{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:59:41Z","timestamp":1756897181030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3128572.3140443","type":"proceedings-article","created":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T12:36:10Z","timestamp":1509712570000},"page":"69-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["In (Cyber)Space Bots Can Hear You Speak"],"prefix":"10.1145","author":[{"given":"Saumya","family":"Solanki","sequence":"first","affiliation":[{"name":"University of Illinois, Chicago, Chicago, IL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gautam","family":"Krishnan","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, Chicago, IL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Varshini","family":"Sampath","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, Chicago, IL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, Chicago, IL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2008. ZDNet - Inside India's CAPTCHA solving economy. (2008). http:\/\/www.zdnet.com\/article\/inside-indias-captcha-solving-economy\/.  2008. ZDNet - Inside India's CAPTCHA solving economy. (2008). http:\/\/www.zdnet.com\/article\/inside-indias-captcha-solving-economy\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"2012. David Pogue - Time to Kill Off Captchas. (2012). https:\/\/www.scientificamerican.com\/article\/time-to-kill-off-captchas\/.  2012. David Pogue - Time to Kill Off Captchas. (2012). https:\/\/www.scientificamerican.com\/article\/time-to-kill-off-captchas\/.","DOI":"10.1038\/scientificamerican0312-23"},{"key":"e_1_3_2_1_3_1","unstructured":"2014. PopTech - Luis von Ahn: CAPTCHAs' My fault.. (2014). https:\/\/poptech.org\/blog\/luis_von_ahn_captchas_my_fault.  2014. PopTech - Luis von Ahn: CAPTCHAs' My fault.. (2014). https:\/\/poptech.org\/blog\/luis_von_ahn_captchas_my_fault."},{"key":"e_1_3_2_1_4_1","unstructured":"2014. World Health Organization - Visual Impairment and Blindness. (2014). http:\/\/www.who.int\/mediacentre\/factsheets\/fs282\/en\/.  2014. World Health Organization - Visual Impairment and Blindness. (2014). http:\/\/www.who.int\/mediacentre\/factsheets\/fs282\/en\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. Reaching new records in speech recognition. (2017). https:\/\/www.ibm.com\/blogs\/watson\/2017\/03\/reaching-new-records-in-speech-recognition\/.  2017. Reaching new records in speech recognition. (2017). https:\/\/www.ibm.com\/blogs\/watson\/2017\/03\/reaching-new-records-in-speech-recognition\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. SeleniumHQ - Browser Automation. (2017). http:\/\/www.seleniumhq.org\/.  2017. SeleniumHQ - Browser Automation. (2017). http:\/\/www.seleniumhq.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Windows GUI Automation with Python. (2017). https:\/\/github.com\/pywinauto\/pywinauto.  2017. Windows GUI Automation with Python. (2017). https:\/\/github.com\/pywinauto\/pywinauto."},{"key":"e_1_3_2_1_8_1","volume-title":"OSDI","volume":"16","author":"Abadi Mart\u00edn","year":"2016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352287"},{"volume-title":"ACM","author":"Jeffrey","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Kevin Bock Daven Patel George Hughey and Dave Levin. unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge 11th USENIX Workshop on Offensive Technologies (WOOT 17).  Kevin Bock Daven Patel George Hughey and Dave Levin. unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge 11th USENIX Workshop on Offensive Technologies (WOOT 17)."},{"volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Bursztein Elie","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.14"},{"volume-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT'09)","author":"Bursztein Elie","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"volume-title":"Mary Czerwinski. Designing Human Friendly Human Interaction Proofs (HIPs) CHI '05","author":"Chellapilla Kumar","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_23"},{"volume-title":"CoRR '13","author":"Goodfellow Ian J.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"Google Online Security Blog. 2014. Are you a robot? Introducing \"No CAPTCHA reCAPTCHA\". (2014). http:\/\/googleonlinesecurity.blogspot.com\/2014\/12\/are-you-robot-introducing-no-captcha.html.  Google Online Security Blog. 2014. Are you a robot? Introducing \"No CAPTCHA reCAPTCHA\". (2014). http:\/\/googleonlinesecurity.blogspot.com\/2014\/12\/are-you-robot-introducing-no-captcha.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296894"},{"volume-title":"CCS '07","author":"Jeremy Elson","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23013"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.57"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208385"},{"volume-title":"Symposium on Accessible Privacy and Security (SOAPS). 1--2.","year":"2008","author":"Markkola Anu","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664262"},{"key":"e_1_3_2_1_28_1","unstructured":"Manar Mohamed Song Gao Niharika Sachdeva Nitesh Saxena Chengcui Zhang Ponnurangam Kumaraguru and Paul C. Van Oorschot. 2017. On the security and usability of dynamic cognitive game CAPTCHAs. Journal of Computer Security Preprint (2017) 1--26.  Manar Mohamed Song Gao Niharika Sachdeva Nitesh Saxena Chengcui Zhang Ponnurangam Kumaraguru and Paul C. Van Oorschot. 2017. On the security and usability of dynamic cognitive game CAPTCHAs. Journal of Computer Security Preprint (2017) 1--26."},{"volume-title":"USENIX Security '10","author":"Motoyama Marti","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"Casey O'Callaghan. 2009. Auditory perception. (2009).  Casey O'Callaghan. 2009. Auditory perception. (2009)."},{"key":"e_1_3_2_1_31_1","volume-title":"CAPTCHuring Automated (Smart) Phone Attacks. SysSec Workshop","volume":"0","author":"Polakis Iasonas","year":"2011"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41383-4_3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"George Saon Gakuto Kurata Tom Sercu Kartik Audhkhasi Samuel Thomas Dimitrios Dimitriadis Xiaodong Cui Bhuvana Ramabhadran Michael Picheny Lynn-Li Lim and others. 2017. English conversational telephone speech recognition by humans and machines. arXiv preprint arXiv:1703.02136 (2017).  George Saon Gakuto Kurata Tom Sercu Kartik Audhkhasi Samuel Thomas Dimitrios Dimitriadis Xiaodong Cui Bhuvana Ramabhadran Michael Picheny Lynn-Li Lim and others. 2017. English conversational telephone speech recognition by humans and machines. arXiv preprint arXiv:1703.02136 (2017).","DOI":"10.21437\/Interspeech.2017-405"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 4th Symposium on Usable Privacy and Security","volume":"6","author":"Sauer Graig","year":"2008"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2008.02.003"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046704"},{"volume-title":"Proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroSP '16').","author":"Sivakorn Suphannee","key":"e_1_3_2_1_38_1"},{"volume-title":"Symposium On Usable Privacy and Security (SOUPS).","year":"2008","author":"Tam Jennifer","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","unstructured":"Jennifer Tam Jiri Simsa Sean Hyde and Luis V Ahn. 2009. Breaking audio captchas. In Advances in Neural Information Processing Systems. 1625--1632.  Jennifer Tam Jiri Simsa Sean Hyde and Luis V Ahn. 2009. Breaking audio captchas. In Advances in Neural Information Processing Systems. 1625--1632."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"volume-title":"John Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT '03","author":"von Ahn Luis","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3128572.3140443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3128572.3140443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:01Z","timestamp":1750212661000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3128572.3140443"}},"subtitle":["Breaking Audio CAPTCHAs Using OTS Speech Recognition"],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":42,"alternative-id":["10.1145\/3128572.3140443","10.1145\/3128572"],"URL":"https:\/\/doi.org\/10.1145\/3128572.3140443","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}