BASECASS: A methodology for CAPTCHAs security assurance

被引:2
|
作者
Hernandez-Castro, Carlos Javier [1 ]
Barrero, David F. [1 ]
R-Moreno, Maria D. [1 ]
机构
[1] Univ Alcala, Escuela Politecn Super, ISG, Alcala De Henares, Spain
关键词
CAPTCHA; Methodology; Machine Learning; Statistical analysis; Security assurance;
D O I
10.1016/j.jisa.2021.103018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, much of the interaction between clients and providers has moved to the Internet. Some tricksters have also learned to benefit from this new situation. New improved cons, tricks and deceptions can be found on-line. Many of these deceptions are only profitable if they are done at a large scale. In order to achieve these large numbers of interactions, these attacks require automation. CAPTCHAs/HIPs are a relatively new security mechanism against automated attacks. They try to detect when the other end of the interaction is a human or a computer program (a bot). However, CAPTCHA/HIP design is still in its initial conception as the stream of successful attacks highlight it. This paper focuses on the design of CAPTCHAs and if there is a way in which to assess a basic level of security for new CAPTCHA designs. To do so, we first review main attacks to different types of CAPTCHAs and then, we describe BASECASS, a methodology that can help in avoiding some of these design pitfalls. The application of the methodology is exemplified in three attacks to CAPTCHAs and how following the methodology designers could have avoided them.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Breaking CaptchaStar Using the BASECASS Methodology
    Hernandez-Castro, Carlos
    Barrero, David F.
    R-Moreno, Maria Dolores
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2023, 23 (01)
  • [2] Security of Gestures Based CAPTCHAs
    Ababtain, Eman
    Engels, Daniel
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 120 - 126
  • [3] Security assurance assessment methodology for hybrid clouds
    Hudic, Aleksandar
    Smith, Paul
    Weippl, Edgar R.
    COMPUTERS & SECURITY, 2017, 70 : 723 - 743
  • [4] Development of Security Software: A High Assurance Methodology
    Hardin, David
    Hiratzka, T. Douglas
    Johnson, D. Randolph
    Wagner, Lucas
    Whalen, Michael
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 266 - 285
  • [5] A methodology for security assurance-driven system development
    Luis Vivas, Jose
    Agudo, Isaac
    Lopez, Javier
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 55 - 73
  • [6] A methodology for security assurance-driven system development
    José Luis Vivas
    Isaac Agudo
    Javier López
    Requirements Engineering, 2011, 16 : 55 - 73
  • [7] Extended Security Analysis of Hollow Captchas
    Gao, Haichang
    Wang, Ping
    Yan, Jeff
    Tang, Mengyun
    Cao, Fang
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (04): : 1075 - 1088
  • [8] A Security Analysis of Captchas With Large Character Sets
    Wang, Ping
    Gao, Haichang
    Rao, Qingxun
    Luo, Sainan
    Yuan, Zhongni
    Shi, Ziyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2953 - 2968
  • [9] Gamification of Internet Security by Next Generation CAPTCHAs
    Kumar, S. Ashok
    Kumar, N. Ram
    Prakash, S.
    Sangeetha, K.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [10] CAPTCHAs: An Artificial Intelligence Application to Web Security
    Gomez Hidalgo, Jose Maria
    Alvarez, Gonzalo
    ADVANCES IN COMPUTERS, VOL 83, 2011, 83 : 109 - 181