Home > Research > Publications & Outputs > A simple generic attack on text captchas

Electronic data

  • simple-generic-attack-text-captchas

    Rights statement: Permission to freely reproduce all or part of this paper for noncommercial purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author’s employer if the paper was prepared within the scope of employment. NDSS ’16, 21-24 February 2016, San Diego, CA, USA Copyright 2016 Internet Society

    Final published version, 811 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

A simple generic attack on text captchas

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A simple generic attack on text captchas. / Yan, Jeff.
NDSS Symposium 2016. 2016.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Yan, J 2016, A simple generic attack on text captchas. in NDSS Symposium 2016. Network and Distributed System Security Symposium 2016, San Diego, United States, 21/02/16. https://doi.org/10.14722/ndss.2016.23154

APA

Vancouver

Yan J. A simple generic attack on text captchas. In NDSS Symposium 2016. 2016 doi: 10.14722/ndss.2016.23154

Author

Bibtex

@inproceedings{d479584f6fee430d8885ba5e16dbfee6,
title = "A simple generic attack on text captchas",
abstract = "Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs. Many attacks have been proposed; these fine prior art advanced the scientific understanding of Captcha robustness, but most of them have a limited applicability. In this paper, we report a simple, low-cost but powerful attack that effectively breaks a wide range of text Captchas with distinct design features, including those deployed by Google, Microsoft, Yahoo!, Amazon and other Internet giants. For all the schemes, our attack achieved a success rate ranging from 5% to 77%, and achieved an average speed of solving a puzzle in less than 15 seconds on a standard desktop computer (with a 3.3GHz Intel Core i3 CPU and 2 GB RAM). This is to date the simplest generic attack on text Captchas. Our attack is based on Log-Gabor filters; a famed application of Gabor filters in computer security is John Daugman{\textquoteright}s iris recognition algorithm. Our work is the first to apply Gabor filters for breaking Captchas.",
author = "Jeff Yan",
note = "Permission to freely reproduce all or part of this paper for noncommercial purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author{\textquoteright}s employer if the paper was prepared within the scope of employment. NDSS {\textquoteright}16, 21-24 February 2016, San Diego, CA, USA Copyright 2016 Internet Society; Network and Distributed System Security Symposium 2016, NDSS {\textquoteright}16 ; Conference date: 21-02-2016 Through 24-02-2016",
year = "2016",
month = feb,
day = "22",
doi = "10.14722/ndss.2016.23154",
language = "English",
booktitle = "NDSS Symposium 2016",
url = "http://www.internetsociety.org/events/ndss-symposium-2016",

}

RIS

TY - GEN

T1 - A simple generic attack on text captchas

AU - Yan, Jeff

N1 - Permission to freely reproduce all or part of this paper for noncommercial purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author’s employer if the paper was prepared within the scope of employment. NDSS ’16, 21-24 February 2016, San Diego, CA, USA Copyright 2016 Internet Society

PY - 2016/2/22

Y1 - 2016/2/22

N2 - Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs. Many attacks have been proposed; these fine prior art advanced the scientific understanding of Captcha robustness, but most of them have a limited applicability. In this paper, we report a simple, low-cost but powerful attack that effectively breaks a wide range of text Captchas with distinct design features, including those deployed by Google, Microsoft, Yahoo!, Amazon and other Internet giants. For all the schemes, our attack achieved a success rate ranging from 5% to 77%, and achieved an average speed of solving a puzzle in less than 15 seconds on a standard desktop computer (with a 3.3GHz Intel Core i3 CPU and 2 GB RAM). This is to date the simplest generic attack on text Captchas. Our attack is based on Log-Gabor filters; a famed application of Gabor filters in computer security is John Daugman’s iris recognition algorithm. Our work is the first to apply Gabor filters for breaking Captchas.

AB - Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs. Many attacks have been proposed; these fine prior art advanced the scientific understanding of Captcha robustness, but most of them have a limited applicability. In this paper, we report a simple, low-cost but powerful attack that effectively breaks a wide range of text Captchas with distinct design features, including those deployed by Google, Microsoft, Yahoo!, Amazon and other Internet giants. For all the schemes, our attack achieved a success rate ranging from 5% to 77%, and achieved an average speed of solving a puzzle in less than 15 seconds on a standard desktop computer (with a 3.3GHz Intel Core i3 CPU and 2 GB RAM). This is to date the simplest generic attack on text Captchas. Our attack is based on Log-Gabor filters; a famed application of Gabor filters in computer security is John Daugman’s iris recognition algorithm. Our work is the first to apply Gabor filters for breaking Captchas.

U2 - 10.14722/ndss.2016.23154

DO - 10.14722/ndss.2016.23154

M3 - Conference contribution/Paper

BT - NDSS Symposium 2016

T2 - Network and Distributed System Security Symposium 2016

Y2 - 21 February 2016 through 24 February 2016

ER -