Symbolic Execution (SE) is a powerful way to analyze programs.
Password-based authentication is widely used today, despite problems with security and usability.
Several password replacement schemes have been suggested that use a visual code to log in.
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon Bergen 2013.
Bcrypt is a password hashing scheme based on the Blowfish block cipher.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.