首页> 外文期刊>IEEE transactions on dependable and secure computing >Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures
【24h】

Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures

机译:新兴图像运动验证码:现有设计的漏洞和对策

获取原文
获取原文并翻译 | 示例
       

摘要

Based on the notion of "emergence", Xu et al. (Usenix Security 2012; TDSC 2013) developed the first concrete instantiation of emerging-image moving-object (EIMO) CAPTCHAs using 2D hollow objects (codewords), shown to be usable and believed to be secure. In this paper, we highlight the hidden security weaknesses of such a 2D EIMO CAPTCHA design. A key vulnerability is that the camera projection on 2D objects is constant (unlike 3D objects), making it possible to reconstruct the underlying codewords by superimposing and aggregating the temporally scattered parts of the object extracted from consecutive frames. We design and implement an automated attack framework to defeat this design using image processing techniques, and show that its accuracy in recognizing moving codewords is up to 89.2 percent, under different parameterizations. Our framework can be broadly used to undermine the security of different instances of 2D EIMO CAPTCHAs (not just the current state-of-the-art by Xu et al.), given the generalized and robust back-end theories in our attack, namely the methods to locate a codeword, reduce noises and accumulate objects' contour information from consecutive frames corresponding to multiple time periods. As a countermeasure, we propose a fundamentally different design of EIMO CAPTCHAs based on pseudo 3D objects, and examine its security as well as usability. We argue that this design can resist our attack against 2D EIMO CAPTCHAs, although at the cost of reduced usability compared to the - now insecure - 2D EIMO CAPTCHAs.
机译:基于“新兴”的概念,Xu等人。 (Usenix Security 2012; TDSC 2013)使用二维空心物体(代码字)开发了新兴图像运动物体(EIMO)CAPTCHA的第一个具体实例,该二维物体被证明是可用的并且被认为是安全的。在本文中,我们重点介绍了这种2D EIMO CAPTCHA设计的隐藏安全弱点。一个关键漏洞是相机在2D对象上的投影是恒定的(与3D对象不同),这使得可以通过叠加和聚合从连续帧中提取的对象在时间上分散的部分来重建基础代码字。我们设计并实现了一种自动攻击框架,以利用图像处理技术来击败该设计,并表明在不同的参数设置下,其识别运动码字的准确性高达89.2%。我们的框架可以广泛地用来破坏2D EIMO CAPTCHA的不同实例的安全性(不仅限于Xu等人的最新技术),因为我们的攻击具有广泛而可靠的后端理论,即从多个时间段对应的连续帧中定位代码字,减少噪声并累积对象轮廓信息的方法。作为对策,我们提出了基于伪3D对象的EIMO CAPTCHA根本不同的设计,并检查了其安全性和可用性。我们认为这种设计可以抵抗我们对2D EIMO CAPTCHA的攻击,尽管与(现在不安全的)2D EIMO CAPTCHAs相比,其可用性降低了。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号