CAPTCHA Challenge Tradeoffs: Familiarity of Strings versus Degradation of Images
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
Proceedings of the 14th ACM conference on Computer and communications security
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
WCRE '08 Proceedings of the 2008 15th Working Conference on Reverse Engineering
Spamalytics: an empirical analysis of spam marketing conversion
Proceedings of the 15th ACM conference on Computer and communications security
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Exploiting the human-machine gap in image recognition for designing CAPTCHAs
IEEE Transactions on Information Forensics and Security
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Distortion estimation techniques in solving visual CAPTCHAs
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Proceedings of the 26th Annual Computer Security Applications Conference
Enhanced email spam filtering through combining similarity graphs
Proceedings of the fourth ACM international conference on Web search and data mining
Web robot detection techniques: overview and limitations
Data Mining and Knowledge Discovery
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality
The nuts and bolts of a forum spam automator
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
No plan survives contact: experience with cybercrime measurement
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Dirty jobs: the role of freelance labor in web service abuse
SEC'11 Proceedings of the 20th USENIX conference on Security
Link spamming Wikipedia for profit
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Storage cost of spam 2.0 in a web discussion forum
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
Topic modeling of freelance job postings to monitor web service abuse
Proceedings of the 4th ACM workshop on Security and artificial intelligence
The socialbot network: when bots socialize for fame and money
Proceedings of the 27th Annual Computer Security Applications Conference
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Trust in collaborative web applications
Future Generation Computer Systems
Impact of spam exposure on user engagement
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
For human eyes only: security and usability evaluation
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Autonomous Participation in Cloud Services
UCC '12 Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
Spamming for science: active measurement in web 2.0 abuse research
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Evaluating the crowd with confidence
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
You are how you click: clickstream analysis for Sybil detection
SEC'13 Proceedings of the 22nd USENIX conference on Security
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechanistic software solving, yet can be solved with high probability by a human being. In response, a robust solving ecosystem has emerged, reselling both automated solving technology and realtime human labor to bypass these protections. Thus, CAPTCHAs can increasingly be understood and evaluated in purely economic terms; the market price of a solution vs the monetizable value of the asset being protected. We examine the market-side of this question in depth, analyzing the behavior and dynamics of CAPTCHA-solving service providers, their price performance, and the underlying labor markets driving this economy.