Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules
Publication

Publications

Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules

Title
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules
Type
Article in International Conference Proceedings Book
Year
2017
Authors
Ferreira, JF
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Johnson, SA
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Mendes, A
(Author)
Other
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Brooke, PJ
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Conference proceedings International
Pages: 407-421
13th International Conference on Integrated Formal Methods, IFM 2017
20 September 2017 through 22 September 2017
Indexing
Other information
Authenticus ID: P-00N-PGS
Abstract (EN): We propose the use of modern proof assistants to specify, implement, and verify password quality checkers. We use the proof assistant Coq, focusing on Linux PAM, a widely-used implementation of pluggable authentication modules for Linux. We show how password quality policies can be expressed in Coq and how to use Coq¿s code extraction features to automatically encode these policies as PAM modules that can readily be used by any Linux system. We implemented the default password quality policy shared by two widely-used PAM modules: pam_cracklib and pam_pwquality. We then compared our implementation with the original modules by running them against a random sample of 100,000 leaked passwords obtained from a publicly available database. In doing this, we demonstrated a potentially serious bug in the original modules. The bug was reported to the maintainers of Linux PAM and is now fixed. © Springer International Publishing AG 2017.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-09-29 at 07:22:32 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book