期刊文献+

验证码安全与验证码绕过技术 被引量:7

CAPTCHA security and bypass technique
下载PDF
导出
摘要 全自动区分计算机和人类的图灵测试(CAPTCHA)俗称验证码(VC),提供了一种自动区分人和机器的手段,已经成为保障系统安全的一种安全标准配置。针对验证码的本质特性、生成机制及其运行机理等方面的问题进行深入研究,发掘出系统验证码存在可绕过漏洞。该漏洞可以直接绕过验证码的验证机制,使得各种看似复杂安全的验证码防护如同虚设,验证码的破解率可达100%,但是该漏洞的存在率还无法确定。首先分析系统结构及登录请求参数;然后模拟登录获取系统登录所需验证码;最后编写脚本程序利用已获得的验证码对系统进行暴力破解。结合实际系统应用,验证了存在此漏洞的可用性与危害性。最后给出了系统验证码安全架设和安全编码的全新策略。 Completely Automated Public Turing test to tell Computers and Humans Apart( CAPTCHA),also known as Verification Code( VC),which provides a means for automatically distinguishing between human and machine,has become a standard configuration for system security.Focusing on the problem of essential characteristics,operational mechanism and generative mechanism of CAPTCHA,the CAPTCHA system was explored out existing a bypass vulnerability.The verification mechanism of CAPTCHA could be directly bypassed so that all kinds of robust CAPTCHAs were just rubber stamps.The crack rate of CAPTCHA could be 100%,but the existence was not determined.Firstly,system structure and request parameters for login were analyzed.Then,the CAPTCHA required for system login was obtained by simulating login.Finally,the system was cracked by a script program with the obtained CAPTCHA.With the practical application,the availability and harmfulness of the vulnerability was verified.In the end,new strategies were presented for system security framework and programming.
出处 《计算机应用》 CSCD 北大核心 2016年第A01期37-41,57,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61402397) 云南省软件工程重点实验室开放基金重点资助项目(2015SE103 2015SE201)
关键词 验证码 安全编码 身份鉴别 WEB安全 安全漏洞 CAPTCHA security coding authentication Web security vulnerability
  • 相关文献

参考文献19

  • 1王斌君,王靖亚,杜凯选,韩宇.验证码技术的攻防对策研究[J].计算机应用研究,2013,30(9):2776-2779. 被引量:19
  • 2von AHN L, BLUM M, LANGFORD J. Telling humans and com- puter apart automatically [ J]. Communications of the ACM, 2004, 47(2) : 56 - 60.
  • 3BAIRD H S, POPAT K. Human interactive proofs and document image analysis [ C]//Proceedings of the 5th International Workshop on Document Analysis Systems V, LNCS 2423.
  • 4Carnegie Mellon University. The official CAPTCHA site [ EB/OL]. [2015 -03 -01]. http://eapteha, net.
  • 5CHELLAPILLA K, LARSON K, SIMARD P, et al. Desgin human friendly human interaction proofs[ C] //CHI'05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, 2005:711-720.
  • 6BAIRD H S, COATES A L, FATEMAN R J. PessimalPrint: a reverse turing test [ J]. International Journal on Document Analysis and Recognition, 2003, 5(2):: 158-163.
  • 7CHOW R, GOLLE P, JAKOBSSON M, et al. Making CAPTCHAs clickable [ C] //HotMobile'08: Proceedings of the 9th Workshop on Mobile Computing Systems and Applications. New York: ACM, 2008:91-94.
  • 8HUANG S-Y, LEE Y-K, BELL G, et al. A projection-based segmentation algorithm for breaking MSN and YAHOO CAPTCHAs [ C]//Proceeding of the World Congress on Engineering. London: [ s. n. ], 2008:727 -730.
  • 9GOLLE P. Machine learning attacks against the Asirra CAPTCHA [ C] //Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008:535-542.
  • 10HUANG S-Y, LEE Y-K, BELL G, et al. An efficient segmentation algorithm for CAPTCHAs with line cluttering and character warping [ J]. Multimedia Tools and Applications, 2009, 48(2) :267 -289.

二级参考文献12

  • 1王斌君,景乾元等.信息安全体系[M].北京:高等教育出版社,2008.
  • 2TURING A M. Computing machinery and intelligence [ J ]. Mind, 1950,236( 1 ) :433-460.
  • 3AHN L V, BLUM M, LANGFORD J. Telling humans and computer apart automatically [ J ]. Communications of the ACM, 2004,47 (2) :57-60.
  • 4CHELLAPILLA K, LARSON K, SIMARD P, et al. Building seg- mentation based humanfriendly human interaction proofs [ C ]//Proc of the 2nd International Workshop on Human Interactive Proofs. Berlin: Springer-Verlag, 2005 : 1 - 26.
  • 5TAM J, SIMSA J, HYDE S, et al. Breaking audio CAPTCHAs[ C]// Advances in Neural Information Processing Systems. Cambridge : MIT Press ,2008 : 1625-1632.
  • 6TAM J, S1MSA J, HUGGINS-DAINES D, et al. Improving audio CAPTCHAS[ C ]//Proe of the 4th Symposium on Usability, Privacy and Security. 2008.
  • 7BONGARD M M. Pattern recognition [ M ]. New Jersey: Spartan Books, 1951.
  • 8ROSS A, HALDERMAN A, FINKELSTEIN A. Sketcha: a CAP- TCHA based on line drawings of 3 D models [ C ]//Proc of the 19th In- ternational Conference on World Wide Web. New ork:ACM Press, 2010:821- 830.
  • 9BANDAY M T, SHAH N A. A study of CAPTCHAs for securing Web services[ J]. International doumal of Secure Digital Information Age,2009,1 (2) :66-74.
  • 10ATHANASOPOULOS E, ANTOATOS S. Enhanced CAI:q'CHAS: using anithation to tell humans and computers apart [ C ]//Proc of the 10th IFIP Open Conference on Communications and Multimedia Secu- rity. Berlin : Springer, 2006 : 97-108.

共引文献18

同被引文献31

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部