Security Risks with using CAPTCHAs

17
Security Risks with Using CAPTCHAs Final Project CS854 Fall 2006 Presented by Allan Caine December 4, 2006

Transcript of Security Risks with using CAPTCHAs

Page 1: Security Risks with using CAPTCHAs

Security Risks with Using CAPTCHAs

Final Project CS854 Fall 2006Presented by Allan Caine

December 4, 2006

Page 2: Security Risks with using CAPTCHAs

Allan Caine 2

OutlineBackgroundOur Proposed Model and WhyMulti-point attackAttacking “Repeaters”

Page 3: Security Risks with using CAPTCHAs

Allan Caine 3

Background

Password/authentication System

Human called the ProverGenerally succeeds

Bot called the ProverGenerally fails

Server/System

CAPTCHA called the Verifier

Page 4: Security Risks with using CAPTCHAs

Allan Caine 4

Current Paradigm

Purchase RequestKey: k

challenge

E-commerce web site.

Bot

CAPTCHA Server

CGI: kCGI: k

Expects 3882948

Page 5: Security Risks with using CAPTCHAs

Allan Caine 5

Proposed ModelE-commerce web site. BotCAPTCHA

Server

The attacker cannot perceive the presence of a third party.

Page 6: Security Risks with using CAPTCHAs

Allan Caine 6

Example

Pre-sale advertising

Transaction Processing

Page 7: Security Risks with using CAPTCHAs

Allan Caine 7

Consequence: Multi-point Attack

The resemblance is uncanny. Both use the same 3rd party CAPTCHA provider, audienceview.com.

Breaking one CAPTCHA, breaks both sites. Attacker has two points of attack and more incentive to attempt the attack.

Page 8: Security Risks with using CAPTCHAs

Allan Caine 8

All of these Sites are Compromised!

www.tickets.com

And many other non-baseball sites

Page 9: Security Risks with using CAPTCHAs

Allan Caine 9

Attacking Repeaters

Purchase RequestKey: k

challenge

E-commerce web site.

MLB & yourtube.com

Bot

CAPTCHA Server

CGI: kCGI: k

Expects 3882948

Page 10: Security Risks with using CAPTCHAs

Allan Caine 10

Two Basic StepsLearn off-lineAttack on-line

Page 11: Security Risks with using CAPTCHAs

Allan Caine 11

1st Step: Learn Off-line

Clipped

Cleaned

Templates

Page 12: Security Risks with using CAPTCHAs

Allan Caine 12

2nd Step:Attack On-line

Sub-stepsPre-process the CAPTCHACorrelate and Vote

Page 13: Security Risks with using CAPTCHAs

Allan Caine 13

Preprocess

K-means analysis Segregation

Targets

Page 14: Security Risks with using CAPTCHAs

Allan Caine 14

Correlate and Vote

Best Match!

Usually, we get a correct match. Occasionally, due to image noise in the target, we get a spurious result.

No problem! We ask the CAPTCHA server for another image with the same solution. We try again to cross check our work.

Page 15: Security Risks with using CAPTCHAs

Allan Caine 15

“Election” Results

The digit getting the most votes for a particular position “wins” the election and is our choice for the solution.

Page 16: Security Risks with using CAPTCHAs

Allan Caine 16

So What?Strategy depends upon a specific weakness (repeating) and yet:

Unlimited access to training data (common fault)Strategy suggests how to segregate charactersLearning complex strategies perhaps break other CAPTCHAs

Page 17: Security Risks with using CAPTCHAs

Allan Caine 17

Future DirectionsApply the learn off-line/attack on-line strategy to break other CAPTCHAs (i.e. break yourtube.com and audienceview.com)Use analysis to build more robust verifiers (i.e. k not constant)Build prototype e-commerce websites according to our model and test.