skip to main content
10.1145/3243734.3243754acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

Published:15 October 2018Publication History

ABSTRACT

Despite several attacks have been proposed, text-based CAPTCHAs are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is that many of the prior attacks are scheme-specific and require a labor-intensive and time-consuming process to construct. This means that a change in the captcha security features like a noisier background can simply invalid an earlier attack. This paper presents a generic, yet effective text captcha solver based on the generative adversarial network. Unlike prior machine-learning-based approaches that need a large volume of manually-labeled real captchas to learn an effective solver, our approach requires significantly fewer real captchas but yields much better performance. This is achieved by first learning a captcha synthesizer to automatically generate synthetic captchas to learn a base solver, and then fine-tuning the base solver on a small set of real captchas using transfer learning. We evaluate our approach by applying it to 33 captcha schemes, including 11 schemes that are currently being used by 32 of the top-50 popular websites including Microsoft, Wikipedia, eBay and Google. Our approach is the most capable attack on text captchas seen to date. It outperforms four state-of-the-art text-captcha solvers by not only delivering a significant higher accuracy on all testing schemes, but also successfully attacking schemes where others have zero chance. We show that our approach is highly efficient as it can solve a captcha within 0.05 second using a desktop GPU. We demonstrate that our attack is generally applicable because it can bypass the advanced security features employed by most modern text captcha schemes. We hope the results of our work can encourage the community to revisit the design and practical use of text captchas.

Skip Supplemental Material Section

Supplemental Material

p332-ye.mp4

mp4

386.6 MB

References

  1. Are you a human. https://www.areyouahuman.com/.Google ScholarGoogle Scholar
  2. Nucaptcha. www.nucaptcha.com/.Google ScholarGoogle Scholar
  3. Athanasopoulos, E., and Antonatos, S. Enhanced captchas: using animation to tell humans and computers apart. In IFIP International Conference on Communications and Multimedia Security (2006), pp. 97--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Audet, C., and Jr, J. E. D. Mesh adaptive direct search algorithms for constrained optimization. Siam Journal on Optimization 17, 1 (2006), 188--217. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Barreno, M., Nelson, B., Sears, R., Joseph, A. D., and Tygar, J. D. Can machine learning be secure? In ACM Symposium on Information, Computer and Communications Security (2006), pp. 16--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bigham, J. P., and Cavender, A. C. Evaluating existing audio captchas and an interface optimized for non-visual use. In Sigchi Conference on Human Factors in Computing Systems (2009), pp. 1829--1838. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bursztein, E. How we broke the nucaptcha video scheme and what we proposed to fix it. https://elie.net/blog/security/how-we-broke-the-nucaptcha-video-scheme-and-what-we-propose-to-fix-it.Google ScholarGoogle Scholar
  8. Bursztein, E., Aigrain, J., Moscicki, A., and Mitchell, J. C. The end is nigh: generic solving of text-based captchas. In USENIX WOOT (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bursztein, E., and Bethard, S. Decaptcha: breaking 75% of ebay audio captchas. In Usenix Conference on Offensive Technologies (2009), pp. 8--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bursztein, E., Martin, M., and Mitchell, J. Text-based captcha strengths and weaknesses. In CCS (2011), pp. 125--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Chellapilla, K., Larson, K., Simard, P. Y., and Czerwinski, M. Computers beat humans at single character recognition in reading based human interaction proofs (hips). In Conference on Email & Anti-Spam (2005).Google ScholarGoogle Scholar
  12. Chow, R., Golle, P., Jakobsson, M., Wang, L., and Wang, X. Making captchas clickable. In Proceedings of the 9th workshop on Mobile computing systems and applications (2008), ACM, pp. 91--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Elson, J., Douceur, J. R., Howell, J., and Saul, J. Asirra:a captcha that exploits interest-aligned manual image categorization. In ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, Usa, October (2007), pp. 366--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. et al., P. I. Pix2Pix: Image-to-image translation with conditional adversarial networks. https://github.com/phillipi/pix2pix.Google ScholarGoogle Scholar
  15. Gao, H., Tang, M., Liu, Y., Zhang, P., and Liu, X. Research on the security of microsoft's two-layer captcha. IEEE Transactions on Information Forensics & Security 12, 7 (2017), 1671--1685. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Gao, H., Wei, W., Wang, X., Liu, X., and Yan, J. The robustness of hollow captchas. In ACM Sigsac Conference on Computer & Communications Security (2013), pp. 1075--1086. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gao, H., Yan, J., Cao, F., Zhang, Z., Lei, L., Tang, M., Zhang, P., Zhou, X., Wang, X., and Li, J. A simple generic attack on text captchas. In NDSS (2016).Google ScholarGoogle ScholarCross RefCross Ref
  18. Gao, S. An evolutionary study of dynamic cognitive game captchas: Automated attacks and defenses. Dissertations & Theses - Gradworks (2014).Google ScholarGoogle Scholar
  19. George, D., Lehrach, W., Kansky, K., Lázaro-Gredilla, M., Laan, C., Marthi, B., Lou, X., Meng, Z., Liu, Y., and Wang, H. A generative vision model that trains with high data efficiency and breaks text-based captchas. Science (2017), eaag2612.Google ScholarGoogle Scholar
  20. Gold, C., Holub, A., and Sollich, P. Bayesian approach to feature selection and parameter tuning for support vector machine classifiers. Neural Networks 18, 5 (2005), 693--701. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and Shet, V. Multi-digit number recognition from street view imagery using deep convolutional neural networks. In International Conference on Learning Representations (ICLR) (2014).Google ScholarGoogle Scholar
  22. Goodfellow, I. J., Pougetabadie, J., Mirza, M., Xu, B., Wardefarley, D., Ozair, S., Courville, A., and Bengio, Y. Generative adversarial networks. Advances in Neural Information Processing Systems 3 (2014), 2672--2680. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Goodfellow, I. J., Shlens, J., Szegedy, C., Goodfellow, I. J., Shlens, J., and Szegedy, C. Explaining and harnessing adversarial examples. In ICML (2015), pp. 1--10.Google ScholarGoogle Scholar
  24. Gossweiler, R., Kamvar, M., and Baluja, S. What's up captcha?:a captcha based on image orientation. In International Conference on World Wide Web, WWW 2009, Madrid, Spain, April (2009), pp. 841--850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Greg, M., and Malik, J. Recognizing objects in adversarial cultter: Breaking a visual captcha. In IEEE Computer Society Conferene on Computer Vision and Pattern Recognition (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. He, K., Gkioxari, G., Dollár, P., and Girshick, R. Mask R-CNN. In IEEE International Conference on Computer Vision (ICCV) (2017), pp. 2980--2988.Google ScholarGoogle Scholar
  27. He, K., Zhang, X., Ren, S., and Sun, J. Deep residual learning for image recognition. 770--778.Google ScholarGoogle Scholar
  28. Hecht-Nielsen, R. Theory of the backpropagation neural network. Harcourt Brace & Co., 1989.Google ScholarGoogle ScholarCross RefCross Ref
  29. Hernandezcastro, C. J., Ribagorda, A., and Saez, Y. Side-channel attack on labeling captchas. Computer Science (2009).Google ScholarGoogle Scholar
  30. Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I. P., and Tygar, J. D. Adversarial machine learning. IEEE Internet Computing 15, 5 (2011), 4--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Isola, P., Zhu, J.-Y., Zhou, T., and Efros, A. A. Image-to-image translation with conditional adversarial networks. arxiv (2016).Google ScholarGoogle Scholar
  32. J, W. Strong captcha guidelines v1. 2.Google ScholarGoogle Scholar
  33. Jiang, Z., Zhao, J., Li, X.-Y., Han, J., and Xi, W. Rejecting the attack: Source authentication for wi-fi management frames using csi information. In IEEE INFOCOM (2013), pp. 2544--2552.Google ScholarGoogle ScholarCross RefCross Ref
  34. Kingma, D. P., and Ba, J. Adam: A method for stochastic optimization. Computer Science (2014).Google ScholarGoogle Scholar
  35. Krol, K., Parkin, S., and Sasse, M. A. Better the devil you know: A user study of two captchas and a possible replacement technology. In NDSS Workshop on Usable Security (2016).Google ScholarGoogle ScholarCross RefCross Ref
  36. Le, T. A., Baydin, A. G., Zinkov, R., and Wood, F. Using synthetic data to train neural networks is model-based reasoning. In International Joint Conference on Neural Networks (2017), pp. 3514--3521.Google ScholarGoogle Scholar
  37. Lea, C., Vidal, R., Reiter, A., and Hager, G. D. Temporal convolutional networks: A unified approach to action segmentation. In European Conference on Computer Vision (2016), pp. 47--54.Google ScholarGoogle ScholarCross RefCross Ref
  38. Lecun, Y., Bottou, L., Bengio, Y., and Haffner, P. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86, 11 (1998), 2278--2324.Google ScholarGoogle ScholarCross RefCross Ref
  39. Li, J., Monroe, W., Shi, T., Jean, S., Ritter, A., and Jurafsky, D. Adversarial learning for neural dialogue generation.Google ScholarGoogle Scholar
  40. Meutzner, H., and Kolossa, D. Reducing the cost of breaking audio captchas by active and semi-supervised learning. In International Conference on Machine Learning and Applications (2014), pp. 67--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Miyato, T., Maeda, S., Koyama, M., Nakae, K., and Ishii, S. Distributional smoothing by virtual adversarial examples. arXiv (2015).Google ScholarGoogle Scholar
  42. Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., and Riedmiller, M. Playing atari with deep reinforcement learning. arXiv (2013).Google ScholarGoogle Scholar
  43. Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., Kumaraguru, P., Oorschot, P. C. V., and Chen, W. B. A three-way investigation of a game-captcha:automated attacks, relay attacks and usability. In ACM Symposium on Information, Computer and Communications Security (2014), pp. 195--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Mohameda, M., Gaob, S., Sachdevac, N., Saxena, N., Zhangd, C., Kumaraguruc, P., and Oorschote, P. C. V. On the security and usability of dynamic cognitive game captchas. Journal of Computer Security (2017), 1--26.Google ScholarGoogle Scholar
  45. Ogilvie, W. F., Petoumenos, P., Wang, Z., and Leather, H. Fast automatic heuristic construction using active learning. In International Workshop on Languages and Compilers for Parallel Computing (2014), pp. 146--160.Google ScholarGoogle Scholar
  46. Ogilvie, W. F., Petoumenos, P., Wang, Z., and Leather, H. Minimizing the cost of iterative compilation with active learning. In Proceedings of the 2017 International Symposium on Code Generation and Optimization (2017), CGO '17, pp. 245--256. Google ScholarGoogle Scholar
  47. Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., and Pérez-Cabo, D. No bot expects the deepcaptcha! introducing immutable adversarial examples, with applications to captcha generation. IEEE Transactions on Information Forensics & Security PP, 99 (2017), 1--1.Google ScholarGoogle Scholar
  48. Pan, S. J., and Yang, Q. A survey on transfer learning. IEEE Transactions on Knowledge & Data Engineering 22, 10 (2010), 1345--1359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Rosenberg, I., Shabtai, A., Rokach, L., and Elovici, Y. Generic black-box end-to-end attack against rnns and other api calls based malware classifiers. arXiv (2017).Google ScholarGoogle Scholar
  50. Schlaikjer, A. A dual-use speech captcha: Aiding visually impaired web users while providing transcriptions of audio streams. LTI (2010).Google ScholarGoogle Scholar
  51. Shahzad, M., Liu, A. X., and Samuel, A. Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Transactions on Mobile Computing 16, 10 (2017), 2726--2741.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Shrivastava, A., Pfister, T., Tuzel, O., Susskind, J., Wang, W., and Webb, R. Learning from simulated and unsupervised images through adversarial training. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017).Google ScholarGoogle ScholarCross RefCross Ref
  53. Simonyan, K., and Zisserman, A. Very deep convolutional networks for large-scale image recognition. Computer Science (2014).Google ScholarGoogle Scholar
  54. Sivakorn, S., Polakis, I., and Keromytis, A. D. I am robot: (deep) learning to break semantic image captchas. In IEEE European Symposium on Security and Privacy (2016), pp. 388--403.Google ScholarGoogle ScholarCross RefCross Ref
  55. Stark, F., Hazirbas, C., Triebel, R., and Cremers, D. Captcha recognition with active deep learning. In German Conference on Pattern Recognition Workshop (2015).Google ScholarGoogle Scholar
  56. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and Wojna, Z. Rethinking the inception architecture for computer vision. Computer Science (2015), 2818--2826.Google ScholarGoogle Scholar
  57. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. Intriguing properties of neural networks. Computer Science (2013).Google ScholarGoogle Scholar
  58. Tam, J., Simsa, J., Hyde, S., and Ahn, L. V. Breaking audio captchas. In Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December (2008), pp. 1625--1632. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Von Ahn, L., Blum, M., Hopper, N. J., and Langford, J. CAPTCHA: Using Hard AI Problems for Security. Springer Berlin Heidelberg, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Von Ahn, L., Blum, M., and Langford, J. Telling humans and computers apart automatically. Communications of the ACM 47, 2 (2004), 56--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Xu, W., Qi, Y., and Evans, D. Automatically evading classifiers: A case study on pdf malware classifiers. In Network and Distributed System Security Symposium (2016).Google ScholarGoogle ScholarCross RefCross Ref
  62. Xu, Y., Reynaga, G., Chiasson, S., Frahm, J.-M., Monrose, F., and Van Oorschot, P. C. Security analysis and related usability of motion-based captchas: Decoding codewords in motion. IEEE transactions on dependable and secure computing 11, 5 (2014), 480--493.Google ScholarGoogle Scholar
  63. Yan, J., and Ahmad, A. S. E. Breaking visual captchas with naive pattern recognition algorithms. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual (2007), pp. 279--291.Google ScholarGoogle ScholarCross RefCross Ref
  64. Yan, J., and Ahmad, A. S. E. A low-cost attack on a microsoft captcha. In ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, Usa, October (2008), pp. 543--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Yosinski, J., Clune, J., Bengio, Y., and Lipson, H. How transferable are features in deep neural networks? In Advances in neural information processing systems (2014), pp. 3320--3328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Yu, L., Zhang, W., Wang, J., and Yu, Y. Seqgan: Sequence generative adversarial nets with policy gradient.Google ScholarGoogle Scholar
  67. Zhu, J.-Y., Park, T., Isola, P., and Efros, A. A. Unpaired image-to-image translation using cycle-consistent adversarial networks. arXiv preprint arXiv:1703.10593 (2017).Google ScholarGoogle Scholar

Index Terms

  1. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
        October 2018
        2359 pages
        ISBN:9781450356930
        DOI:10.1145/3243734

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 October 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '18 Paper Acceptance Rate134of809submissions,17%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader