Ciampa, M. (2013). A Comparison of User Preferences for
Browser Password Managers. Journal of Applied Se-
curity Research, 8(4):455–466.
Cl
´
evy, L. (2013). Firepwd: An open source tool to decrypt
Mozilla protected passwords.
Dan Wesley, Jeff Borsecnik, S. C. (2023). Microsoft Edge
password manager security.
Dell’Amico, M., Michiardi, P., and Roudier, Y. (2010).
Password Strength: An Empirical Analysis. In 2010
Proceedings IEEE INFOCOM, pages 1–9. ISSN:
0743-166X.
Deneut, T. (2022). Security: General security scripts.
Gabe Turner, Aliza Vigderman, C. B. (2023). Pass-
word Manager Industry Report and Market Outlook
in 2023.
Gasti, P. and Rasmussen, K. B. (2012). On the Security of
Password Manager Database Formats. In Foresti, S.,
Yung, M., and Martinelli, F., editors, Computer Se-
curity – ESORICS 2012, Lecture Notes in Computer
Science, pages 770–787, Berlin, Heidelberg. Springer.
Lawrence, E. (2020). Local Data Encryption in Chromium.
Luevanos, C., Elizarraras, J., Hirschi, K., and Yeh, J.-h.
(2017). Analysis on the Security and Use of Password
Managers. In 2017 18th International Conference on
Parallel and Distributed Computing, Applications and
Technologies (PDCAT), pages 17–24.
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A.
(2018). Overview of cryptography. In Handbook of
Applied Cryptography, pages 35–39. CRC press.
Mistele, K. (2021). Stealing Saved Browser Passwords:
Your New Favorite Post-Exploitation Technique.
Muslim, A. A., Budiono, A., and Almaarif, A. (2020).
Implementation and Analysis of USB based Pass-
word Stealer using PowerShell in Google Chrome
and Mozilla Firefox. In 2020 3rd International Con-
ference on Computer and Informatics Engineering
(IC2IE), pages 421–426.
Nelson, R., Shukla, A., and Smith, C. (2020). Web Browser
Forensics in Google Chrome, Mozilla Firefox, and the
Tor Browser Bundle. In Zhang, X. and Choo, K.-
K. R., editors, Digital Forensic Education, Studies in
Big Data, pages 219–241. Springer International Pub-
lishing, Cham.
Nissim, N., Yahalom, R., and Elovici, Y. (2017). USB-
based attacks. Computers & Security, 70:675–688.
Oesch, S. and Ruoti, S. (2020). That was then, this is now:
A security evaluation of password generation, storage,
and autofill in Browser-Based password managers. In
29th USENIX Security Symposium (USENIX Security
20), pages 2165–2182. USENIX Association.
Qian, C., Koo, H., Oh, C., Kim, T., and Lee, W. (2020).
Slimium: Debloating the Chromium Browser with
Feature Subsetting. In Proceedings of the 2020 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’20, pages 461–476, New York,
NY, USA. Association for Computing Machinery.
Sajid, M. S. I., Wei, J., Abdeen, B., Al-Shaer, E., Islam,
M. M., Diong, W., and Khan, L. (2021). SODA: A
System for Cyber Deception Orchestration and Au-
tomation. In Proceedings of the 37th Annual Com-
puter Security Applications Conference, ACSAC ’21,
pages 675–689, New York, NY, USA. Association for
Computing Machinery.
Shabtai, A., Elovici, Y., and Rokach, L. (2012). Introduc-
tion to Information Security. In Shabtai, A., Elovici,
Y., and Rokach, L., editors, A Survey of Data Leakage
Detection and Prevention Solutions, SpringerBriefs in
Computer Science, pages 1–4. Springer US, Boston,
MA.
Silver, D., Jana, S., Boneh, D., Chen, E., and Jackson, C.
(2014). Password managers: Attacks and defenses. In
23rd USENIX Security Symposium (USENIX Security
14), pages 449–464, San Diego, CA. USENIX Asso-
ciation.
Stallings, W. (2017). Cryptography and Network Security:
Principles and Practice. Prentice Hall Press, USA,
7th edition.
Tetmeyer, A. and Saiedian, H. (2010). Security Threats and
Mitigating Risk for USB Devices. IEEE Technology
and Society Magazine, 29(4):44–49.
Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R.,
Babar, M. A., and Rashid, A. (2018). Data exfiltra-
tion: A review of external attack vectors and counter-
measures. Journal of Network and Computer Appli-
cations, 101:18–54.
Vossaert, J., Lapon, J., and Naessens, V. (2014). Out-of-
Band Password Based Authentication towards Web
Services. In De Strycker, L., editor, ECUMICT 2014,
Lecture Notes in Electrical Engineering, pages 181–
191, Cham. Springer International Publishing.
Yang, B., Chu, H., Li, G., Petrovic, S., and Busch, C.
(2014). Cloud Password Manager Using Privacy-
Preserved Biometrics. In 2014 IEEE International
Conference on Cloud Engineering, pages 505–509.
Yicong, J. O. (2020). Decrypt chrome passwords.
Zhao, R. and Yue, C. (2013). All your browser-saved pass-
words could belong to us: a security analysis and a
cloud-based new design. In Proceedings of the third
ACM conference on Data and application security and
privacy, CODASPY ’13, pages 333–340, New York,
NY, USA. Association for Computing Machinery.
Dvorak: A Browser Credential Dumping Malware
441