BeschreibungE-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.
InhaltsverzeichnisCAPTCHAs and Performance Analysis.- Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs).- A Highly Legible CAPTCHA That Resists Segmentation Attacks.- Visual CAPTCHA with Handwritten Image Analysis.- Characters or Faces: A User Study on Ease of Use for HIPs.- HIP Architectures.- Collaborative Filtering CAPTCHAs.- CAPTCHA Generation as a Web Service.- Leveraging the CAPTCHA Problem.- HIPs Within Security Systems.- How Much Assurance Does a PIN Provide?.- Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks.
Untertitel: Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings. 'Lecture Notes in Computer Science'. 'Security and Cryptology'. 2005. Auflage. Book. Sprache: Englisch.
Erscheinungsdatum: Mai 2005
Seitenanzahl: 156 Seiten