{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:10Z","timestamp":1750220170969,"version":"3.41.0"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JCLM","award":["SBPLY\/19\/180501\/000024"],"award-info":[{"award-number":["SBPLY\/19\/180501\/000024"]}]},{"DOI":"10.13039\/501100004837","name":"Spanish Ministry of Science and Innovation","doi-asserted-by":"crossref","award":["PID2019-109891RB-I00"],"award-info":[{"award-number":["PID2019-109891RB-I00"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Spanish Ministry of Sciences, Innovation, and Universities","award":["PRX18\/00563"],"award-info":[{"award-number":["PRX18\/00563"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2023,2,28]]},"abstract":"<jats:p>In this article, we present fundamental design flaws of CaptchaStar. We also present a full analysis using the BASECASS methodology that employs machine learning techniques. By means of this methodology, we find an attack that bypasses CaptchaStar with almost 100% accuracy.<\/jats:p>","DOI":"10.1145\/3546867","type":"journal-article","created":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T11:19:28Z","timestamp":1662117568000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Breaking CaptchaStar Using the BASECASS Methodology"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8070-9586","authenticated-orcid":false,"given":"Carlos","family":"Hern\u00e1ndez-Castro","sequence":"first","affiliation":[{"name":"Universidad de Alcal\u00e1, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3601-3052","authenticated-orcid":false,"given":"David F.","family":"Barrero","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7024-0427","authenticated-orcid":false,"given":"Maria Dolores","family":"R-Moreno","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1 and Netherlands Organisation for Applied Scientific (TNO), Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,2,27]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"611","volume-title":"CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery","author":"Conti Mauro","year":"2016","unstructured":"Mauro Conti, Claudio Guarisco, and Riccardo Spolaor. 2016. CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. Springer International, Guildford, UK, 611\u2013628."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572585"},{"key":"e_1_3_1_4_2","volume-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy","author":"Gougeon Thomas","year":"2019","unstructured":"Thomas Gougeon and Patrick Lacharme. 2019. How to break CaptchaStar. In Proceedings of the 4th International Conference on Information Systems Security and Privacy."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_4"},{"key":"e_1_3_1_6_2","volume-title":"Coding and Information Theory","author":"Hamming Richard W.","year":"1980","unstructured":"Richard W. Hamming. 1980. Coding and Information Theory. Prentice Hall."},{"key":"e_1_3_1_7_2","volume-title":"Where Do CAPTCHAs Fail: A Study in Common Pitfalls in CAPTCHA Design and How to Avoid Them","author":"Hern\u00e1ndez-Castro C. J.","year":"2017","unstructured":"C. J. Hern\u00e1ndez-Castro. 2017. Where Do CAPTCHAs Fail: A Study in Common Pitfalls in CAPTCHA Design and How to Avoid Them. Ph.D. Dissertation. University of Alcala."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103018"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.127"},{"key":"e_1_3_1_10_2","volume-title":"The Art of Computer Programming, Volume 2: Seminumerical Algorithms","author":"Knuth Donald E.","year":"2005","unstructured":"Donald E. Knuth. 2005. The Art of Computer Programming, Volume 2: Seminumerical Algorithms. Addison-Wesley Professional."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1618452.1618509"},{"key":"e_1_3_1_12_2","article-title":"Verification of a Human in the Loop or Identification via the Turing Test","author":"Naor Moni","year":"1996","unstructured":"Moni Naor. 1996. Verification of a Human in the Loop or Identification via the Turing Test. Retrieved September 3, 2022 from https:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human.pdf","journal-title":"https:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human.pdf"},{"key":"e_1_3_1_13_2","unstructured":"Mitsuo Okada and William H. Saito. 2016. Capy Risk-Based Authentication. Retrieved September 3 2022 from https:\/\/www.capy.me\/products\/risk_based_authentication\/"},{"key":"e_1_3_1_14_2","unstructured":"Vinay Shet. 2014. Are You a Robot? Introducing \u201cNo CAPTCHA reCAPTCHA.\u201d Retrieved September 3 2022 from https:\/\/security.googleblog.com\/2014\/12\/are-you-robot-introducing-no-captcha.html."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Luis Von Ahn Manuel Blum Nicholas J. Hopper and John Langford. 2003. CAPTCHA: Using hard AI problems for security. In Advances in Cryptology\u2014EUROCRYPT\u201903 . Lecture Notes in Computer Science Vol. 2656. Springer 294\u2013311.","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_1_17_2","unstructured":"John Walker. 2008. ENT: A Pseudorandom Number Sequence Test Program. Retrieved September 3 2022 from http:\/\/www.fourmilab.ch\/random\/."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2019.9020001"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866329"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:41Z","timestamp":1750186841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,27]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2,28]]}},"alternative-id":["10.1145\/3546867"],"URL":"https:\/\/doi.org\/10.1145\/3546867","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2023,2,27]]},"assertion":[{"value":"2019-12-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}