Abstract
Visual CAPTCHAs have been widely used across the Internet to defend against undesirable or malicious bot programs. In this paper, we document how we have broken most such visual schemes provided at Captchaservice.org, a publicly available web service for CAPTCHA generation. These schemes were effectively resistant to attacks conducted using a high-quality Optical Character Recognition program, but were broken with a near 100% success rate by our novel attacks. In contrast to early work that relied on sophisticated computer vision or machine learning algorithms, we used simple pattern recognition algorithms but exploited fatal design errors that we discovered in each scheme. Surprisingly, our simple attacks can also break many other schemes deployed on the Internet at the time of writing: their design had similar errors. We also discuss defence against our attacks and new insights on the design of visual CAPTCHA schemes.
Original language | English |
---|---|
Title of host publication | Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 279-291 |
Number of pages | 13 |
ISBN (Print) | 9780769530604 |
DOIs | |
Publication status | Published - 2 Jan 2008 |
Event | Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) - Miami Beach, FL, USA Duration: 10 Dec 2007 → 14 Dec 2007 |
Conference
Conference | Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
---|---|
Period | 10/12/07 → 14/12/07 |
Keywords
- pattern recognition
- internet
- machine learning algorithms
- computer errors
- web services
- optical character recognition software
- character recognition
- computer vision
- algorithm design and analysis
- writing