Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating

04/29/2019
by   Jianyi Zhang, et al.
0

Crowdsourcing human-solving or online typing attacks are destructive problems. However, studies into these topics have been limited. In this paper, we focus on this kind of attacks whereby all the CAPTCHAs can be simply broken because of its design purpose. After pursuing a comprehensive analysis of the Typer phenomenon and the attacking mechanism of CAPTCHA, we present a new CAPTCHA design principle to distinguish human (Typer) from human (user). The core idea is that the challenge process of the CAPTCHA should contain the unique information with a private attribute. The notion of our idea is based on the information asymmetry between humans. Without this private information, Typers will not be able to finish the attack even if they recognize all the characters from the CAPTCHA. We formalize, design and implement two examples on our proposed principle, a character-based, and a datagram-based case, according to a web interaction and password handling program. We challenge the user to select the password from the random characters that are not in the password sequence or to place the randomly sorted sequences into the correct order. A novel generation algorithm with a fuzzy matching method has been proposed to add the capability of human error tolerance and the difficulty of random guess attack. Unlike other solutions, our approach does not need to modify the primary authentication protocol, user interface, and experience of the typical web service. The several user studies' results indicate that our proposed method is both simple (can be solved by humans accurately within less than 20 seconds) and efficient (the Typer can only deploy a random guess attack with a very low success rate).

READ FULL TEXT
research
06/30/2022

Optimizing Character Animations using Online Crowdsourcing

This paper presents a novel approach for exploring diverse and expressiv...
research
03/30/2019

PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

This paper studies leakage of user passwords and PINs based on observati...
research
03/03/2018

ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain

We design and implement the first private and anonymous decentralized cr...
research
05/11/2023

Prevention of shoulder-surfing attacks using shifting condition using digraph substitution rules

Graphical passwords are implemented as an alternative scheme to replace ...
research
05/31/2018

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data

We present a probabilistic framework for studying adversarial attacks on...
research
09/01/2018

What's a little leakage between friends?

This paper introduces a new attack on recent messaging systems that prot...

Please sign up or login with your details

Forgot password? Click here to reset