recommendations for the next generation of mobile
captchas.
ACKNOWLEDGEMENTS
Sonia Chiasson holds a Canada Research Chair in Hu-
man Oriented Computer Security acknowledges the
Natural Sciences and Engineering Research Council
of Canada (NSERC) for funding the Chair and a Dis-
covery Grant. The authors also acknowledge funding
from NSERC ISSNet and thank P.C. van Oorschot for
his valuable feedback on this project.
REFERENCES
Asokan, N. and Kuo, C. (2012). Usable mobile security.
In Distributed Computing and Internet Technology,
volume 7154 of Lecture Notes in Computer Science,
pages 1–6. Springer Berlin Heidelberg.
BBC (Accessed: Feb 2013). Ticketmaster dumps ’hated’
captcha verification system. Available from http://
www.bbc.co.uk/news/technology-21260007.
Bergman, J. and Vainio, J. (2010). Interacting with the flow.
In International Conference on Human Computer In-
teraction with Mobile Devices and Services, Mobile-
HCI ’10, pages 249–252, NY, USA. ACM.
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J. C., and
Jurafsky, D. (2010). How good are humans at solv-
ing CAPTCHAs? A large scale evaluation. In IEEE
Symposium on Security and Privacy, pages 399–413.
IEEE Computer Society.
Bursztein, E., Martin, M., and Mitchell, J. C. (2011). Text-
based captcha strengths and weaknesses. In ACM
Conference on Computer and Communications Secu-
rity, pages 125–138. ACM.
Charmaz, K. (2006). Constructing grounded theory: A
practical guide through qualitative analysis. Sage
Publications Limited.
Chow, R., Golle, P., Jakobsson, M., Wang, L., and Wang,
X. (2008). Making captchas clickable. In Workshop
on Mobile computing systems and applications, Hot-
Mobile ’08, pages 91–94, NY, USA. ACM.
Google, Inc. (2013). reCaptcha: Stop Spam, Read Books.
http://www.google.com/recaptcha.
Gossweiler, R., Kamvar, M., and Baluja, S. (2009). What’s
up CAPTCHA?: a CAPTCHA based on image ori-
entation. In International conference on World wide
web, WWW ’09, pages 841–850, NY, USA. ACM.
Kjeldskov, J. (2002). ”Just-in-Place” information for mo-
bile device interfaces. Lecture Notes in Computer Sci-
ence, 2411:271–275.
Lin, R., Huang, S.-Y., Bell, G. B., and Lee, Y.-K. (2011).
A new captcha interface design for mobile devices. In
ACSW 2011: Australasian User Interface Conference.
MacKenzie, I. and Soukoreff, R. (2002). Text entry for
mobile computing: Models and methods, theory and
practice. Human–Computer Interaction, 17(2-3):147–
198.
Microsoft Inc. (2012). Asirra (Animal Species Image
Recognition for Restricting Access). http://research.
microsoft.com/en-us/um/redmond/projects/asirra/.
Nielsen, J. (2013). Heuristic evaluation. Available from
http://www.nngroup.com/articles/how- to- conduct- a-
heuristic-evaluation/.
NuCaptcha, Inc. (2012). Available from http://
www.nucaptcha.com/resources/whitepapers. White
paper: NuCaptcha and Traditional Captcha.
Sharp, H., Rogers, Y., and Preece, J. (2007). Interaction
Design: Beyond Human-Computer Interaction. John
Wiley & Sons, Indianapolis, IN, 2 edition.
Vappic (2012). 4D CAPTCHA. http://www.vappic.com/
moreplease.
von Ahn, L., Blum, M., and Langford, J. (2004). Telling
humans and computers apart automatically. Commun.
ACM, 47:56–60.
Wismer, A. J., Madathil, K. C., Koikkara, R., Juang, K. A.,
and Greenstein, J. S. (2012). Evaluating the usability
of captchas on a mobile device with voice and touch
input. In Human Factors and Ergonomics Society An-
nual Meeting, volume 56, pages 1228–1232. SAGE
Publications.
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J.-M., Monrose,
F., and Van Oorschot, P. C. (2012). Security and us-
ability challenges of moving-object CAPTCHAs: De-
coding codewords in motion. In USENIX Security
Symposium, Berkeley, USA. USENIX Association.
Yan, J. and El Ahmad, A. S. (2008). Usability of
CAPTCHAs or usability issues in CAPTCHA de-
sign. In Symposium on Usable Privacy and Secu-
rity, SOUPS ’08, pages 44–52, New York, NY, USA.
ACM.
Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi,
M., and Cai, K. (2010). Attacks and design of image
recognition captchas. In Computer and Communica-
tions Security, CCS ’10, pages 187–200, New York,
NY, USA. ACM.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
434