BASECASS: A methodology for CAPTCHAs security assurance

被引:2
|
作者
Hernandez-Castro, Carlos Javier [1 ]
Barrero, David F. [1 ]
R-Moreno, Maria D. [1 ]
机构
[1] Univ Alcala, Escuela Politecn Super, ISG, Alcala De Henares, Spain
关键词
CAPTCHA; Methodology; Machine Learning; Statistical analysis; Security assurance;
D O I
10.1016/j.jisa.2021.103018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, much of the interaction between clients and providers has moved to the Internet. Some tricksters have also learned to benefit from this new situation. New improved cons, tricks and deceptions can be found on-line. Many of these deceptions are only profitable if they are done at a large scale. In order to achieve these large numbers of interactions, these attacks require automation. CAPTCHAs/HIPs are a relatively new security mechanism against automated attacks. They try to detect when the other end of the interaction is a human or a computer program (a bot). However, CAPTCHA/HIP design is still in its initial conception as the stream of successful attacks highlight it. This paper focuses on the design of CAPTCHAs and if there is a way in which to assess a basic level of security for new CAPTCHA designs. To do so, we first review main attacks to different types of CAPTCHAs and then, we describe BASECASS, a methodology that can help in avoiding some of these design pitfalls. The application of the methodology is exemplified in three attacks to CAPTCHAs and how following the methodology designers could have avoided them.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Identity assurance and network security
    Serrato, C., 1600, Elsevier Ltd (2012):
  • [32] Security evaluation for information assurance
    Kim, Yong-Tae
    Park, Gil-Cheol
    Kim, Tai-Hoon
    Lee, Sang-Ho
    ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
  • [33] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [34] Demanding software security assurance
    Cusimano, John
    Control (Chicago, Ill), 2011, 24 (02): : 14 - 16
  • [35] Empirical Software Security Assurance
    Harper, Dave
    WEB APPLICATION SECURITY, 2010, 72 : 11 - 11
  • [36] Towards Security Assurance Metrics for Service Systems Security
    Ouedraogo, Moussa
    EXPLORING SERVICES SCIENCE, 2012, 103 : 361 - 370
  • [37] The Role of Visual Features in Text-Based CAPTCHAs: An fNIRS Study for Usable Security
    Mulazimoglu, Emre
    Cakir, Murat P.
    Acarturk, Cengiz
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
  • [38] Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
    Weng, Haiqin
    Zhao, Binbin
    Ji, Shouling
    Chen, Jianhai
    Wang, Ting
    He, Qinming
    Beyah, Raheem
    BIG DATA MINING AND ANALYTICS, 2019, 2 (02) : 118 - 144
  • [39] Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
    Haiqin Weng
    Binbin Zhao
    Shouling Ji
    Jianhai Chen
    Ting Wang
    Qinming He
    Raheem Beyah
    Big Data Mining and Analytics, 2019, 2 (02) : 118 - 144
  • [40] Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion
    Xu, Yi
    Reynaga, Gerardo
    Chiasson, Sonia
    Frahm, Jan-Michael
    Monrose, Fabian
    van Oorschot, Paul C.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 480 - 493