Artifacial: Automated reverse turing test using facial features

Y Rui, Z Liu - Proceedings of the eleventh ACM international …, 2003 - dl.acm.org
Web services designed for human users are being abused by computer programs (bots).
The bots steal thousands of free email accounts in a minute; participate in online polls to …

Building segmentation based human-friendly human interaction proofs (HIPs)

K Chellapilla, K Larson, PY Simard… - International Workshop on …, 2005 - Springer
Human interaction proofs (HIPs) have become common place on the internet due to their
effectiveness in deterring automated abuse of online services intended for humans …

Designing human friendly human interaction proofs (HIPs)

K Chellapilla, K Larson, P Simard… - Proceedings of the …, 2005 - dl.acm.org
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans,
while remaining too hard to be economically solved by computers. HIPs are increasingly …

Phish and hips: Human interactive proofs to detect phishing attacks

R Dhamija, JD Tygar - … Proofs: Second International Workshop, HIP 2005 …, 2005 - Springer
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human
to distinguish one computer from another. Unlike traditional HIPs, where the computer …

Bot, Cyborg and Automated Turing Test: (Or “Putting the Humanoid in the Protocol”)

J Yan - International Workshop on Security Protocols, 2006 - Springer
Abstract The Automated Turing test (ATT) is almost a standard security technique for
addressing the threat of undesirable or malicious bot programs. In this paper, we motivate …

Notamper: automatic blackbox detection of parameter tampering opportunities in web applications

P Bisht, T Hinrichs, N Skrupsky, R Bobrowicz… - Proceedings of the 17th …, 2010 - dl.acm.org
Web applications rely heavily on client-side computation to examine and validate form
inputs that are supplied by a user (eg," credit card expiration date must be valid"). This is …

[PDF][PDF] Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.

A Sudhodanan, A Armando, R Carbone, L Compagna - NDSS, 2016 - ndss-symposium.org
The advent of Software-as-a-Service (SaaS) has led to the development of multi-party web
applications (MPWAs). MPWAs rely on core trusted third-party systems (eg, payment …

Handwritten CAPTCHA: Using the difference in the abilities of humans and machines in reading handwritten words

A Rusu, V Govindaraju - Ninth International Workshop on …, 2004 - ieeexplore.ieee.org
Handwritten text offers challenges that are rarely encountered in machine-printed text. In
addition, most problems faced in reading machine-printed text (eg, character recognition …

Mitigating denial of service attack using CAPTCHA mechanism

M Mehra, M Agarwal, R Pawar, D Shah - Proceedings of the …, 2011 - dl.acm.org
Denial of Service (DoS henceforth) attack is performed solely with the intention to deny the
legitimate users to access services. Since DoS attack is usually performed by means of bots …

[图书][B] Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux

G Najera-Gutierrez, JA Ansari - 2018 - books.google.com
Build your defense against web attacks with Kali Linux, including command injection flaws,
crypto implementation layers, and web application security holes Key Features Know how to …