https://developers.google.com/web/fundamentals/
getting-started/primers/service-workers.
Halderman, J. A., Waters, B., and Felten, E. W. (2005). A
convenient method for securely managing passwords.
In Proceedings of the 14th International Conference
on World Wide Web, WWW ’05, pages 471–479, New
York, NY, USA. ACM.
Hardt, D. (2011). Rfc 6749 - the oauth 2.0 authorization
framework. https://tools.ietf.org/html/rfc6749. (ac-
cessed 2017).
Inglesant, P. G. and Sasse, M. A. (2010). The true cost of
unusable password policies: Password use in the wild.
In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, CHI ’10, pages 383–
392, New York, NY, USA. ACM.
KeePass (accessed 2017). Database settings - keepass.
http://keepass.info/help/v2/dbsettings.html.
Kiani, K. (accessed 2017). Four attacks on
oauth - how to secure your oauth imple-
mentation. https://www.sans.org/reading-
room/whitepapers/application/ attacks-oauth-secure-
oauth-implementation-33644.
LastPass (accessed 2017a). Lastpass technical security
whitepaper. https://enterprise.lastpass.com/wp-
content/uploads/ LastPass-Technical-Whitepaper-
3.pdf.
LastPass (accessed 2017b). Password iterations (pbkdf2) —
user manual. https://helpdesk.lastpass.com/account-
settings/general/password-iterations-pbkdf2/.
LastPass (accessed 2017c). The scary truth about your
passwords: An analysis of the gmail leak — the
lastpass blog. https://blog.lastpass.com/2014/09/
the-scary-truth-about-your-passwords-an-analysis-of-
the-gmail-leak.html/.
Lawler, R. (accessed 2017). Critical security flaws
found in lastpass on chrome, firefox (updated).
https://www.engadget.com/2017/03/22/ critical-
exploits-found-in-lastpass-on-chrome-firefox/.
Li, Z., He, W., Akhawe, D., and Song, D. (2014). The em-
peror’s new password manager: Security analysis of
web-based password managers. In USENIX Security
Symposium, pages 465–479.
Mazurek, M. L., Komanduri, S., Vidas, T., Bauer, L.,
Christin, N., Cranor, L. F., Kelley, P. G., Shay, R., and
Ur, B. (2013). Measuring password guessability for
an entire university. In Proceedings of the 2013 ACM
SIGSAC Conference on Computer & Communi-
cations Security, CCS ’13, pages 173–186, New York,
NY, USA. ACM.
McCarney, D., Barrera, D., Clark, J., Chiasson, S., and van
Oorschot, P. C. (2012). Tapas: Design, implementa-
tion, and usability evaluation of a password manager.
In Proceedings of the 28th Annual Computer Security
Applications Conference, ACSAC ’12, pages 89–98,
New York, NY, USA. ACM.
M’Raihi, D., Machani, A., Pei, M., and Rydell, J.
(2012). Totp: Time-based one-time password algo-
rithm. https://tools.ietf.org/html/rfc6238. (accessed
2017).
Oechslin, P. (2003). Making a faster cryptanalytic time-
memory trade-off. In Crypto, volume 2729, pages
617–630. Springer.
Palantir (accessed 2017). Blueprint documentation.
http://blueprintjs.com/docs/.
Roboform (accessed 2017a). Pass-
word security survey results- part 1.
https://www.roboform.com/blog/password-security-
survey-results.
Roboform (accessed 2017b). Pass-
word security survey results- part 2.
https://www.roboform.com/blog/password-security-
survey-results-part2.
Rouse, M. (2014). Apple touch id. (accessed 2017).
Selenium (accessed 2017). Selenium web browser automa-
tion. http://www.seleniumhq.org/.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Wen, S., Xue, Y., Xu, J., Yang, H., Li, X., Song, W.,
and Si, G. (2016). Toward exploiting access control
vulnerabilities within mongodb backend web applica-
tions. In Computer Software and Applications Confer-
ence (COMPSAC), 2016 IEEE 40th Annual, volume 1,
pages 143–153. IEEE.
Xamarin (accessed 2017). Material theme - xam-
arin. https://developer.xamarin.com/guides/android/
user interface/material-theme/.
Yang, B., Chu, H., Li, G., Petrovic, S., and Busch, C.
(2014). Cloud password manager using privacy-
preserved biometrics. In Cloud Engineering (IC2E),
2014 IEEE International Conference on, pages 505–
509. IEEE.
Yao, F. F. and Yin, Y. L. (2005). Design and analysis
of password-based key derivation functions. IEEE
Transactions on Information Theory, 51(9):3292–
3297.
Yee, K.-P. and Sitaker, K. (2006). Passpet: convenient pass-
word management and phishing protection. In Pro-
ceedings of the second symposium on Usable privacy
and security, pages 32–43. ACM.
Zhao, R. and Yue, C. (2014). Toward a secure and usable
cloud-based password manager for web browsers.
Computers & Security, 46:32 – 47.
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
303