Remotely Telling Humans and Computers Apart: An Unsolved Problem

被引:5
作者
Javier Hernandez-Castro, Carlos [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Carlos III Univ, Dept Comp Sci, Secur Grp, Madrid 28911, Spain
来源
INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY | 2009年 / 309卷
关键词
HIP; CAPTCHA; design; implementation; flaw; methodologies; security assessment;
D O I
10.1007/978-3-642-05437-2_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to tell humans and computers apart is imperative to protect many services from misuse and abuse. For this purpose, tests called CAPTCHAs(1) or HIPs(2) have been designed and put into production. Recent history shows that most (if not all) can be broken given enough time and commercial interest: CAPTCHA design seems to be a much more difficult problem than previously thought. The assumption that difficult-AI problems can be easily converted into valid CAPTCHAs is misleading. There are also some extrinsic problems that do not help, especially the big number of in-house designs that are put into production without any prior public critique. In this paper we present a state-of-the-art survey of current HIPs, including proposals that are now into production. We classify them regarding their basic design ideas. We discuss current attacks as well as future attack paths, and we also present common errors in design, and how many implementation flaws can transform a not necessarily bad idea into a weak CAPTCHA. We present examples of these flaws, using specific well-known CAPTCHAs. In a more theoretical way, we discuss the threat model: confronted risks and countermeasures. Finally, we introduce and discuss some desirable properties that new HIPs should have, concluding with some proposals for future work, including methodologies for design, implementation and security assessment.
引用
收藏
页码:9 / 26
页数:18
相关论文
共 44 条
[1]  
Achint T., 2008, ICFHR 2008
[2]  
[Anonymous], ACM CCS 2008
[3]  
[Anonymous], ART FALL CAPTCHAS
[4]  
[Anonymous], TROJ CAPTCHAR TROJAN
[5]  
[Anonymous], DARKSEO PROGRAMMING
[6]  
[Anonymous], 2009, SIDE CHANNEL ATTACK
[7]  
[Anonymous], PWNTCHA
[8]  
[Anonymous], TECHN WCAG 2 0 G144
[9]  
Athanasopoulos E., 2006, ENHANCED CAPTCHAS US
[10]   ScatterType: a reading CAPTCHA resistant to segmentation attack [J].
Baird, HS ;
Riopka, T .
DOCUMENT RECOGNITION AND RETRIEVAL XII, 2005, 5676 :197-+