Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content
10.1145/3243734.3243754acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

Published: 15 October 2018 Publication History

Abstract

Despite several attacks have been proposed, text-based CAPTCHAs are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is that many of the prior attacks are scheme-specific and require a labor-intensive and time-consuming process to construct. This means that a change in the captcha security features like a noisier background can simply invalid an earlier attack. This paper presents a generic, yet effective text captcha solver based on the generative adversarial network. Unlike prior machine-learning-based approaches that need a large volume of manually-labeled real captchas to learn an effective solver, our approach requires significantly fewer real captchas but yields much better performance. This is achieved by first learning a captcha synthesizer to automatically generate synthetic captchas to learn a base solver, and then fine-tuning the base solver on a small set of real captchas using transfer learning. We evaluate our approach by applying it to 33 captcha schemes, including 11 schemes that are currently being used by 32 of the top-50 popular websites including Microsoft, Wikipedia, eBay and Google. Our approach is the most capable attack on text captchas seen to date. It outperforms four state-of-the-art text-captcha solvers by not only delivering a significant higher accuracy on all testing schemes, but also successfully attacking schemes where others have zero chance. We show that our approach is highly efficient as it can solve a captcha within 0.05 second using a desktop GPU. We demonstrate that our attack is generally applicable because it can bypass the advanced security features employed by most modern text captcha schemes. We hope the results of our work can encourage the community to revisit the design and practical use of text captchas.

Supplementary Material

MP4 File (p332-ye.mp4)

References

[1]
Are you a human. https://www.areyouahuman.com/.
[2]
Nucaptcha. www.nucaptcha.com/.
[3]
Athanasopoulos, E., and Antonatos, S. Enhanced captchas: using animation to tell humans and computers apart. In IFIP International Conference on Communications and Multimedia Security (2006), pp. 97--108.
[4]
Audet, C., and Jr, J. E. D. Mesh adaptive direct search algorithms for constrained optimization. Siam Journal on Optimization 17, 1 (2006), 188--217.
[5]
Barreno, M., Nelson, B., Sears, R., Joseph, A. D., and Tygar, J. D. Can machine learning be secure? In ACM Symposium on Information, Computer and Communications Security (2006), pp. 16--25.
[6]
Bigham, J. P., and Cavender, A. C. Evaluating existing audio captchas and an interface optimized for non-visual use. In Sigchi Conference on Human Factors in Computing Systems (2009), pp. 1829--1838.
[7]
Bursztein, E. How we broke the nucaptcha video scheme and what we proposed to fix it. https://elie.net/blog/security/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it.
[8]
Bursztein, E., Aigrain, J., Moscicki, A., and Mitchell, J. C. The end is nigh: generic solving of text-based captchas. In USENIX WOOT (2014).
[9]
Bursztein, E., and Bethard, S. Decaptcha: breaking 75% of ebay audio captchas. In Usenix Conference on Offensive Technologies (2009), pp. 8--8.
[10]
Bursztein, E., Martin, M., and Mitchell, J. Text-based captcha strengths and weaknesses. In CCS (2011), pp. 125--138.
[11]
Chellapilla, K., Larson, K., Simard, P. Y., and Czerwinski, M. Computers beat humans at single character recognition in reading based human interaction proofs (hips). In Conference on Email & Anti-Spam (2005).
[12]
Chow, R., Golle, P., Jakobsson, M., Wang, L., and Wang, X. Making captchas clickable. In Proceedings of the 9th workshop on Mobile computing systems and applications (2008), ACM, pp. 91--94.
[13]
Elson, J., Douceur, J. R., Howell, J., and Saul, J. Asirra:a captcha that exploits interest-aligned manual image categorization. In ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, Usa, October (2007), pp. 366--374.
[14]
et al., P. I. Pix2Pix: Image-to-image translation with conditional adversarial networks. https://github.com/phillipi/pix2pix.
[15]
Gao, H., Tang, M., Liu, Y., Zhang, P., and Liu, X. Research on the security of microsoft's two-layer captcha. IEEE Transactions on Information Forensics & Security 12, 7 (2017), 1671--1685.
[16]
Gao, H., Wei, W., Wang, X., Liu, X., and Yan, J. The robustness of hollow captchas. In ACM Sigsac Conference on Computer & Communications Security (2013), pp. 1075--1086.
[17]
Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X., and Li, J. A simple generic attack on text captchas. In NDSS (2016).
[18]
Gao, S. An evolutionary study of dynamic cognitive game captchas: Automated attacks and defenses. Dissertations & Theses - Gradworks (2014).
[19]
George, D., Lehrach, W., Kansky, K., Lázaro-Gredilla, M., Laan, C., Marthi, B., Lou, X., Meng, Z., Liu, Y., and Wang, H. A generative vision model that trains with high data efficiency and breaks text-based captchas. Science (2017), eaag2612.
[20]
Gold, C., Holub, A., and Sollich, P. Bayesian approach to feature selection and parameter tuning for support vector machine classifiers. Neural Networks 18, 5 (2005), 693--701.
[21]
Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and Shet, V. Multi-digit number recognition from street view imagery using deep convolutional neural networks. In International Conference on Learning Representations (ICLR) (2014).
[22]
Goodfellow, I. J., Pougetabadie, J., Mirza, M., Xu, B., Wardefarley, D., Ozair, S., Courville, A., and Bengio, Y. Generative adversarial networks. Advances in Neural Information Processing Systems 3 (2014), 2672--2680.
[23]
Goodfellow, I. J., Shlens, J., Szegedy, C., Goodfellow, I. J., Shlens, J., and Szegedy, C. Explaining and harnessing adversarial examples. In ICML (2015), pp. 1--10.
[24]
Gossweiler, R., Kamvar, M., and Baluja, S. What's up captcha?:a captcha based on image orientation. In International Conference on World Wide Web, WWW 2009, Madrid, Spain, April (2009), pp. 841--850.
[25]
Greg, M., and Malik, J. Recognizing objects in adversarial cultter: Breaking a visual captcha. In IEEE Computer Society Conferene on Computer Vision and Pattern Recognition (2003).
[26]
He, K., Gkioxari, G., Dollár, P., and Girshick, R. Mask R-CNN. In IEEE International Conference on Computer Vision (ICCV) (2017), pp. 2980--2988.
[27]
He, K., Zhang, X., Ren, S., and Sun, J. Deep residual learning for image recognition. 770--778.
[28]
Hecht-Nielsen, R. Theory of the backpropagation neural network. Harcourt Brace & Co., 1989.
[29]
Hernandezcastro, C. J., Ribagorda, A., and Saez, Y. Side-channel attack on labeling captchas. Computer Science (2009).
[30]
Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I. P., and Tygar, J. D. Adversarial machine learning. IEEE Internet Computing 15, 5 (2011), 4--6.
[31]
Isola, P., Zhu, J.-Y., Zhou, T., and Efros, A. A. Image-to-image translation with conditional adversarial networks. arxiv (2016).
[32]
J, W. Strong captcha guidelines v1. 2.
[33]
Jiang, Z., Zhao, J., Li, X.-Y., Han, J., and Xi, W. Rejecting the attack: Source authentication for wi-fi management frames using csi information. In IEEE INFOCOM (2013), pp. 2544--2552.
[34]
Kingma, D. P., and Ba, J. Adam: A method for stochastic optimization. Computer Science (2014).
[35]
Krol, K., Parkin, S., and Sasse, M. A. Better the devil you know: A user study of two captchas and a possible replacement technology. In NDSS Workshop on Usable Security (2016).
[36]
Le, T. A., Baydin, A. G., Zinkov, R., and Wood, F. Using synthetic data to train neural networks is model-based reasoning. In International Joint Conference on Neural Networks (2017), pp. 3514--3521.
[37]
Lea, C., Vidal, R., Reiter, A., and Hager, G. D. Temporal convolutional networks: A unified approach to action segmentation. In European Conference on Computer Vision (2016), pp. 47--54.
[38]
Lecun, Y., Bottou, L., Bengio, Y., and Haffner, P. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86, 11 (1998), 2278--2324.
[39]
Li, J., Monroe, W., Shi, T., Jean, S., Ritter, A., and Jurafsky, D. Adversarial learning for neural dialogue generation.
[40]
Meutzner, H., and Kolossa, D. Reducing the cost of breaking audio captchas by active and semi-supervised learning. In International Conference on Machine Learning and Applications (2014), pp. 67--73.
[41]
Miyato, T., Maeda, S., Koyama, M., Nakae, K., and Ishii, S. Distributional smoothing by virtual adversarial examples. arXiv (2015).
[42]
Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., and Riedmiller, M. Playing atari with deep reinforcement learning. arXiv (2013).
[43]
Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., Kumaraguru, P., Oorschot, P. C. V., and Chen, W. B. A three-way investigation of a game-captcha:automated attacks, relay attacks and usability. In ACM Symposium on Information, Computer and Communications Security (2014), pp. 195--206.
[44]
Mohameda, M., Gaob, S., Sachdevac, N., Saxena, N., Zhangd, C., Kumaraguruc, P., and Oorschote, P. C. V. On the security and usability of dynamic cognitive game captchas. Journal of Computer Security (2017), 1--26.
[45]
Ogilvie, W. F., Petoumenos, P., Wang, Z., and Leather, H. Fast automatic heuristic construction using active learning. In International Workshop on Languages and Compilers for Parallel Computing (2014), pp. 146--160.
[46]
Ogilvie, W. F., Petoumenos, P., Wang, Z., and Leather, H. Minimizing the cost of iterative compilation with active learning. In Proceedings of the 2017 International Symposium on Code Generation and Optimization (2017), CGO '17, pp. 245--256.
[47]
Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., and Pérez-Cabo, D. No bot expects the deepcaptcha! introducing immutable adversarial examples, with applications to captcha generation. IEEE Transactions on Information Forensics & Security PP, 99 (2017), 1--1.
[48]
Pan, S. J., and Yang, Q. A survey on transfer learning. IEEE Transactions on Knowledge & Data Engineering 22, 10 (2010), 1345--1359.
[49]
Rosenberg, I., Shabtai, A., Rokach, L., and Elovici, Y. Generic black-box end-to-end attack against rnns and other api calls based malware classifiers. arXiv (2017).
[50]
Schlaikjer, A. A dual-use speech captcha: Aiding visually impaired web users while providing transcriptions of audio streams. LTI (2010).
[51]
Shahzad, M., Liu, A. X., and Samuel, A. Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Transactions on Mobile Computing 16, 10 (2017), 2726--2741.
[52]
Shrivastava, A., Pfister, T., Tuzel, O., Susskind, J., Wang, W., and Webb, R. Learning from simulated and unsupervised images through adversarial training. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017).
[53]
Simonyan, K., and Zisserman, A. Very deep convolutional networks for large-scale image recognition. Computer Science (2014).
[54]
Sivakorn, S., Polakis, I., and Keromytis, A. D. I am robot: (deep) learning to break semantic image captchas. In IEEE European Symposium on Security and Privacy (2016), pp. 388--403.
[55]
Stark, F., Hazirbas, C., Triebel, R., and Cremers, D. Captcha recognition with active deep learning. In German Conference on Pattern Recognition Workshop (2015).
[56]
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and Wojna, Z. Rethinking the inception architecture for computer vision. Computer Science (2015), 2818--2826.
[57]
Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. Intriguing properties of neural networks. Computer Science (2013).
[58]
Tam, J., Simsa, J., Hyde, S., and Ahn, L. V. Breaking audio captchas. In Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December (2008), pp. 1625--1632.
[59]
Von Ahn, L., Blum, M., Hopper, N. J., and Langford, J. CAPTCHA: Using Hard AI Problems for Security. Springer Berlin Heidelberg, 2003.
[60]
Von Ahn, L., Blum, M., and Langford, J. Telling humans and computers apart automatically. Communications of the ACM 47, 2 (2004), 56--60.
[61]
Xu, W., Qi, Y., and Evans, D. Automatically evading classifiers: A case study on pdf malware classifiers. In Network and Distributed System Security Symposium (2016).
[62]
Xu, Y., Reynaga, G., Chiasson, S., Frahm, J.-M., Monrose, F., and Van Oorschot, P. C. Security analysis and related usability of motion-based captchas: Decoding codewords in motion. IEEE transactions on dependable and secure computing 11, 5 (2014), 480--493.
[63]
Yan, J., and Ahmad, A. S. E. Breaking visual captchas with naive pattern recognition algorithms. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual (2007), pp. 279--291.
[64]
Yan, J., and Ahmad, A. S. E. A low-cost attack on a microsoft captcha. In ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, Usa, October (2008), pp. 543--554.
[65]
Yosinski, J., Clune, J., Bengio, Y., and Lipson, H. How transferable are features in deep neural networks? In Advances in neural information processing systems (2014), pp. 3320--3328.
[66]
Yu, L., Zhang, W., Wang, J., and Yu, Y. Seqgan: Sequence generative adversarial nets with policy gradient.
[67]
Zhu, J.-Y., Park, T., Isola, P., and Efros, A. A. Unpaired image-to-image translation using cycle-consistent adversarial networks. arXiv preprint arXiv:1703.10593 (2017).

Cited By

View all
  • (2024)Usability Improvement in Color Constancy CAPTCHAIEICE Communications Express10.23919/comex.2024XBL005213:8(331-334)Online publication date: Aug-2024
  • (2024)Assessing and Improving Data Integrity in Web-Based Surveys: Comparison of Fraud Detection Systems in a COVID-19 StudyJMIR Formative Research10.2196/470918(e47091)Online publication date: 12-Jan-2024
  • (2024)The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern WebProceedings of the ACM Web Conference 202410.1145/3589334.3645619(1835-1846)Online publication date: 13-May-2024
  • Show More Cited By

Index Terms

  1. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      October 2018
      2359 pages
      ISBN:9781450356930
      DOI:10.1145/3243734
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. deep learning
      2. generative adversarial networks
      3. text-based captchas
      4. transfer learning

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '18
      Sponsor:

      Acceptance Rates

      CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)111
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 04 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Usability Improvement in Color Constancy CAPTCHAIEICE Communications Express10.23919/comex.2024XBL005213:8(331-334)Online publication date: Aug-2024
      • (2024)Assessing and Improving Data Integrity in Web-Based Surveys: Comparison of Fraud Detection Systems in a COVID-19 StudyJMIR Formative Research10.2196/470918(e47091)Online publication date: 12-Jan-2024
      • (2024)The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern WebProceedings of the ACM Web Conference 202410.1145/3589334.3645619(1835-1846)Online publication date: 13-May-2024
      • (2024)Improving the Security of Audio CAPTCHAs With Adversarial ExamplesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.323636721:2(650-667)Online publication date: Mar-2024
      • (2024)C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00200(277-295)Online publication date: 19-May-2024
      • (2024)AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10533010(1-8)Online publication date: 26-Feb-2024
      • (2024)A comprehensive review on artificial intelligence-driven preprocessing, segmentation, and classification techniques for precision furcation analysis in radiographic imagesMultimedia Tools and Applications10.1007/s11042-024-19920-3Online publication date: 30-Jul-2024
      • (2023)New Cognitive Deep-Learning CAPTCHASensors10.3390/s2304233823:4(2338)Online publication date: 20-Feb-2023
      • (2023)A Survey on Adversarial Perturbations and Attacks on CAPTCHAsApplied Sciences10.3390/app1307460213:7(4602)Online publication date: 5-Apr-2023
      • (2023)STUDY OF ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS AND CHALLENGESSRN Electronic Journal10.2139/ssrn.4652028Online publication date: 2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media