These are the videos from the Passwordscon 2014 conference. Thanks for having me out to help record and render the videos.
Track 1
How we deciphered millions of users’ encrypted passwords without the decryption keys. - Josh Dustin (Canceled)
Is Pavlovian Password Management The Answer? - Lance James
DoCatsLikeLemon? – Advanced phrase attacks and analysis - Marco Preuß
Using cryptanalysis to speed-up password cracking - Christian Rechberger
Password Security in the PCI DSS - Jarred White
Defense with 2FA - Steve Thomas
I have the #cat so I make the rules - Yiannis Chrysanthou
Penetrate your OWA - Nate Power
Surprise talk + advisory release - Dominique Bongard
All your SAP P@$$w0ЯdZ belong to us - Dmitry Chastuhin, Alex Polyakov
Target specific automated dictionary generation - Matt Marx
Bitslice DES with LOP3.LUT - Steve Thomas
Net hashes: a review of many network protocols - Robert Graham
Energy-efficient bcrypt cracking - Katja Malvoni
The problem with the real world - Michal Špaček
Password Topology Histogram Wear-Leveling, a.k.a. PathWell - Rick Redman
Beam Me Up Scotty! – Passwords in the Enterprise - Dimitri Fousekis
Track 2
Welcome & Announcements - Jeremi Gosney, Per Thorsheim
Opening Keynote - Julia Angwin
Secure your email – Secure your password - Per Thorsheim
Highlights of CMU’s Recent Work in Preventing Bad Passwords - Sean Segreti, Blase Ur
Password Hashing Competition: the Candidates - Jean-Philippe Aumasson
What Microsoft would like from the Password Hashing Competition - Marsh Ray, Greg Zaverucha
How Forced Password Expiration Affects Password Choice - Bruce K. Marshall
Security for the People: End-User Authentication Security on the Internet - Mark Stanislav
Authentication in the Cloud – Building Service - Dan Cvrcek
How EFF is Making STARTTLS Resistant to Active Attacks - Jacob Hoffman-Andrews, Yan Zhu
Proof of work as an additional factor of authentication - Phillippe Paquet, Jason Nehrboss
The future of mobile authentication is here - Sam Crowther
Password hashing delegation: how to get clients work for you - Thomas Pornin
Throw the User ID Down the Well - Daniel Reich
Password Generators & Extended Character Set Passwords - Stephen Lombardo, William Gray
Encryption and Authentication: Passwords for all reasons. - Jeffrey Goldberg
Enhancing Password Based Key Derivation Techniques - Stephen Lombardo, Nick Parker
Capturing Passwords into the Secure Desktop - Marcio Almeida de Macedo, Bruno Gonçalves de Oliveira
Download From:
https://archive.org/details/PasswordsCon2014
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek