Human Interactive Proofs and Document Image Analysis
DAS '02 Proceedings of the 5th International Workshop on Document Analysis Systems V
Pessimal Print: A Reverse Turing Test
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
IWFHR '04 Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition
Cache Cookies for Browser Authentication (Extended Abstract)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Invasive browser sniffing and countermeasures
Proceedings of the 15th international conference on World Wide Web
How to win the clonewars: efficient periodic n-times anonymous authentication
Proceedings of the 13th ACM conference on Computer and communications security
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
WIAMIS '07 Proceedings of the Eight International Workshop on Image Analysis for Multimedia Interactive Services
Developing usable CAPTCHAs for blind users
Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
Proceedings of the 14th ACM conference on Computer and communications security
Crimeware: understanding new attacks and defenses
Crimeware: understanding new attacks and defenses
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
Proceedings of the 9th workshop on Mobile computing systems and applications
Machine learning attacks against the Asirra CAPTCHA
Proceedings of the 15th ACM conference on Computer and communications security
What's up CAPTCHA?: a CAPTCHA based on image orientation
Proceedings of the 18th international conference on World wide web
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Distortion estimation techniques in solving visual CAPTCHAs
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Click fraud resistant methods for learning click-through rates
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Proceedings of the 26th Annual Computer Security Applications Conference
Hi-index | 0.00 |
We argue that the CAPTCHA in its current incarnation may be near the end of its useful life, and propose an alternative throttling mechanism to control access to web resources. We analyze our proposed solution against a collection of realistic adversaries and conclude that it is a viable approach. As a result of potential independent value, we describe heuristic tools to identify cookie theft, machine cloning attacks, and DNS poisoning attacks.