Attacking CAPTCHAs for Fun and Profit
نویسنده
چکیده
منابع مشابه
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability
Existing captcha solutions on the Internet are a major source of user frustration. Game captchas are an interesting and, to date, little-studied approach claiming to make captcha solving a fun activity for the users. One broad form of such captchas – called Dynamic Cognitive Game (DCG) captchas – challenge the user to perform a game-like cognitive task interacting with a series of dynamic image...
متن کاملAttacking Image Recognition Captchas - A Naive but Effective Approach
The landscape of the World Wide Web today consists of a vast amount of services. While most of them are offered for free, the service providers prohibit their malicious usage by automated scripts. To enforce this policy, Captchas have emerged as a reliable method to setup a Turing test to distinguish between human and computers. Image recognition Captchas as one type of Captchas promise high hu...
متن کاملAutomatic Generation of Game-based CAPTCHAs
A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a challenge-response test used on the Internet to prevent bots from accessing web services that are designed for humans. In this paper, we propose Automatic Game-based CAPTCHA Generation (AGCG), in which an AI system generates games that, when played, distinguish between humans and bots. The gamebased CAPT...
متن کاملOn the security and usability of dynamic cognitive game CAPTCHAs
Existing CAPTCHA solutions are a major source of user frustration on the Internet today, frequently forcing companies to lose customers and business. Game CAPTCHAs are a promising approach which may make CAPTCHA solving a fun activity for the user. One category of such CAPTCHAs – called Dynamic Cognitive Game (DCG) CAPTCHA – challenges the user to perform a game-like cognitive (or recognition) ...
متن کاملAttacking DBSCAN for Fun and Profit
Many security applications depend critically on clustering. However, we do not know of any clustering algorithms that were designed with an adversary in mind. An intelligent adversary may be able to use this to her advantage to subvert the security of the application. Already, adversaries use obfuscation and other techniques to alter the *representation* of their inputs in feature space to avoi...
متن کامل