Optical Character Recognition: An Illustrated Guide to the Frontier
Optical Character Recognition: An Illustrated Guide to the Frontier
Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Does Parallel Repetition Lower the Error in Computationally Sound Protocols?
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Pessimal Print: A Reverse Turing Test
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Telling humans and computers apart automatically
Communications of the ACM - Information cities
Using graphic turing tests to counter automated DDoS attacks against web servers
Proceedings of the 10th ACM conference on Computer and communications security
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Fighting the spam wars: A remailer approach with restrictive aliasing
ACM Transactions on Internet Technology (TOIT)
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Secure distributed human computation
Proceedings of the 6th ACM conference on Electronic commerce
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Preventing bots from playing online games
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Countering DoS attacks with stateless multipath overlays
Proceedings of the 12th ACM conference on Computer and communications security
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
GiveALink: mining a semantic network of bookmarks for web search and recommendation
Proceedings of the 3rd international workshop on Link discovery
Keeping bots out of online games
Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Salsa: a structured approach to large-scale anonymity
Proceedings of the 13th ACM conference on Computer and communications security
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Journal of Computer Security
Passwords decay, words endure: secure and re-usable multiple password mnemonics
Proceedings of the 2007 ACM symposium on Applied computing
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Security when people matter: structuring incentives for user behavior
Proceedings of the ninth international conference on Electronic commerce
An end-middle-end approach to connection establishment
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Recommenders everywhere:: the WikiLens community-maintained recommender system
Proceedings of the 2007 international symposium on Wikis
The influence limiter: provably manipulation-resistant recommender systems
Proceedings of the 2007 ACM conference on Recommender systems
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges
IEEE Internet Computing
Embedded noninteractive continuous bot detection
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Is a bot at the controls?: Detecting input data attacks
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Avoiding Massive Automated Voting in Internet Polls
Electronic Notes in Theoretical Computer Science (ENTCS)
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proceedings of the 2008 ACM symposium on Applied computing
A systematic approach for cell-phone worm containment
Proceedings of the 17th international conference on World Wide Web
WCAG 2.0: a web accessibility standard for the evolving web
W4A '08 Proceedings of the 2008 international cross-disciplinary conference on Web accessibility (W4A)
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 9th workshop on Mobile computing systems and applications
Web robot detection in the scholarly information environment
Journal of Information Science
Combining Biometric Authentication with Privacy-Enhancing Technologies
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
An offline foundation for online accountable pseudonyms
Proceedings of the 1st Workshop on Social Network Systems
Robust defenses for cross-site request forgery
Proceedings of the 15th ACM conference on Computer and communications security
A comprehensive human computation framework: with application to image labeling
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Caveat mercator in electronic commerce: An update
Decision Support Systems
Game Bot Detection Based on Avatar Trajectory
ICEC '08 Proceedings of the 7th International Conference on Entertainment Computing
Measurement and classification of humans and bots in internet chat
SS'08 Proceedings of the 17th conference on Security symposium
Detection of MMORPG bots based on behavior analysis
ACE '08 Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology
A novel software key container in on-line media services
Computers and Electrical Engineering
Identifying MMORPG bots: a traffic analysis approach
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
Game bot identification based on manifold learning
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Research of the CAPTCHA application in platform based on AJAX
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
What's up CAPTCHA?: a CAPTCHA based on image orientation
Proceedings of the 18th international conference on World wide web
Research of the chinese CAPTCHA system based on AJAX
WSEAS Transactions on Circuits and Systems
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
The interrogator as critic: The turing test and the evaluation of generative music systems
Computer Music Journal
Optimal false-name-proof voting rules with costly voting
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Unknown rewards in finite-horizon domains
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
An anti-spam scheme using pre-challenges
Computer Communications
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
An automated reverse turing test using facial expressions
HSI'09 Proceedings of the 2nd conference on Human System Interactions
Visual security is feeble for anti-phishing
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Depress phishing by CAPTCHA with OTP
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT)
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Knowledge-based user authentication associated with biometrics
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Large-scale bot detection for search engines
Proceedings of the 19th international conference on World wide web
Sketcha: a captcha based on line drawings of 3D models
Proceedings of the 19th international conference on World wide web
Network Elucidation Template: A framework for human-guided network inference
Computers and Industrial Engineering
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
SpyShield: preserving privacy from spy add-ons
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Chernoff-type direct product theorems
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
How to secure your email address book and beyond
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Towards A Universally Usable Human Interaction Proof: Evaluation of Task Completion Strategies
ACM Transactions on Accessible Computing (TACCESS)
Combating spam and denial-of-service attacks with trusted puzzle solvers
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
OntoGame: weaving the semantic web by online games
ESWC'08 Proceedings of the 5th European semantic web conference on The semantic web: research and applications
SpamResist: making peer-to-peer tagging systems robust to spam
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Information hypothesis: on human information capability study
BI'09 Proceedings of the 2009 international conference on Brain informatics
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Decaptcha: breaking 75% of eBay audio CAPTCHAs
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
Blindfold: a system to "See no evil" in content discovery
IPTPS'10 Proceedings of the 9th international conference on Peer-to-peer systems
Leveraging cognitive factors in securing WWW with CAPTCHA
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Attacks and design of image recognition CAPTCHAs
Proceedings of the 17th ACM conference on Computer and communications security
On building special-purpose social networks for emergency communication
ACM SIGCOMM Computer Communication Review
Trajectory based behavior analysis for user verification
IDEAL'10 Proceedings of the 11th international conference on Intelligent data engineering and automated learning
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
ECCV'10 Proceedings of the 11th European conference on Computer vision: Part I
Constructive proofs of concentration bounds
APPROX/RANDOM'10 Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Attacking image recognition CAPTCHAS: a naive but effective approach
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Efficient directory harvest attacks
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Distortion estimation techniques in solving visual CAPTCHAs
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Proceedings of the 26th Annual Computer Security Applications Conference
Evaluating and improving the usability of Mechanical Turk for low-income workers in India
Proceedings of the First ACM Symposium on Computing for Development
Distinguishing distributions using Chernoff information
ProvSec'10 Proceedings of the 4th international conference on Provable security
Re: CAPTCHAs: understanding CAPTCHA-solving services in an economic context
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Web robot detection techniques: overview and limitations
Data Mining and Knowledge Discovery
Private yet abuse resistant open publishing
Proceedings of the 15th international conference on Security protocols
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
DevilTyper: a game for CAPTCHA usability evaluation
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Adversarial security: getting to the root of the problem
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
An efficient and effective similarity measure to enable data mining of petroglyphs
Data Mining and Knowledge Discovery
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Peering through the shroud: the effect of edge opacity on ip-based client identification
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Mitigating denial of service attack using CAPTCHA mechanism
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Web Wisdom: An essay on how Web 2.0 and Semantic Web can foster a global knowledge society
Computers in Human Behavior
One-time computable self-erasing functions
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Using one-time passwords to prevent password phishing attacks
Journal of Network and Computer Applications
Improving HTTP performance using "stateless" TCP
Proceedings of the 21st international workshop on Network and operating systems support for digital audio and video
Proceedings of the 4th Workshop on Social Network Systems
Distributed human computation framework for linked data co-reference resolution
ESWC'11 Proceedings of the 8th extended semantic web conference on The semantic web: research and applications - Volume Part I
Hardened stateless session cookies
Security'08 Proceedings of the 16th International conference on Security protocols
Effects of age groups and distortion types on text-based CAPTCHA tasks
HCII'11 Proceedings of the 14th international conference on Human-computer interaction: users and applications - Volume Part IV
Applying biometric principles to avatar recognition
Transactions on computational science XII
Emerging theories and models of human computation systems: a brief survey
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Reclaiming the blogosphere, talkback: a secure linkback protocol for weblogs
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
High-throughput crowdsourcing mechanisms for complex tasks
SocInfo'11 Proceedings of the Third international conference on Social informatics
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
SEMAGE: a new image-based two-factor CAPTCHA
Proceedings of the 27th Annual Computer Security Applications Conference
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Guaranteeing access in spite of distributed service-flooding attacks
Proceedings of the 11th international conference on Security Protocols
Guaranteeing access in spite of distributed service-flooding attacks
Proceedings of the 11th international conference on Security Protocols
AMPol-Q: adaptive middleware policy to support qos
ICSOC'06 Proceedings of the 4th international conference on Service-Oriented Computing
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A user-friendly approach to human authentication of messages
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Secure distributed human computation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Humans and bots in internet chat: measurement, analysis, and automated classification
IEEE/ACM Transactions on Networking (TON)
Enforcing email addresses privacy using tokens
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Comment spam detection by sequence mining
Proceedings of the fifth ACM international conference on Web search and data mining
Almost optimal bounds for direct product threshold theorem
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Hardness amplification of weakly verifiable puzzles
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Pervasive random beacon in the internet for covert coordination
IH'05 Proceedings of the 7th international conference on Information Hiding
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
gore: routing-assisted defense against DDoS attacks
ISC'05 Proceedings of the 8th international conference on Information Security
SessionSafe: implementing XSS immune session handling
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Using CAPTCHAs to index cultural artifacts
IDA'10 Proceedings of the 9th international conference on Advances in Intelligent Data Analysis
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Mitigating dictionary attacks on password-protected local storage
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Human identification through image evaluation using secret predicates
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Behaviour-Based web spambot detection by utilising action time and action frequency
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Towards detection of botnet communication through social media by monitoring user activity
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Feature evaluation for web crawler detection with data mining techniques
Expert Systems with Applications: An International Journal
AniCAP: an animated 3d CAPTCHA scheme based on motion parallax
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Measurement Based Analysis of One-Click File Hosting Services
Journal of Network and Systems Management
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Micro perceptual human computation for visual tasks
ACM Transactions on Graphics (TOG)
Parsing operations based approach towards phishing attacks
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Comment spam classification in blogs through comment analysis and comment-blog post relationships
CICLing'12 Proceedings of the 13th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part II
Enhanced STE3D-CAP: a novel 3d CAPTCHA family
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Opaak: using mobile phones to limit anonymous identities online
Proceedings of the 10th international conference on Mobile systems, applications, and services
Secure client puzzles based on random beacons
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II
Measuring and fingerprinting click-spam in ad networks
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Breaking an animated CAPTCHA scheme
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking a 3d-based CAPTCHA scheme
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Trajectory analysis for user verification and recognition
Knowledge-Based Systems
Measuring and fingerprinting click-spam in ad networks
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
How much money do spammers make from your website?
Proceedings of the CUBE International Information Technology Conference
Liberating the programmer with prorogued programming
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing
International Journal of Electronic Security and Digital Forensics
Segmentation of CAPTCHAs based on complex networks
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Protection through Intelligent and Multimedia Captchas
International Journal of Adaptive, Resilient and Autonomic Systems
Stayin' alive: aliveness as an alternative to authentication
SP'12 Proceedings of the 20th international conference on Security Protocols
Spam fighting in social tagging systems
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Enhancing reliability using peer consistency evaluation in human computation
Proceedings of the 2013 conference on Computer supported cooperative work
Proceedings of the 2013 conference on Computer supported cooperative work
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
CAPTCHA suitable for smartphones
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Social machines: a unified paradigm to describe social web-oriented systems
Proceedings of the 22nd international conference on World Wide Web companion
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
From sensing to controlling: the state of the art in ubiquitous crowdsourcing
International Journal of Communication Networks and Distributed Systems
Resolvers Revealed: Characterizing DNS Resolvers and their Clients
ACM Transactions on Internet Technology (TOIT)
Seeing is not believing: visual verifications through liveness analysis using mobile devices
Proceedings of the 29th Annual Computer Security Applications Conference
DeepCAPTCHA: an image CAPTCHA based on depth perception
Proceedings of the 5th ACM Multimedia Systems Conference
A novel gesture-based CAPTCHA design for smart devices
BCS-HCI '13 Proceedings of the 27th International BCS Human Computer Interaction Conference
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |
We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems for security purposes allows us to advance the field of Artificial Intelligence. We introduce two families of AI problems that can be used to construct captchas and we show that solutions to such problems can be used for steganographic communication. captchas based on these AI problem families, then, imply a win-win situation: either the problems remain unsolved and there is a way to differentiate humans from computers, or the problems are solved and there is a way to communicate covertly on some channels.