Reverse Engineering CAPTCHAs

@article{Hindle2008ReverseEC,
  title={Reverse Engineering CAPTCHAs},
  author={A. Hindle and M. Godfrey and R. Holt},
  journal={2008 15th Working Conference on Reverse Engineering},
  year={2008},
  pages={59-68}
}
  • A. Hindle, M. Godfrey, R. Holt
  • Published 2008
  • Computer Science
  • 2008 15th Working Conference on Reverse Engineering
  • CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear as bitmaps of text characters, in order to gain access to a low-cost resource such as webmail or a blog. CAPTCHAs are generated by software and the structure of a CAPTCHA gives hints to its implementation. Thus due to these properties of image processing and image composition, the process that creates CAPTCHAs can… CONTINUE READING
    40 Citations
    Strength Evaluation of Visual Text CAPTCHAs
    Click Based Animation CAPTCHA
    • PDF
    CAPTCHAs: An Artificial Intelligence Application to Web Security
    • 25
    An approach for segmentation of characters in CAPTCHA
    • 2
    Strong multilingual CAPTCHA based on handwritten characters
    • 3
    Reducing the Cost of Breaking Audio CAPTCHAs by Active and Semi-supervised Learning
    • 12
    • PDF
    Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysis
    • 2
    • PDF
    Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods
    • 2
    • PDF

    References

    SHOWING 1-10 OF 15 REFERENCES
    A low-cost attack on a Microsoft captcha
    • 388
    • Highly Influential
    • PDF
    CAPTCHA: Using Hard AI Problems for Security
    • 1,438
    • Highly Influential
    • PDF
    The AI Hardness of CAPTCHAs does not imply Robust Network Security
    • 8
    • PDF
    Recognizing objects in adversarial clutter: breaking a visual CAPTCHA
    • G. Mori, Jitendra Malik
    • Computer Science
    • 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings.
    • 2003
    • 648
    • Highly Influential
    • PDF
    Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)
    • 252
    • PDF
    Handbook of Character Recognition and Document Image Analysis
    • 335
    Some methods for classification and analysis of multivariate observations
    • 21,807
    • PDF
    Some Parallel Thinning Algorithms for Digital Pictures
    • 277
    Yahoo! CAPTCHA is broken
    • http://networksecurity-research.blogspot.com/2008/01/yahoo-captcha-isbroken.html
    • 2008
    Yahoo! CAPTCHA is broken. http://networksecurity-research.blogspot.com/2008/01/yahoo-captcha-is- broken.html
    • Yahoo! CAPTCHA is broken. http://networksecurity-research.blogspot.com/2008/01/yahoo-captcha-is- broken.html
    • 2008