A low-cost attack on a microsoft CAPTCHA

Jeff Yan*, Ahmad Salah El Ahmad

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

294 Citations (Scopus)

Abstract

CAPTCHA is now almost a standard security technology. The most widely deployed CAPTCHAs are text-baaed schemes, which typically require users to solve a text recognition task. The state of the art of CAPTCHA design suggests that such text-based schemes should rely on segmentation resistance to provide security guarantee, as individual character recognition after segmentation can be solved with a high success rate by standard methods such as neural networks. In this paper, we present new character segmentation techniques of general value to attack a number of text CAPTCHAs, including the schemes designed and deployed by Microsoft, Yahoo and Google. In particular, the Microsoft CAPTCHA has been deployed since 2002 at many of their online services including Hotmail, MSN and Windows Live. Designed to be segmentation- resistant, this scheme has been studied and tuned by its designers over the years. However, our simple attack has achieved a segmentation success rate of higher than 90% against this scheme. It took on average -.80 ins for the attack to completely segment a challenge on an ordinary desktop computer. As a result, we estimate that this CAPTCHA could be instantly broken by a malicious bot with an overall (segmentation and then recognition) success rate of more than 60%. On the contrary, the design goal was that automated attacks should not achieve a success rate of higher than 0.01%. For the first time, this paper shows that CAPTCHAs that are carefully designed to be segmentationresistant are vulnerable to novel but simple attacks.

Original languageEnglish
Title of host publicationProceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08
Place of PublicationNew York
Pages543-554
Number of pages12
DOIs
Publication statusPublished - 27 Oct 2008
Event15th ACM conference on Computer and Communications Security, CCS'08 - Alexandria, VA, United States
Duration: 27 Oct 200831 Oct 2008

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference15th ACM conference on Computer and Communications Security, CCS'08
Country/TerritoryUnited States
CityAlexandria, VA
Period27/10/0831/10/08

Keywords

  • CAPTCHA
  • internet security
  • robustness
  • segmentation attack
  • usability

Fingerprint

Dive into the research topics of 'A low-cost attack on a microsoft CAPTCHA'. Together they form a unique fingerprint.

Cite this