메뉴 건너뛰기




Volumn 9, Issue 6, 2014, Pages 891-904

Captcha as graphical passwords - A new security primitive based on hard AI problems

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC MAIL FILTERS;

EID: 84899893060     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2312547     Document Type: Article
Times cited : (84)

References (44)
  • 1
    • 84866496149 scopus 로고    scopus 로고
    • Graphical passwords: Learning from the first twelve years
    • R. Biddle, S. Chiasson, and P. C. van Oorschot, "Graphical passwords: Learning from the first twelve years," ACM Comput. Surveys, vol. 44, no. 4, 2012.
    • (2012) ACM Comput. Surveys , vol.44 , Issue.4
    • Biddle, R.1    Chiasson, S.2    Van Oorschot, P.C.3
  • 2
    • 84883256116 scopus 로고    scopus 로고
    • Feb
    • (2012, Feb.). The Science Behind Passfaces [Online]. Available: http://www.realuser.com/published/ScienceBehindPassfaces.pdf
    • (2012) The Science behind Passfaces
  • 4
    • 77958098545 scopus 로고    scopus 로고
    • Pass-Go: A proposal to improve the usability of graphical passwords
    • H. Tao and C. Adams, "Pass-Go: A proposal to improve the usability of graphical passwords," Int. J. Netw. Security, vol. 7, no. 2, pp. 273-292, 2008.
    • (2008) Int. J. Netw. Security , vol.7 , Issue.2 , pp. 273-292
    • Tao, H.1    Adams, C.2
  • 5
    • 19944381937 scopus 로고    scopus 로고
    • PassPoints: Design and longitudinal evaluation of a graphical password system
    • DOI 10.1016/j.ijhcs.2005.04.010, PII S1071581905000625, HCI Research in Privacy and Security
    • S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," Int. J. HCI, vol. 63, pp. 102-127, Jul. 2005. (Pubitemid 40753495)
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 102-127
    • Wiedenbeck, S.1    Waters, J.2    Birget, J.-C.3    Brodskiy, A.4    Memon, N.5
  • 6
    • 39149106769 scopus 로고    scopus 로고
    • On predictive models and userdrawn graphical passwords
    • P. C. van Oorschot and J. Thorpe, "On predictive models and userdrawn graphical passwords," ACM Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 1-33, 2008.
    • (2008) ACM Trans. Inf. Syst. Security , vol.10 , Issue.4 , pp. 1-33
    • Van Oorschot, P.C.1    Thorpe, J.2
  • 7
    • 38049011983 scopus 로고    scopus 로고
    • Click passwords under investigation
    • K. Golofit, "Click passwords under investigation," in Proc. ESORICS, 2007, pp. 343-358.
    • (2007) Proc. ESORICS , pp. 343-358
    • Golofit, K.1
  • 8
    • 36848999302 scopus 로고    scopus 로고
    • Modeling user choice in the PassPoints graphical password scheme
    • DOI 10.1145/1280680.1280684, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
    • A. E. Dirik, N. Memon, and J.-C. Birget, "Modeling user choice in the passpoints graphical password scheme," in Proc. Symp. Usable Privacy Security, 2007, pp. 20-28. (Pubitemid 350229376)
    • (2007) ACM International Conference Proceeding Series , vol.229 , pp. 20-28
    • Dirik, A.E.1    Memon, N.2    Birget, J.-C.3
  • 9
    • 85049042638 scopus 로고    scopus 로고
    • Human-seeded attacks and exploiting hot spots in graphical passwords
    • J. Thorpe and P. C. van Oorschot, "Human-seeded attacks and exploiting hot spots in graphical passwords," in Proc. USENIX Security, 2007, pp. 103-118.
    • (2007) Proc. USENIX Security , pp. 103-118
    • Thorpe, J.1    Van Oorschot, P.C.2
  • 10
    • 77955677817 scopus 로고    scopus 로고
    • Purely automated attacks on passpoints-style graphical passwords
    • Sep.
    • P. C. van Oorschot, A. Salehi-Abari, and J. Thorpe, "Purely automated attacks on passpoints-style graphical passwords," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 393-405, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 393-405
    • Van Oorschot, P.C.1    Salehi-Abari, A.2    Thorpe, J.3
  • 11
    • 78751535295 scopus 로고    scopus 로고
    • Exploiting predictability in clickbased graphical passwords
    • P. C. van Oorschot and J. Thorpe, "Exploiting predictability in clickbased graphical passwords," J. Comput. Security, vol. 19, no. 4, pp. 669-702, 2011.
    • (2011) J. Comput. Security , vol.19 , Issue.4 , pp. 669-702
    • Van Oorschot, P.C.1    Thorpe, J.2
  • 12
    • 84899816306 scopus 로고    scopus 로고
    • Mar. 26
    • T. Wolverton. (2002, Mar. 26). Hackers Attack eBay Accounts [Online]. Available: http://www.zdnet.co.uk/news/networking/2002/03/26/hackers-attack- ebay-accounts-2107350/
    • (2002) Hackers Attack EBay Accounts
    • Wolverton, T.1
  • 13
    • 84899785985 scopus 로고    scopus 로고
    • HP TippingPoint DVLabs, Vienna, Austria. Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs
    • HP TippingPoint DVLabs, Vienna, Austria. (2010). Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online]. Available: http://dvlabs.tippingpoint.com/toprisks2010
    • (2010)
  • 14
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • B. Pinkas and T. Sander, "Securing passwords against dictionary attacks," in Proc. ACM CCS, 2002, pp. 161-170.
    • (2002) Proc. ACM CCS , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 15
    • 33750906057 scopus 로고    scopus 로고
    • On countering online dictionary attacks with login histories and humans-in-the-loop
    • DOI 10.1145/1178618.1178619
    • P. C. van Oorschot and S. Stubblebine, "On countering online dictionary attacks with login histories and humans-in-the-loop," ACM Trans. Inf. Syst. Security, vol. 9, no. 3, pp. 235-258, 2006. (Pubitemid 44728674)
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.3 , pp. 235-258
    • Van Oorschot, P.C.1    Stubblebine, S.2
  • 16
    • 81455139721 scopus 로고    scopus 로고
    • Revisiting defenses against large-scale online password guessing attacks
    • Jan./Feb.
    • M. Alsaleh, M. Mannan, and P. C. van Oorschot, "Revisiting defenses against large-scale online password guessing attacks," IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128-141, Jan./Feb. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.1 , pp. 128-141
    • Alsaleh, M.1    Mannan, M.2    Van Oorschot, P.C.3
  • 18
    • 38049014958 scopus 로고    scopus 로고
    • Graphical password authentication using cued click points
    • S. Chiasson, P. C. van Oorschot, and R. Biddle, "Graphical password authentication using cued click points," in Proc. ESORICS, 2007, pp. 359-374.
    • (2007) Proc. ESORICS , pp. 359-374
    • Chiasson, S.1    Van Oorschot, P.C.2    Biddle, R.3
  • 20
  • 21
    • 85084161493 scopus 로고    scopus 로고
    • Déjà Vu: A user study using images for authentication
    • R. Dhamija and A. Perrig, "Déjà Vu: A user study using images for authentication," in Proc. 9th USENIX Security, 2000, pp. 1-4.
    • (2000) Proc. 9th USENIX Security , pp. 1-4
    • Dhamija, R.1    Perrig, A.2
  • 22
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive authentication schemes safe against spyware
    • May
    • D. Weinshall, "Cognitive authentication schemes safe against spyware," in Proc. IEEE Symp. Security Privacy, May 2006, pp. 300-306.
    • (2006) Proc. IEEE Symp. Security Privacy , pp. 300-306
    • Weinshall, D.1
  • 23
    • 69249127514 scopus 로고    scopus 로고
    • Do background images improve 'Draw a Secret' graphical passwords
    • P. Dunphy and J. Yan, "Do background images improve 'Draw a Secret' graphical passwords," in Proc. ACM CCS, 2007, pp. 1-12.
    • (2007) Proc. ACM CCS , pp. 1-12
    • Dunphy, P.1    Yan, J.2
  • 24
    • 69749092477 scopus 로고    scopus 로고
    • Machine learning attacks against the Asirra CAPTCHA
    • P. Golle, "Machine learning attacks against the Asirra CAPTCHA," in Proc. ACM CCS, 2008, pp. 535-542.
    • (2008) Proc. ACM CCS , pp. 535-542
    • Golle, P.1
  • 25
    • 78650016133 scopus 로고    scopus 로고
    • Attacks and design of image recognition CAPTCHAs
    • B. B. Zhu et al., "Attacks and design of image recognition CAPTCHAs," in Proc. ACM CCS, 2010, pp. 187-200.
    • (2010) Proc. ACM CCS , pp. 187-200
    • Zhu, B.B.1
  • 26
    • 66249097513 scopus 로고    scopus 로고
    • A low-cost attack on a microsoft CAPTCHA
    • J. Yan and A. S. El Ahmad, "A low-cost attack on a microsoft CAPTCHA," in Proc. ACM CCS, 2008, pp. 543-554.
    • (2008) Proc. ACM CCS , pp. 543-554
    • Yan, J.1    El Ahmad, A.S.2
  • 29
    • 77955214169 scopus 로고    scopus 로고
    • Computers beat humans at single character recognition in reading-based human interaction proofs
    • K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, "Computers beat humans at single character recognition in reading-based human interaction proofs," in Proc. 2nd Conf. Email Anti-Spam, 2005, pp. 1-3.
    • (2005) Proc. 2nd Conf. Email Anti-Spam , pp. 1-3
    • Chellapilla, K.1    Larson, K.2    Simard, P.3    Czerwinski, M.4
  • 31
    • 77952329367 scopus 로고    scopus 로고
    • Asirra: A CAPTCHA that exploits interest-aligned manual image categorization
    • J. Elson, J. R. Douceur, J. Howell, and J. Saul, "Asirra: A CAPTCHA that exploits interest-aligned manual image categorization," in Proc. ACM CCS, 2007, pp. 366-374.
    • (2007) Proc. ACM CCS , pp. 366-374
    • Elson, J.1    Douceur, J.R.2    Howell, J.3    Saul, J.4
  • 33
    • 84899846356 scopus 로고    scopus 로고
    • Nov. 29
    • N. Joshi. (2009, Nov. 29). Koobface Worm Asks for CAPTCHA [Online]. Available: http://blogs.mcafee.com/mcafee-labs/koobface-worm-asksfor-CAPTCHA
    • (2009) Koobface Worm Asks for CAPTCHA
    • Joshi, N.1
  • 35
  • 36
    • 77954652031 scopus 로고
    • 2-pass mesh warping
    • Hoboken, NJ, USA: Wiley
    • G. Wolberg, "2-pass mesh warping," in Digital Image Warping. Hoboken, NJ, USA: Wiley, 1990.
    • (1990) Digital Image Warping
    • Wolberg, G.1
  • 37
    • 84899839370 scopus 로고    scopus 로고
    • HP TippingPoint DVLabs, New York, NY, USA.
    • HP TippingPoint DVLabs, New York, NY, USA. (2011). The Mid-Year Top Cyber Security Risks Report [Online]. Available: http://h20195.www2.hp.com/v2/GetPDF. aspx/4AA3-7045ENW.pdf
    • (2011) The Mid-Year Top Cyber Security Risks Report
  • 40
    • 84871480617 scopus 로고    scopus 로고
    • A new graphical password scheme against spyware by using CAPTCHA
    • H. Gao, X. Liu, S.Wang, and R. Dai, "A new graphical password scheme against spyware by using CAPTCHA," in Proc. Symp. Usable Privacy Security, 2009, pp. 760-767.
    • (2009) Proc. Symp. Usable Privacy Security , pp. 760-767
    • Gao, H.1    Liu, X.2    Wang, S.3    Dai, R.4
  • 42
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • Jun.
    • J. Bonneau, "The science of guessing: Analyzing an anonymized corpus of 70 million passwords," in Proc. IEEE Symp. Security Privacy, Jun. 2012, pp. 20-25.
    • (2012) Proc. IEEE Symp. Security Privacy , pp. 20-25
    • Bonneau, J.1
  • 43
    • 84899844196 scopus 로고    scopus 로고
    • John the Ripper Password Cracker
    • John the Ripper Password Cracker [Online]. Available: http://www. openwall.com/john/
  • 44
    • 84899819504 scopus 로고    scopus 로고
    • Openwall Wordlists Collection
    • Openwall Wordlists Collection [Online]. Available: http://www. openwall.com/wordlists/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.