skip to main content
10.1145/1752046.1752052acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

The robustness of a new CAPTCHA

Published:13 April 2010Publication History

ABSTRACT

CAPTCHA is a standard security technology that presents tests to tell computers and humans apart. In this paper, we examine the security of a new CAPTCHA that was deployed until very recently by Megaupload, a leading online storage and delivery website. The security of this scheme relies on a novel segmentation resistance mechanism. However, we show that this CAPTCHA can be segmented using a simple but new automated attack with a success rate of 78%. It takes about 120 ms on average to segment each challenge on a standard desktop computer.

References

  1. von Ahn, L., Blum, M., and Langford, J. 2004. Telling humans and computers apart automatically. Commun. ACM 47, 2 (Feb. 2004), 56--60. http://doi.acm.org/10.1145/966389.96639 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K Chellapilla, K Larson, P Simard and M Czerwinski, "Designing human friendly human interaction proofs", ACM CHI'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Greg Mori and Jitendra Malik. "Recognising Objects in Adversarial Clutter: Breaking a Visual CAPTCHA", IEEE Conference on Computer Vision and Pattern Recognition (CVPR'03), Vol 1, June 2003, pp. 134--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J Yan and A S El Ahmad. "Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms", in Proc. of the 23rd Annual Computer Security Applications Conference (ACSAC'07). FL, USA, Dec 2007. IEEE computer society. pp 279--291.Google ScholarGoogle Scholar
  5. J Yan and A S El Ahmad. "A Low-cost Attack on a Microsoft CAPTCHA", 15th ACM Conference on Computer and Communications Security (CCS'08). Virginia, USA, Oct 27--31, 2008. ACM Press. pp. 543--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J Yan and A S El Ahmad. "Is cheap labour behind the scene? - Low-cost automated attacks on Yahoo CAPTCHAs", School of Computing Science Technical Report, Newcastle University, England. Apr, 2008.Google ScholarGoogle Scholar
  7. K Chellapilla, K Larson, P Simard and M Czerwinski, "Building Segmentation Based Human-friendly Human Interaction Proofs", 2nd Int'l Workshop on Human Interaction Proofs, Springer-Verlag, LNCS 3517, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M Chew and HS Baird. "BaffleText: a human interactive proof". Proc. of 10th IS&T/SPIE Document Recognition & Retrieval Conference, 2003.Google ScholarGoogle Scholar
  9. AL Coates, H S Baird and RJ Fateman. "PessimalPrint: A Reverse Turing Test", Int'l. J. on Document Analysis & Recognition, Vol. 5, pp. 158--163, 2003.Google ScholarGoogle Scholar
  10. HS Baird, MA Moll and SY Wang. "A highly legible captcha that resists segmentation attacks". Proc. of Second Int'l Workshop on Human Interactive Proofs (HIP'05), ed. by HS Baird and DP Lopresti, Springer Verlag. LNCS 3517, Bethlehem, PA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Reviewcentre. http://www.reviewcentre.com/reviews169598.html. Accessed in Feb, 2010.Google ScholarGoogle Scholar
  12. PWNtcha. http://caca.zoy.org/wiki/PWNtcha. Accessed in Feb 2010.Google ScholarGoogle Scholar
  13. J Yan and A S El Ahmad. "Usability of CAPTCHAs or usability issues in CAPTCHA design", Proceedings of the 4th Symposium on Usable Privacy and Security. SOUPS '08, vol. 337. ACM, NY, pp. 44--52. DOI= http://doi.acm.org/10.1145/1408664.1408671 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. K Chellapilla, K Larson, P Simard and M Czerwinski, "Computers beat humans at single character recognition in reading-based Human Interaction Proofs", 2nd Conference on Email and Anti-Spam (CEAS), 2005.Google ScholarGoogle Scholar
  15. reCAPTCHA. http://recaptcha.net/. Accessed in Feb 2010.Google ScholarGoogle Scholar
  16. Plowshare. http://code.google.com/p/plowshare. Accessed in March 2010.Google ScholarGoogle Scholar
  17. Megaupload-dl. http://code.google.com/p/megaupload-dl/. Accessed in March 2010.Google ScholarGoogle Scholar
  18. Mu_captcha. http://herecomethelizards.co.uk/mu_captcha/. Accessed in March 2010.Google ScholarGoogle Scholar

Index Terms

  1. The robustness of a new CAPTCHA

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        EUROSEC '10: Proceedings of the Third European Workshop on System Security
        April 2010
        51 pages
        ISBN:9781450300599
        DOI:10.1145/1752046

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate47of113submissions,42%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader