【24h】

A Low-cost Attack on a Microsoft CAPTCHA

机译:对Microsoft CAPTCHA的低成本攻击

获取原文

摘要

CAPTCHA is now almost a standard security technology. The most widely deployed CAPTCHAs are text-based schemes, which typically require users to solve a text recognition task. The state of the art of CAPTCHA design suggests that such text-based schemes should rely on segmentation resistance to provide security guarantee, as individual character recognition after segmentation can be solved with a high success rate by standard methods such as neural networks. In this paper, we present new character segmentation techniques of general value to attack a number of text CAPTCHAs, including the schemes designed and deployed by Microsoft, Yahoo and Google. In particular, the Microsoft CAPTCHA has been deployed since 2002 at many of their online services including Hotmail, MSN and Windows Live. Designed to be segmentation-resistant, this scheme has been studied and tuned by its designers over the years. However, our simple attack has achieved a segmentation success rate of higher than 90% against this scheme. It took on average ~80 ms for the attack to completely segment a challenge on an ordinary desktop computer. As a result, we estimate that this CAPTCHA could be instantly broken by a malicious bot with an overall (segmentation and then recognition) success rate of more than 60%., On the contrary, the design goal was that automated attacks should not achieve a success rate of higher than 0.01%. For the first time, this paper shows that CAPTCHAs that are carefully designed to be segmentation-resistant are vulnerable to novel but simple attacks.
机译:CAPTCHA现在几乎是标准的安全技术。最广泛部署的CAPTCHA是基于文本的方案,通常要求用户解决文本识别任务。 CAPTCHA设计的技术表明,这种基于文本的方案应该依赖于分割阻力来提供安全保障,因为可以通过标准方法如神经网络等标准方法来解决分割后的个性字符识别。在本文中,我们呈现了一般值的新字符分段技术,以攻击许多文本验证码,包括由微软,雅虎和谷歌设计和部署的方案。特别是,自2002年以来已经部署了Microsoft CAPTCHA,其中许多在线服务包括Hotmail,MSN和Windows Live。该方案旨在进行分割,这方案已经被其设计师研究和调整了多年。然而,我们的简单攻击取得了对该计划的分割成功率高于90%。攻击平均〜80毫秒,以完全分段对普通台式电脑的挑战。因此,我们估计这个CAPTCHA可以通过一个恶意机器人瞬间破坏,整体(分割,然后识别)成功率超过60%。,相反,设计目标是自动攻击不应该实现成功率高于0.01%。这篇论文首次表明,仔细设计为分割抗性的CAPTCHA易受新颖但简单的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号