{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:56Z","timestamp":1774946576869,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:00:00Z","timestamp":1571875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,24]]},"DOI":"10.1145\/3308561.3353777","type":"proceedings-article","created":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T19:04:48Z","timestamp":1571943888000},"page":"355-366","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Automatic Generation and Evaluation of Usable and Secure Audio reCAPTCHA"],"prefix":"10.1145","author":[{"given":"Mohit","family":"Jain","sequence":"first","affiliation":[{"name":"Microsoft Research, Bangalore, India"}]},{"given":"Rohun","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Amazon GO, Seattle, WA, USA"}]},{"given":"Ishita","family":"Bhansali","sequence":"additional","affiliation":[{"name":"Infosys, Bangalore, India"}]},{"given":"Pratyush","family":"Kumar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_2_1","volume-title":"Old Time Radio. (2017). Retrieved","author":"Archive Internet","year":"2017","unstructured":"Internet Archive. 2017a. Old Time Radio. (2017). Retrieved Jan 4, 2017 from https:\/\/archive.org\/details\/oldtimeradio"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Archive Internet","year":"2017","unstructured":"Internet Archive. 2017b. Podcasts. (2017). Retrieved Jan 4, 2017 from https:\/\/archive.org\/details\/audio_podcast"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_3_2_1_5_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Bock Kevin","year":"2017","unstructured":"Kevin Bock, Daven Patel, George Hughey, and Dave Levin. 2017. unCaptcha: A Low-Resource Defeat of reCaptchatextquoterights Audio Challenge. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/bock"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.14"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT'09)","author":"Bursztein Elie","year":"2009","unstructured":"Elie Bursztein and Steven Bethard. 2009. Decaptcha: Breaking 75% of eBay Audio CAPTCHAs. In Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT'09). USENIX Association, Berkeley, CA, USA, 8--8. http:\/\/dl.acm.org\/citation.cfm?id=1855876.1855884"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"e_1_3_2_1_9_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 513--530. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_1_10_1","volume-title":"Google Cloud Speech API. (2017). Retrieved","author":"Cloud Google","year":"2017","unstructured":"Google Cloud. 2017. Google Cloud Speech API. (2017). Retrieved Jan 1, 2017 from https:\/\/cloud.google.com\/speech\/"},{"key":"e_1_3_2_1_11_1","unstructured":"William Haack Madeleine Severance Michael Wallace and Jeremy Wohlwend. 2017. Security Analysis of the Amazon Echo. (2017) 1--14."},{"key":"e_1_3_2_1_12_1","volume-title":"Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Advances in psychology 52","author":"Hart Sandra G","year":"1988","unstructured":"Sandra G Hart and Lowell E Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Advances in psychology 52 (1988), 139--183."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/eye.2017.165"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296894"},{"key":"e_1_3_2_1_15_1","volume-title":"IBM Watson Speech to Text. (2017). Retrieved","author":"IBM.","year":"2017","unstructured":"IBM. 2017. IBM Watson Speech to Text. (2017). Retrieved Jan 1, 2017 from https:\/\/www.ibm.com\/watson\/services\/speech-to-text\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Amazon Mechanical Turk. (2017). Retrieved","author":"Amazon Inc. 2017a.","year":"2017","unstructured":"Amazon Inc. 2017a. Amazon Mechanical Turk. (2017). Retrieved June 1, 2017 from https:\/\/www.mturk.com\/mturk\/welcome"},{"key":"e_1_3_2_1_17_1","volume-title":"Blindness Solutions: JAWS.","author":"Freedom Scientific Inc.","year":"2017","unstructured":"Freedom Scientific Inc. 2017b. Blindness Solutions: JAWS. (2017). Retrieved Nov 5, 2017 from http:\/\/www.freedomscientific.com\/Products\/Blindness\/JAWS"},{"key":"e_1_3_2_1_18_1","volume-title":"POSTER: Assessing the Usability of the new Radio Clip-Based Human Interaction Proofs.","author":"Lazar Jonathan","year":"2010","unstructured":"Jonathan Lazar, Jinjuan Feng, Olusegun Adelegan, Anna Giller, Andrew Hardsock, Ron Horney, Ryan Jacob, Edward Kosiba, Gregory Martin, Monica Misterka, Ashley O'Connor, Andrew Pr\"ack, Roland Roberts, Gabe Piunti, Robert Schober, Matt Weatherholtz, and Eric Weaver. 2010. POSTER: Assessing the Usability of the new Radio Clip-Based Human Interaction Proofs."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208385"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702127"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2856820"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664262"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Mizrahi Yair","year":"2017","unstructured":"Yair Mizrahi. 2017. ReBreakCaptcha: Breaking Google's ReCaptcha v2 using Google. (2017). Retrieved Mar 18, 2018 from https:\/\/east-ee.com\/2017\/02\/28\/rebreakcaptcha-breaking-googles-recaptcha-v2-using-google\/"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Project NLTK","year":"2017","unstructured":"NLTK Project. 2017. Natural Language Toolkit. (2017). Retrieved Jan 15, 2017 from http:\/\/www.nltk.org\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.682181"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525194.2525265"},{"key":"e_1_3_2_1_29_1","volume-title":"Okuno","author":"Sano Shotaro","year":"2013","unstructured":"Shotaro Sano, Takuma Otsuka, and Hiroshi G. Okuno. 2013. Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition. In Advances in Information and Computer Security. Springer Berlin Heidelberg, Berlin, Heidelberg, 36--52."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 4th Symposium on Usability, Privacy and Security (SOUPS'08)","author":"Sauer Graig","year":"2008","unstructured":"Graig Sauer, Harry Hochheiser, Jinjuan Feng, and Jonathan Lazar. 2008. Towards a Universally Usable CAPTCHA. In Proceedings of the 4th Symposium on Usability, Privacy and Security (SOUPS'08). ACM, New York, NY, USA, 2."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-009-0171--2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1786774.1786776"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481295"},{"key":"e_1_3_2_1_34_1","volume-title":"Retrieved","author":"Shires Glen","year":"2017","unstructured":"Glen Shires. 2017. Voice Driven Web Apps: Introduction to the Web Speech API. (2017). Retrieved Jan 15, 2017 from https:\/\/developers.google.com\/web\/updates\/2013\/01\/Voice-Driven-Web-Apps-Introduction-to-the-Web-Speech-API"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981983"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 4th Symposium on Usability, Privacy and Security (SOUPS'08)","author":"Tam Jennifer","year":"2008","unstructured":"Jennifer Tam, Jiri Simsa, David Huggins-Daines, Luis Von Ahn, and Manuel Blum. 2008b. Improving Audio CAPTCHAs. In Proceedings of the 4th Symposium on Usability, Privacy and Security (SOUPS'08). ACM, New York, NY, USA, 2."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025640"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.912893"}],"event":{"name":"ASSETS '19: The 21st International ACM SIGACCESS Conference on Computers and Accessibility","location":"Pittsburgh PA USA","acronym":"ASSETS '19","sponsor":["SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the 21st International ACM SIGACCESS Conference on Computers and Accessibility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308561.3353777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308561.3353777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:35Z","timestamp":1750204415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308561.3353777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,24]]},"references-count":40,"alternative-id":["10.1145\/3308561.3353777","10.1145\/3308561"],"URL":"https:\/\/doi.org\/10.1145\/3308561.3353777","relation":{},"subject":[],"published":{"date-parts":[[2019,10,24]]},"assertion":[{"value":"2019-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}