Research on the Security of Microsoft's Two-Layer Captcha

被引:49
作者
Gao, Haichang [1 ]
Tang, Mengyun [1 ]
Liu, Yi [1 ]
Zhang, Ping [1 ]
Liu, Xiyang [1 ]
机构
[1] Xidian Univ, Inst Software Engn, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Captcha; security; text-based; two-layer;
D O I
10.1109/TIFS.2017.2682704
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Captcha is a security mechanism designed to differentiate between computers and humans, and is used to defend against malicious bot programs. Text-based Captchas are the most widely deployed differentiation mechanism, and almost all text-based Captchas are single layered. Numerous successful attacks on the single-layer text-based Captchas deployed by Google, Yahoo!, and Amazon have been reported. In 2015, Microsoft deployed a new two-layer Captcha scheme. This appears to be the first application of two-layer Captchas. It is, therefore, natural to ask a fundamental question: is the two-layer Captcha as secure as its designers expected? Intrigued by this question, we have for the first time systematically analyzed the security of the two-layer Captcha in this paper. We propose a simple but an effective method to attack the two-layer Captcha deployed by Microsoft, and achieve a success rate of 44.6% with an average speed of 9.05 s on a standard desktop computer (with a 3.3-GHz Intel Core i3 CPU and 2-GB RAM), thus demonstrating clear security issues. We also discuss the originality and applicability of our attack, and offer guidelines for designing Captchas with better security and usability.
引用
收藏
页码:1671 / 1685
页数:15
相关论文
共 30 条
[1]  
[Anonymous], 2014, P 9 ACM S INF COMP C, DOI [10.1145, DOI 10.1145/2590296.2590298]
[2]  
[Anonymous], 2013, P ACM SIGSAC C COMP
[3]  
[Anonymous], 2014, P 8 USENIX WORKSHOP
[4]  
[Anonymous], 2015, TECH REP
[5]  
[Anonymous], 2005, ADV NEURAL INF PROCE
[6]  
[Anonymous], 1989, P ADV NEUR INF PROC
[7]  
[Anonymous], 2008, SOUPS 2008 P 4 S US
[8]   Easy Does It: More Usable CAPTCHAs [J].
Bursztein, Elie ;
Moscicki, Angelique ;
Fabry, Celine ;
Bethard, Steven ;
Mitchell, John C. ;
Jurafsky, Dan .
32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, :2637-2646
[9]  
Bursztein E, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P125
[10]  
Chellapilla K, 2005, LECT NOTES COMPUT SC, V3517, P1