Abstract | ||
---|---|---|
AbstractIn this paper, we propose a novel security protocol for the implementation of CAPTCHA tests that feature advance mechanisms against man-in-the-middle MITM, for short attacks. This type of attack is fulfilled by a malicious entity, the MITM, that leverages on unaware users to mass-solve CAPTCHA tests shielding the access to a service. The protocol that we propose uses collision-resistant hash functions modeled as random oracles to guarantee that the solution to a CAPTCHA test solved by an end user is valid only for the server to which the user is connected to. This will prevent MITM attacks because the user is not directly connected to the server. We developed a reference implementation for our protocol that has a low impact and is easy to use, featuring a software plug-in running in the Firefox web browser, on the client side, and a Java servlet-based application, on the server side. Copyright © 2013 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1002/sec.825 | Periodicals |
Keywords | Field | DocType |
CAPTCHA,cryptographic protocols,Internet technologies | Server-side,Client-side,Java servlet,Man-in-the-middle attack,Cryptographic protocol,Computer science,Computer security,Computer network,Reference implementation,Hash function,CAPTCHA | Journal |
Volume | Issue | ISSN |
7 | 8 | 1939-0114 |
Citations | PageRank | References |
1 | 0.35 | 17 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Umberto Ferraro Petrillo | 1 | 198 | 24.16 |
Giovanni Mastroianni | 2 | 1 | 0.35 |
Ivan Visconti | 3 | 612 | 40.30 |