期刊文献+

验证码安全与验证码绕过技术 被引量:7

CAPTCHA security and bypass technique
下载PDF
导出
摘要 全自动区分计算机和人类的图灵测试(CAPTCHA)俗称验证码(VC),提供了一种自动区分人和机器的手段,已经成为保障系统安全的一种安全标准配置。针对验证码的本质特性、生成机制及其运行机理等方面的问题进行深入研究,发掘出系统验证码存在可绕过漏洞。该漏洞可以直接绕过验证码的验证机制,使得各种看似复杂安全的验证码防护如同虚设,验证码的破解率可达100%,但是该漏洞的存在率还无法确定。首先分析系统结构及登录请求参数;然后模拟登录获取系统登录所需验证码;最后编写脚本程序利用已获得的验证码对系统进行暴力破解。结合实际系统应用,验证了存在此漏洞的可用性与危害性。最后给出了系统验证码安全架设和安全编码的全新策略。 Completely Automated Public Turing test to tell Computers and Humans Apart( CAPTCHA),also known as Verification Code( VC),which provides a means for automatically distinguishing between human and machine,has become a standard configuration for system security.Focusing on the problem of essential characteristics,operational mechanism and generative mechanism of CAPTCHA,the CAPTCHA system was explored out existing a bypass vulnerability.The verification mechanism of CAPTCHA could be directly bypassed so that all kinds of robust CAPTCHAs were just rubber stamps.The crack rate of CAPTCHA could be 100%,but the existence was not determined.Firstly,system structure and request parameters for login were analyzed.Then,the CAPTCHA required for system login was obtained by simulating login.Finally,the system was cracked by a script program with the obtained CAPTCHA.With the practical application,the availability and harmfulness of the vulnerability was verified.In the end,new strategies were presented for system security framework and programming.
出处 《计算机应用》 CSCD 北大核心 2016年第A01期37-41,57,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61402397) 云南省软件工程重点实验室开放基金重点资助项目(2015SE103 2015SE201)
关键词 验证码 安全编码 身份鉴别 WEB安全 安全漏洞 CAPTCHA security coding authentication Web security vulnerability
  • 相关文献

参考文献19

  • 1王斌君,王靖亚,杜凯选,韩宇.验证码技术的攻防对策研究[J].计算机应用研究,2013,30(9):2776-2779. 被引量:19
  • 2von AHN L, BLUM M, LANGFORD J. Telling humans and com- puter apart automatically [ J]. Communications of the ACM, 2004, 47(2) : 56 - 60. 被引量:1
  • 3BAIRD H S, POPAT K. Human interactive proofs and document image analysis [ C]//Proceedings of the 5th International Workshop on Document Analysis Systems V, LNCS 2423. 被引量:1
  • 4Carnegie Mellon University. The official CAPTCHA site [ EB/OL]. [2015 -03 -01]. http://eapteha, net. 被引量:1
  • 5CHELLAPILLA K, LARSON K, SIMARD P, et al. Desgin human friendly human interaction proofs[ C] //CHI'05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, 2005:711-720. 被引量:1
  • 6BAIRD H S, COATES A L, FATEMAN R J. PessimalPrint: a reverse turing test [ J]. International Journal on Document Analysis and Recognition, 2003, 5(2):: 158-163. 被引量:1
  • 7CHOW R, GOLLE P, JAKOBSSON M, et al. Making CAPTCHAs clickable [ C] //HotMobile'08: Proceedings of the 9th Workshop on Mobile Computing Systems and Applications. New York: ACM, 2008:91-94. 被引量:1
  • 8HUANG S-Y, LEE Y-K, BELL G, et al. A projection-based segmentation algorithm for breaking MSN and YAHOO CAPTCHAs [ C]//Proceeding of the World Congress on Engineering. London: [ s. n. ], 2008:727 -730. 被引量:1
  • 9GOLLE P. Machine learning attacks against the Asirra CAPTCHA [ C] //Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008:535-542. 被引量:1
  • 10HUANG S-Y, LEE Y-K, BELL G, et al. An efficient segmentation algorithm for CAPTCHAs with line cluttering and character warping [ J]. Multimedia Tools and Applications, 2009, 48(2) :267 -289. 被引量:1

二级参考文献12

  • 1王斌君,景乾元等.信息安全体系[M].北京:高等教育出版社,2008. 被引量:11
  • 2TURING A M. Computing machinery and intelligence [ J ]. Mind, 1950,236( 1 ) :433-460. 被引量:1
  • 3AHN L V, BLUM M, LANGFORD J. Telling humans and computer apart automatically [ J ]. Communications of the ACM, 2004,47 (2) :57-60. 被引量:1
  • 4CHELLAPILLA K, LARSON K, SIMARD P, et al. Building seg- mentation based humanfriendly human interaction proofs [ C ]//Proc of the 2nd International Workshop on Human Interactive Proofs. Berlin: Springer-Verlag, 2005 : 1 - 26. 被引量:1
  • 5TAM J, SIMSA J, HYDE S, et al. Breaking audio CAPTCHAs[ C]// Advances in Neural Information Processing Systems. Cambridge : MIT Press ,2008 : 1625-1632. 被引量:1
  • 6TAM J, S1MSA J, HUGGINS-DAINES D, et al. Improving audio CAPTCHAS[ C ]//Proe of the 4th Symposium on Usability, Privacy and Security. 2008. 被引量:1
  • 7BONGARD M M. Pattern recognition [ M ]. New Jersey: Spartan Books, 1951. 被引量:1
  • 8ROSS A, HALDERMAN A, FINKELSTEIN A. Sketcha: a CAP- TCHA based on line drawings of 3 D models [ C ]//Proc of the 19th In- ternational Conference on World Wide Web. New ork:ACM Press, 2010:821- 830. 被引量:1
  • 9BANDAY M T, SHAH N A. A study of CAPTCHAs for securing Web services[ J]. International doumal of Secure Digital Information Age,2009,1 (2) :66-74. 被引量:1
  • 10ATHANASOPOULOS E, ANTOATOS S. Enhanced CAI:q'CHAS: using anithation to tell humans and computers apart [ C ]//Proc of the 10th IFIP Open Conference on Communications and Multimedia Secu- rity. Berlin : Springer, 2006 : 97-108. 被引量:1

共引文献18

同被引文献31

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部