
But residual buffers remained that contained secrets, most likely due to memory leaks, lost memory references, or complex GUI frameworks which do not expose internal memory management mechanisms to sanitize secrets. That is, if a password database were to be extracted from disk and if a strong master password was used, then brute forcing of a password manager would be computationally prohibitive.Įach password manager also attempted to scrub secrets from memory. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?Īll password managers we examined sufficiently secured user secrets while in a “not running” state. This work specifically looks at password leakage on the host computer.


There’s new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass.
