Password managers: a critical review of security, usability, and innovative designs
Article Sidebar
Open full text
Issue Vol. 36 (2025)
-
Classification of cyber attacks in IoMT networks using deep learning: a comparative study
Asif Rahman Rumee232-242
-
Assessing the memorability and usability of the Gutenberg Editor Interface in the Drupal CMS
Paweł Iwon, Marek Miłosz243-250
-
Analysis of the directions of development of digital aesthetics on the example of Windows interfaces
Maksymilian Cegiełka, Marek Miłosz251-257
-
Analysis of the effectiveness of the portal integrating various tender platforms
Adrian Krzysztof Jedynak, Marek Miłosz258-261
-
Review and assessment of the quality of applications related to diet man-agement using the Mobile App Rating Scale (MARS)
Kamil Lewartowski, Marek Miłosz262-265
-
Comparison of the accessibility of websites of voivodeship cities in Poland
Dawid Drzewiecki, Marek Miłosz266-270
-
Study of factors affecting the performance of web applications on mobile devices
Jarosław Królikowski, Marek Miłosz271-277
-
The impact of changing graphic settings on performance in selected video games
Łukasz Stanik, Marek Miłosz278-283
-
Analysis of the use of Angular and Svelte products in mobile web applications
Michał Nurzyński, Marcin Badurowicz284-288
-
Comparative analysis of web and mobile interfaces of popular sales portals
Kacper Dudek, Marek Miłosz289-295
-
Comperative analasys of JavaScript runtime environments
Konrad Kalman, Marek Miłosz296-302
-
Image classification using PyTorch and Core ML
Jakub Ślusarski, Arkadiusz Szumny, Maria Skublewska-Paszkowska303-311
-
Analysis of ergonomics and security of email software
Marceli Szarapajew, Tomasz Szymczyk312-319
-
Comparative analysis of Cypress and Playwright frameworks in end-to-end testing for applications based on Angular
Przemysław Gosik, Marek Miłosz320-327
-
Password managers: a critical review of security, usability, and innovative designs
Hussein Abdulkhaleq Saleh328-335
-
Benchmarking the performance of Python web frameworks
Bartłomiej Bednarz, Marek Miłosz336-341
-
Comparison of chosen image classification methods on Android
Mariusz Zapalski, Patryk Żabczyński, Paweł Powroźnik342-349
-
Performance evaluation of REST and GraphQL API aproaches in data retrieval scenarios using NestJS
Kacper Stępień, Maria Skublewska-Paszkowska350-356
-
Comparative analysis of cross-platform application development tools in terms of operating system integration
Rafał Milichiewicz, Marcin Badurowicz357-364
-
Comparative analysis of selected mobile applications for language learning
Jakub Furtak, Emilia Drabik365-370
Main Article Content
DOI
Authors
hussein.abd.alkhaliq@gmail.com
Abstract
Password managers are crucial for securely managing online credentials in today’s digital landscape. This review synthesizes insights from 25 research papers to evaluate current password management systems, focusing on their approaches to security, usability, and innovation. We explore strategies to counter security challenges such as offline attacks, phishing, and device compromise, as well as efforts to enhance usability through intuitive interfaces and simplified authentication. The review also analyzes innovative architectural designs and cryptographic techniques that underpin these systems. Our synthesis highlights significant advancements in creating secure, resilient, and user-friendly password managers, while identifying gaps in usability testing, scalability of distributed systems, and cryptographic standardization. This comprehensive overview provides critical insights and directions for future research to optimize the balance between security and usability in password management.
Keywords:
References
[1] A. Das, J. Bonneau, M. Caesar, N. Borisov, X. Wang, The tangled web of password reuse, In 21st Annual Network and Distributed System Security Symposium (NDSS) (2014) 23-26, https://doi.org/10.14722/ndss.2014.23357 DOI: https://doi.org/10.14722/ndss.2014.23357
[2] M. Shirvanian, C. R. Price, M. Jubur, N. Saxena, S. Jarecki, H. Krawczyk, A hidden-password online password manager, In 36th Annual ACM Symposium on Applied Computing (SAC '21) (2021) 1683-1687, https://doi.org/10.1145/3412841.3442131 DOI: https://doi.org/10.1145/3412841.3442131
[3] T. Safaie, ByPass: Reconsidering the usability of password managers, M.A.Sc. thesis, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada, 2021
[4] F. Alodhyani, G. Theodorakopoulos, P. Reinecke, Password managers—It's all about trust and transparency, Future Internet 12(11) (2020) 189, https://doi.org/10.3390/fi12110189 DOI: https://doi.org/10.3390/fi12110189
[5] H. A. Saleh, Leveraging social engineering techniques for ethical purposes: An approach to develop fake Android app for collecting valuable data discreetly, Wasit Journal of Computer and Mathematics Science 3(3) (2024) 15-59, https://doi.org/10.31185/wjcms.268 DOI: https://doi.org/10.31185/wjcms.268
[6] C. Rahalkar, D. Gujar, A secure password manager, International Journal of Computer Applications 178(44) (2019) 5-10, https://doi.org/10.5120/ijca2019919323 DOI: https://doi.org/10.5120/ijca2019919323
[7] Q. Guo, J. Ye, B. Li, Y. Hu, X. Li, Y. Lan, G. Zhang, PUFPass: A password management mechanism based on software/hardware codesign, Integration 64 (2019) 173-183, https://doi.org/10.1016/j.vlsi.2018.10.003 DOI: https://doi.org/10.1016/j.vlsi.2018.10.003
[8] Z. Petrov, R. Ragazan, Password manager with 3-step authentication system, In National Conference on Informatics, Dedicated to the 80th Anniversary of the Birth of Professor Peter Barnev (2016) 121-128
[9] L. Wang, Y. Li, K. Sun, Amnesia: A bilateral generative password manager, In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) (2016) 313-324, https://doi.org/10.1109/ICDCS.2016.90 DOI: https://doi.org/10.1109/ICDCS.2016.90
[10] F. Zinggeler, NoKey - A distributed password manager, M.S. thesis, ETH Zurich, Zurich, Switzerland, 2018
[11] Y. T. Liu, D. Du, Y. B. Xia, H. B. Chen, B. Y. Zang, Z. Liang, SplitPass: A mutually distrusting two-party password manager, Journal of Computer Science and Technology 33(1) (2018) 98-115, https://doi.org/10.1007/s11390-018-1810-y DOI: https://doi.org/10.1007/s11390-018-1810-y
[12] B. Yang, H. Chu, G. Li, S. Petrovic, C. Busch, Cloud password manager using privacy-preserved biometrics, In 2014 IEEE International Conference on Cloud Engineering (2014) 610-614, https://doi.org/10.1109/IC2E.2014.41 DOI: https://doi.org/10.1109/IC2E.2014.91
[13] Y. Kumarakalva, V. S. G. S., S. K. K., S. P. H., A. G. R., A secure password manager, Journal of Emerging Technologies and Innovative Research 4(03) (2017) 204-206, https://doi.org/10.51584/IJRIAS.2025.10040003 DOI: https://doi.org/10.51584/IJRIAS.2025.10040003
[14] K. Baskar, K. Muthumanickam, P. Vijayalakshmi, S. Kumarganesh, A strong password manager using multiple encryption techniques, Journal of the Institution of Engineers (India): Series B (2024) 1-8, https://doi.org/10.1007/s40031-024-01144-6 DOI: https://doi.org/10.1007/s40031-024-01144-6
[15] M. Kanela, H. Dhingra, M. Singhal, G. Dhand, Secure and manage passwords with encryption and cloud storage, In 4th International Conference on Innovative Computing and Communication (ICICC) (2021) 1-4, https://doi.org/10.2139/ssrn.3833469 DOI: https://doi.org/10.2139/ssrn.3833469
[16] S. Agholor, A. S. Sodiya, A. T. Akinwale, O. J. Adeniran, A secured mobile-based password manager, In 2016 IEEE Conference on Digital Information Processing and Communications (ICDIPC) (2016) 103-110, https://doi.org/10.1109/ICDIPC.2016.7470800 DOI: https://doi.org/10.1109/ICDIPC.2016.7470800
[17] H. A. Saleh, BANK OF PASSWORDS: A secure Android password manager implemented based on specific requirements, Al-Kitab Journal of Pure Science 8(1) (2024) 40-62, https://doi.org/10.32441/kjps.08.01.p5 DOI: https://doi.org/10.32441/kjps.08.01.p5
[18] L. V. Cherckesova, O. A. Safaryan, O. S. Buryakova, V. M. Porksheyan, Development of password manager using cryptographic algorithms for data protection in Windows and Linux operating systems, Pakistan Journal of Life and Social Sciences 22(2) (2024) 20107-20115, https://doi.org/10.57239/PJLSS-2024-22.2.001472 DOI: https://doi.org/10.57239/PJLSS-2024-22.2.001472
[19] B. Englert, P. Shah, On the design and implementation of a secure online password vault, In 2009 International Conference on Convergence and Hybrid Information Technology (ICHIT'09) (2009) 375-382, https://doi.org/10.1145/1644993.1645063 DOI: https://doi.org/10.1145/1644993.1645063
[20] O. Hakbilen, P. Perinparajan, M. Eikeland, N. Ulltveit-Moe, SAFEPASS - Presenting a convenient, portable and secure password manager, In 4th International Conference on Information Systems Security and Privacy (ICISSP) (2018) 292-305, https://doi.org/10.5220/0006603102920303 DOI: https://doi.org/10.5220/0006603102920303
[21] R. Zhao, C. Yue, Toward a secure and usable cloud-based password manager for web browsers, Computers & Security 46 (2014) 32-47, https://doi.org/10.1016/j.cose.2014.07.003 DOI: https://doi.org/10.1016/j.cose.2014.07.003
[22] E. Stobert, R. Biddle, A password manager that doesn't remember passwords, In 2014 New Security Paradigms Workshop (2014) 39-53, https://doi.org/10.1145/2683467.2683471 DOI: https://doi.org/10.1145/2683467.2683471
[23] H. Jeong, H. Jung, MonoPass: A password manager without master password authentication, In 26th International Conference on Intelligent User Interfaces Companion (IUI '21 Companion) (2021) 52-55, https://doi.org/10.1145/3397482.3450720 DOI: https://doi.org/10.1145/3397482.3450720
[24] J. B. Billa, M. M. H. Sbakil, A. Nawar, PassMan: A new approach of password generation and management without storing, In 7th International Conference on Smart Computing and Communications (ICSCC) (2019) 1-6, https://doi.org/10.1109/ICSCC.2019.8843591 DOI: https://doi.org/10.1109/ICSCC.2019.8843591
[25] M. Shirvanian, S. Jarecki, H. Krawczyk, N. Saxena, SPHINX: A password store that perfectly hides passwords from itself, In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017) 1094-1105, https://doi.org/10.1109/ICDCS.2017.64 DOI: https://doi.org/10.1109/ICDCS.2017.64
[26] H. Bojinov, E. Bursztein, X. Boyen, D. Boneh, Kamouflage: Loss-resistant password management, In 15th European Symposium on Research in Computer Security (ESORICS 2010) (2010) 286-302, https://doi.org/10.1007/978-3-642-15497-3_18 DOI: https://doi.org/10.1007/978-3-642-15497-3_18
[27] R. Ahuja, M. Ramrakhyani, B. Manchundiya, S. Shroff, Dual layer secured password manager using Blowfish and LSB, International Journal of Computer Applications 143(3) (2016) 5-11, https://doi.org/10.5120/ijca2016910048 DOI: https://doi.org/10.5120/ijca2016910048
[28] H. S. Al-Sinani, C. J. Mitchell, Using CardSpace as a password manager, In Second IFIP WG 11.6 Working Conference on Policies and Research Management (IDMAN) (2010) 18-30, https://doi.org/10.1007/978-3-642-17303-5_2 DOI: https://doi.org/10.1007/978-3-642-17303-5_2
Article Details
Abstract views: 225

