meter-aware attacks when a clever attacker can filter the used passwords during compromising accounts on websites using the meter, and experimentally show that attackers targeting websites that deployed the popular Zxcvbn meter can compromise an additional 5.84% user accounts within 10 attempts, demonstrating the urgent need for privacy-preserving PSMs that protect the confidentiality of the meter's used passwords. Finally, we sketch some counter-measures to mitigate these threats.
Problem

Research questions and friction points this paper is trying to address.

Analyzing security risks of password strength meters leaking trained passwords
Evaluating vulnerability of data-driven meters to membership inference attacks
Demonstrating urgent need for privacy-preserving password strength meters
Innovation

Methods, ideas, or system contributions that make the work stand out.

Analyzes 11 PSMs for membership inference vulnerabilities
Designs PSM privacy leakage evaluation approach
Develops novel meter-aware attacks exploiting PSM weaknesses
🔎 Similar Papers
No similar papers found.
M
Ming Xu
Fudan University, National University of Singapore
Weili Han
Weili Han
Fudan University
Systems SecurityData SecurityAccess ControlPassword SecurityAI Security
J
Jitao Yu
Fudan University
J
Jing Liu
UC Irvine
X
Xinyi Zhang
Meta
Y
Yun Lin
Shanghai Jiao Tong University
Jin Song Dong
Jin Song Dong
Professor of Computer Science, National University of Singapore
Formal MethodsTrusted AISafe AIModel CheckingSports Analytics