Separating man from machine since 2000….. ?. Agenda  Definition  History  Need  Types  Constructing CAPTCHAs  Breaking CAPTCHAs  Applications 

Slides:



Advertisements
Similar presentations
Securing Passwords against Dictionary Attacks
Advertisements

COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
CAPTCHA: Using Hard AI Problems for Security 12 Jun 2007 Ohad Barak (a.k.a. jo) Luis Von Ahn, EuroCrypt 2003.
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart A Computer Program that can generate and grade test that: Most Humans.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
AN IMPROVED AUDIO Jenn Tam Computer Science Dept. Carnegie Mellon University SOAPS 2008, Pittsburgh, PA.
Breaking an Animated CAPTCHA Scheme
CAPTCHA Presented By Sayani Chandra (Roll )
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Telling Humans and Computers Apart (Automatically) Or How Lazy Cryptographers do AI Luis von Ahn The Aladdin Center Carnegie Mellon University.
CAPTCHA Prabhakar Verma “08MC30”.
CAPTCHA & THE ESP GAME SHAH JAYESH CS575SPRING 2008.
Computer Vision Group University of California Berkeley Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA Greg Mori and Jitendra Malik.
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Every week: Sign in at the door If you are new: Fill in Registration Form Ask a Mentor how to get started Make sure you are on the Athenry Parents/Kids.
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
Matthias Neubauer CAPTCHA What humans can do, But computers can not.
Mrs. Beth Cueni Carnegie Mellon
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
Recognizing some of the modern CAPTCHAs Dmitry Nikulin LCME, Saint-Petersburg, 2011.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Analyzing CAPTCHAs May 1, 2009 Kyle Anderson Michelle Krause Matthew Turner.
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
Extending the Scope of Learning Objects with XML Bill Tait COLMSCT Associate Teaching Fellow The Open University ALT-C Conference Sep 2007.
Exploration Seminar 3 Human Computation Roy McElmurry.
IOTA Improved Design and Implementation of a Modular and Extensible Course Management System Andrew Hamilton 5 th Period.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart Determines whether a user is.
Preventing Automated Use of STMP Reservation System Using CAPTCHA.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
Group 10: Lucas Witt, BD Zheng, Keith Wilkerson, Alyssa Wintersteller.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
By: Mrs. Abdallah. The way we taught students in the past simply does not prepare them for the higher demands of college and careers today and in the.
Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented.
Application Layer Attack. DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors,
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
+ Publishing Your First Post USING WORDPRESS. + A CMS (content management system) is an application that allows you to publish, edit, modify, organize,
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart User is human or machine? Prevents.
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
Peter Matthews, Cliff C. Zou University of Central Florida AsiaCCS 2010.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Introduction to Classification & Clustering Villanova University Machine Learning Lab Module 4.
CAPTCHA What humans can do, But computers can not.
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
SUBMITTED TO:-SUBMITTED BY:- Ms.Kavita KhannaShruty Ahuja H.O.D(CSE DEPARTMENT)02/MT/10 PDM,BAHADURGARHCE(2 ND SEM)
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
مباني امنيت شبكه CAPTCHA)) به نام خدا مدرس: شهرزاد گلستانی Website:
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
THE ESP GAME, AND OTHER STUFF
Introduction to Classification & Clustering
3.6 Fundamentals of cyber security
Are you Human?.
Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms
Web Programming Week 11 Old Dominion University
Fun gym Cambridge Nationals R001.
Mrs. Beth Cueni Carnegie Mellon
Setting up an online account
A novel probabilistic language-based CAPTCHA system
Analyzing CAPTCHAs.
Fighting the WebBots A webbot is a program that visits web sites for all kinds of purposes. For example, Google webbots make copies of all web sites for.
Presented By Vibhute J.B. Class : M.Sc. (CS)
Week 7 - Wednesday CS363.
Presentation transcript:

Separating man from machine since 2000….. ?

Agenda  Definition  History  Need  Types  Constructing CAPTCHAs  Breaking CAPTCHAs  Applications  Conclusion

Introduction  CAPTCHA  Completely Automated Public Turing test to tell Computers and Humans Apart CAPTCHA is a program that protect websites against bots by generating and grading test that- “ Humans can pass but Computer programs can’t “

History  First developed by Alta Vista in 1997  The term coined in 2000 at CMU by Luis Von, Manuel Blum And Nicholas Hopper of Carnegie Mellon university.  He decided to add a test to the submission page for protection against bots.  He reversed the Turing test.

 What is a Turing test?  Proposed by Alan Turing  It is a test of a machine’s ability to exhibit intelligence equivalent to a human.  Human judge asks questions to two participants, one is a machine, one is human. He doesn’t know which is which If judge can’t tell which is the machine, the machine passes the test  CAPTCHA employs a reverse Turing test, judge = CAPTCHA program, participant = user if user passes CAPTCHA, he is human if user fails, it is a machine

captcha

Generic CAPTCHAs distort letters and numbers. Distorted characters are presented to user. User has to recognize the distorted letters If the letters are correct, the user is inferred to be a human & allowed access Else, user is a bot and denied access HOW CAPTCHA WORKS

Background  Why CAPTCHA was needed?  Sabotage of online polls (happened in 1999 in flooded the polls by automated generated program)  Abusing free online accounts by multiple registration( In 2000,Yahoo’s popular messenger chat service was hit by bots )

Types of CAPTCHAs  Text based:  Simple, normal language questions:  What is sum of three and thirty-five?  If today is Saturday, what is day after tomorrow?  Which of mango, table, water is a fruit?  Very effective, needs a large question bank  Cognitively challenged users find it hard

 Gimpy:  Designed by Yahoo and CMU  Picks up 10 random words from dictionary and distorts, fills with noise  User has to recognize at least 3 words  If user is correct, he is admitted

 EZ-Gimpy:  A modified version of Gimpy  Yahoo used this version in Messenger  Has only 1 random string of characters  Not a good implementation, already broken by OCRs

 MSN’s Passport service CAPTCHAs:  Provided for Microsoft’s MSN services  Use 8 characters  Warping is used to distort  Very strong implementation, hasn’t been broken  It is segmentation-resistant

 Graphic based CAPTCHAs:  BONGO:  After M.M.Bongard, pattern recognition expert  User has to solve a pattern recognition problem  Has to tell the distinct characteristic between two sets of figures  Then tell to which set a given figure belongs to

 PIX  Uses a large database of labelled images  It shows a set of images, user has to recognize the common feature among those  E.g., Pick the common characteristic among the following four pictures-----”Aeroplane”

 Image orientation captcha  CAPTCHA developed by Google, In 2009 which requires users to adjust randomly rotated images to their upright orientation.

 Audio CAPTCHAs:  Consist of downloadable audio clip  User listens and enters the spoken word  Helps visually disabled users  Below is the Google’s audio enabled CAPTCHA  Not popular

Friend Recognition One of the more interesting CAPTCHA ideas appeared in January 2011 as a result of an effort by social-networking giant Facebook. The company is currently experimenting with social authentication in an effort to verify account authenticity. In the words of the experiment:social authentication “We will show you a few pictures of your friends and ask you to name the person in those photos. Hackers halfway across the world might know your password, but they don’t know who your friends are.” — Alex Rice, Facebook, A Continued Commitment to SecurityA Continued Commitment to Security

Constructing CAPTCHAs  Things to keep in mind:  Don’t store CAPTCHA solution in Web page’s metadata  A CAPTCHA is no good if it doesn't distort  Need a large database of different CAPTCHA questions  Avoid repetition of questions

 Embeddable CAPTCHAs:  Available freely, just embed code into Web page’s HTML, from e.g.,  No maintenance  Custom CAPTCHAs:  Fits to the theme of the page  Better protected from spammers Can be written in any language– HTML,.NET, JavaScript

Breaking CAPTCHAs  Greg Mori and Jitendra Malik have broken text CAPTCHAs, e.g., Ez-Gimpy  To break this CAPTCHA  Preprocessing: Removal of background clutter and noise  Segmentation: Locate possible letters in the image  Classification : Identifying the character in each region

 Social engineering to break CAPTCHAs:  Spammer encounters a CAPTCHA  That CAPTCHA is copied to another site  Humans are baited, e.g., free MP 3 s  To get those MP3s, users are told to solve the copied CAPTCHA  Solution is routed to the spammer  Solution: Fix a time-to-live period for a question  CAPTCHA cracking as a business:  Firms offer CAPTCHA cracking service in exchange for money

Applications  Preventing comment spam in blogs(stops the program that post bogus comments)  Prevent spam s and protect online polls  RECAPTCHA  Advertisement Captcha

 Verify digitized books: reCAPTCHA  Used in Google Books Project  Two words are shown, the program knows first word and second word is the fragment of that old book  If user enters first word correctly, it assumes that the second unknown word will also be entered correctly  Second word becomes “known”

20 Million words are being digitized every day!!!

 Advertisement mode Advertisement based text CAPTCHA was introduced in late 2010 by Solve Media, whose solution was to replace text with an advertisement and a related question. It serves as an advantage.introduced

Summary  CAPTCHAs are an effective way to counter bots and reduce spam  Applications are varied– from stopping bots to character recognition & pattern matching.  Recaptcha is adding a lot to digitization of books. So next time if you are solving a captcha feel good as you are solving something which computers still can’t and preserving a part of history.