: A 2026 study proposing a machine learning framework that models password reuse as links between websites to predict and prevent breach risks. Technical Industry Reports What is Credential Stuffing? | Silverfort Glossary
: This paper investigates the "Compilation of Many Breaches" (COMB) and details how credential smear attacks exploit reused usernames and passwords.
Below are several high-quality academic papers and technical resources that analyze the mechanics, economy, and mitigation of combolists and the credential stuffing attacks they fuel. Academic Papers & Research Studies
: This Cornell University paper explores how attackers use password similarity—not just exact matches—from leaks to guess passwords across different platforms.
: A critical analysis of how attackers use previously leaked combolists to infiltrate interconnected family tree accounts, highlighting the dangers of password reuse.



