skip to main content
10.1145/1455770.1455838acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Machine learning attacks against the Asirra CAPTCHA

Published:27 October 2008Publication History

ABSTRACT

The Asirra CAPTCHA [EDHS2007], proposed at ACM CCS 2007, relies on the problem of distinguishing images of cats and dogs (a task that humans are very good at). The security of Asirra is based on the presumed difficulty of classifying these images automatically.

In this paper, we describe a classifier which is 82.7% accurate in telling apart the images of cats and dogs used in Asirra. This classifier is a combination of support-vector machine classifiers trained on color and texture features extracted from images. Our classifier allows us to solve a 12-image Asirra challenge automatically with probability 10.3%. This probability of success is significantly higher than the estimate of 0.2% given in [EDHS2007] for machine vision attacks. Our results suggest caution against deploying Asirra without safeguards.

We also investigate the impact of our attacks on the partial credit and token bucket algorithms proposed in [EDHS2007]. The partial credit algorithm weakens Asirra considerably and we recommend against its use. The token bucket algorithm helps mitigate the impact of our attacks and allows Asirra to be deployed in a way that maintains an appealing balance between usability and security. One contribution of our work is to inform the choice of safeguard parameters in Asirra deployments.

References

  1. ASR Asirra: A Human Interactive Proof. On the Web at http://research.microsoft.com/asirra/Google ScholarGoogle Scholar
  2. BotBarrier.com. On the web at http://www.botbarrier.com/Google ScholarGoogle Scholar
  3. Chih-Chung Chang and Chih-Jen Lin. LIBSVM : a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. . Chow, P. Golle, M. Jakobsson, X. Wang and L. Wang. Making CAPTCHAs Clickable. In Proc. of HotMobile 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. . Cortes and V. Vapnik. Support-vector network. Machine Learning 20, 273--297, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. . Douceur and J. Elson. Private communication.Google ScholarGoogle Scholar
  7. . Elson, J. Douceur, J. Howell and J. Saul. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In Proc. of ACM CCS 2007, pp. 366--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. . Golle and D. Wagner. Cryptanalysis of a Cognitive Authentication Scheme. In Proc. of the 2007 IEEE Symposium on Security and Privacy, pp.66--70. IEEE Computer Society Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Google CAPTCHA. On the web at https://www.google.com/accounts/DisplayUnlockCaptchaGoogle ScholarGoogle Scholar
  10. . Hastie, R. Tibshirani and J. Friedman. The Elements of Statistical Learning (Data Mining, Inference, and Prediction). Springer Series in Statistics, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  11. . Kruizinga, N. Petkov and S.E. Grigorescu. Comparison of texture features based on Gabor filters. In Proc. of the 10th International Conference on Image Analysis and Processing (1999), pp. 142--147. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. . Lopresti. Leveraging the CAPTCHA problem. In Proc. of the Second International Workshop on Human Interactive Proofs, pp. 97--110. Springer Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. . Mironov and L. Zhang. Applications of SAT Solvers to Cryptanalysis of Hash Functions. In Theory and Applications of Satisfiability Testing -- SAT 2006, pp. 102--115, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. . Mori and J. Malik. Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In Proc. of the 2003 Conference on Computer Vision and Pattern Recognition, pp. 134--144. IEEE Computer Society, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. SlashDot. Yahoo CAPTCHA Hacked (posted Jan 29, 2008). On the Web at http://it.slashdot.org/it/08/01/30/0037254.shtmlGoogle ScholarGoogle Scholar
  16. Websense Blog (posted Feb 22, 2008). Google's CAPTCHA busted in recent spammer tactics. On the web at http://securitylabs.websense.com/content/Blogs/2919.aspxGoogle ScholarGoogle Scholar
  17. . Yan and A. El Ahmad. A Low-cost Attack on a Microsoft CAPTCHA. To appear in Proc. of ACM CCS 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Machine learning attacks against the Asirra CAPTCHA

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
        October 2008
        590 pages
        ISBN:9781595938107
        DOI:10.1145/1455770

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '08 Paper Acceptance Rate51of280submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader