Datta, R., Li, J., and Wang, J. Z. (2005). Imagination: a ro-
bust image-based captcha generation system. In ACM
International Conference on Multimedia, pages 331–
334.
Elson, J., Douceur, J. R., Howell, J., and Saul, J. (2007).
Asirra: a captcha that exploits interest-aligned manual
image categorization. In ACM Conference on Com-
puter and Communications Security (CCS), pages
366–374.
Gao, H., Wang, W., Qi, J., Wang, X., Liu, X., and Yan, J.
(2013). The robustness of hollow captchas. In ACM
Conference on Computer and Communications Secu-
rity (CCS), pages 1075–1086.
Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M.,
Zhang, P., Zhou, X., Wang, X., and Li, J. (2016). A
simple generic attack on text captchas. In Network
and Distributed System Security Symposium, (NDSS).
Golle, P. (2008). Machine learning attacks against the asirra
captcha. In ACM Conference on Computer and com-
munications security (CCS), pages 535–542.
Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and
Shet, V. D. (2013). Multi-digit number recognition
from street view imagery using deep convolutional
neural networks. CoRR abs/1312.6082.
Kluever, K. A. and Zanibbi, R. (2009). Balancing usability
and security in a video captcha. In ACM Symposium
on Usable Privacy and Security (SOUPS).
Mohamed, M., Gao, S., Saxena, N., and Zhang, C. (2014a).
Dynamic cognitive game captcha usability and detec-
tion of streaming-based farming. In Workshop NDSS
on Usable Security (USEC).
Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Sax-
ena, N., Zhang, C., Kumaraguru, P., van Oorschot,
P. C., and Chen, W.-B. (2014b). A three-way inves-
tigation of a game-captcha: automated attacks, relay
attacks and usability. In ACM Symposium on Informa-
tion, Computer and Communications Security (ASI-
ACCS), pages 195–206.
Mori, G. and Malik, J. (2003). Recognizing objects in ad-
versarial clutter: Breaking a visual captcha. In Con-
ference on Computer Vision and Pattern Recognition
(CVPR), pages 133–144.
Motoyama, M., Levchenko, K., Kanich, C., McCoy, D.,
Voelker, G. M., and Savage, S. (2010). Re: Captchas-
understanding captcha-solving services in an eco-
nomic context. In USENIX Security Symposium, vol-
ume 10, pages 435–462.
Nejati, H., Cheung, N.-M., Sosa, R., and Koh, D. C.-I.
(2014). Deepcaptcha: an image captcha based on
depth perception. In ACM Multimedia Systems Con-
ference (MMSys), pages 81–90.
Nguyen, V. D., Chow, Y.-W., and Susilo, W. (2012). Break-
ing an animated captcha scheme. In Applied Cryptog-
raphy and Network Security (ACNS), pages 12–29.
Nguyen, V. D., Chow, Y.-W., and Susilo, W. (2014). On
the security of text-based 3d captchas. Computers &
Security, 45:84–99.
Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkel-
man, O., and Perez-Cabo, D. (2016). No bot expects
the deepcaptcha! introducing immutable adversarial
examples with applications to captcha. IACR Cryp-
tology ePrint Archive.
Reynaga, G. and Chiasson, S. (2013). The usability
of captchas on smartphones. In International Con-
ference on Security and Cryptography (SECRYPT),
pages 427–434.
Rui, Y. and Liu, Z. (2004). Artifacial: Automated reverse
turing test using facial features. Multimedia Systems,
9(6):493–502.
Shirali-Shahreza, S. and Shirali-Shahreza, M. (2008).
Captcha for children. In IEEE International Confer-
ence on System of Systems Engineering (SoSE), pages
1–6.
Simonyan, K. and Zisserman, A. (2014). Very deep con-
volutional networks for large-scale image recognition.
arXiv preprint arXiv:1409.1556.
Sivakorn, S., Polakis, I., and Keromytis, A. D. (2016). I
am robot: (deep) learning to break semantic image
captchas. In IEEE European Symposium on Security
and Privacy (EuroS&P), pages 388–403.
Tam, J., Simsa, J., Hyde, S., and von Ahn, L. (2008). Break-
ing audio captchas. In Advances in Neural Informa-
tion Processing Systems (NIPS), pages 1625–1632.
Thomas, K., McCoy, D., Grier, C., Kolcz, A., and Paxson,
V. (2013). Trafficking fraudulent accounts: the role of
the underground market in twitter spam and abuse. In
USENIX Security Symposium, pages 195–210.
Truong, H. D., Turner, C. F., and Zou, C. C. (2011).
icaptcha: The next generation of captcha designed
to defend against 3rd party human attacks. In IEEE
International Conference on Communications (ICC),
pages 1–6.
Turing, A. M. (1950). Computing machinery and intelli-
gence. Mind, 59(236):433–460.
von Ahn, L. (2009). Teaching computers to read: Google
acquires recaptcha. googleblogspot.
von Ahn, L., Blum, M., Hopper, N. J., and Langford, J.
(2003). Captcha: Using hard ai problems for security.
In International Conference on the Theory and Appli-
cations of Cryptographic Techniques (EUROCRYPT),
pages 294–311.
von Ahn, L., Maurer, B., McMillen, C., Abraham, D., and
Blum, M. (2008). recaptcha : Human-based character
recognition via web security measures. Science, 321.
Wilkins, J. (2009). Strong captcha guidelines. Technical
Report (v1.2).
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J. M., Monrose,
F., and van Oorschot, P. C. (2012). Security and us-
ability challenges of moving-object captchas: Decod-
ing codewords in motion. In USENIX Security Sym-
posium, pages 49–64.
Yan, J. and Ahmad, A. S. E. (2007a). Breaking visual
captchas with naive pattern recognition algorithms. In
Annual Computer Security Applications Conference
(ACSAC), pages 279–291.
Yan, J. and Ahmad, A. S. E. (2007b). A low-cost attack on a
microsoft captcha. In ACM Conference on Computer
and communications security (CCS), pages 543–554.
Yan, J. and Ahmad, A. S. E. (2009). Captcha security: A
case study. IEEE Security & Privacy, 7(4):22–28.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
50