Home > Research > Publications & Outputs > CAPTCHA security

Links

Text available via DOI:

View graph of relations

CAPTCHA security: a case study

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

CAPTCHA security: a case study. / Yan, Jeff; El Ahmad, Ahmad Salah.
In: IEEE Security and Privacy Magazine, Vol. 7, No. 4, 07.2009, p. 22-28.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Yan, J & El Ahmad, AS 2009, 'CAPTCHA security: a case study', IEEE Security and Privacy Magazine, vol. 7, no. 4, pp. 22-28. https://doi.org/10.1109/MSP.2009.84

APA

Yan, J., & El Ahmad, A. S. (2009). CAPTCHA security: a case study. IEEE Security and Privacy Magazine, 7(4), 22-28. https://doi.org/10.1109/MSP.2009.84

Vancouver

Yan J, El Ahmad AS. CAPTCHA security: a case study. IEEE Security and Privacy Magazine. 2009 Jul;7(4):22-28. doi: 10.1109/MSP.2009.84

Author

Yan, Jeff ; El Ahmad, Ahmad Salah. / CAPTCHA security : a case study. In: IEEE Security and Privacy Magazine. 2009 ; Vol. 7, No. 4. pp. 22-28.

Bibtex

@article{c56a29fad5fe4c9b9ae1a56d1a7cf0aa,
title = "CAPTCHA security: a case study",
abstract = "A simple but novel attack can break some CAPTCHAs with a success rate higher than 90 percent. In contrast to early work that relied on sophisticated computer vision or machine learning techniques, the authors used simple pattern recognition algorithms to exploit fatal design errors.",
author = "Jeff Yan and {El Ahmad}, {Ahmad Salah}",
year = "2009",
month = jul,
doi = "10.1109/MSP.2009.84",
language = "English",
volume = "7",
pages = "22--28",
journal = "IEEE Security and Privacy Magazine",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

RIS

TY - JOUR

T1 - CAPTCHA security

T2 - a case study

AU - Yan, Jeff

AU - El Ahmad, Ahmad Salah

PY - 2009/7

Y1 - 2009/7

N2 - A simple but novel attack can break some CAPTCHAs with a success rate higher than 90 percent. In contrast to early work that relied on sophisticated computer vision or machine learning techniques, the authors used simple pattern recognition algorithms to exploit fatal design errors.

AB - A simple but novel attack can break some CAPTCHAs with a success rate higher than 90 percent. In contrast to early work that relied on sophisticated computer vision or machine learning techniques, the authors used simple pattern recognition algorithms to exploit fatal design errors.

U2 - 10.1109/MSP.2009.84

DO - 10.1109/MSP.2009.84

M3 - Journal article

VL - 7

SP - 22

EP - 28

JO - IEEE Security and Privacy Magazine

JF - IEEE Security and Privacy Magazine

SN - 1540-7993

IS - 4

ER -