Countering automated exploits with system security CAPTCHAS

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users can do everything necessary to fulfil their tasks with the computer. The disadvantage is that every program running in the users context can make arbitrary modifications to the system. Malicious programs and scripts often take advantage of this and silently change important parameters. We propose to verify that these changes were initiated by a human by a ceremony making use of a CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart). We compare this approach with other methods of achieving the same goal, i.e. passwords, secure path and access control based on zone of origin of the code. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Gunawardena, D., Scott, J., Zugenmaier, A., & Donnelly, A. (2007). Countering automated exploits with system security CAPTCHAS. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4631 LNCS, pp. 162–169). Springer Verlag. https://doi.org/10.1007/978-3-540-77156-2_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free