Abstract
This talk is about putting the human in the loop, or rather making sure that there is a human in the loop. Sometimes we have this feeling that, while we’re still responsible for what the computer does, we don’t have control over what it does, and it would be nice to make sure that at least some human has seen what goes on. So this is about countering automated exploits with system security CAPTCHAs, I know it is a bad idea to have an acronym in the title but I was at Microsoft Research when we did this work. CAPTCHA for those of you who don’t know, it is a Completely Automated Public Turing Test to Tell Computers and Humans Apart.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zugenmaier, A. (2007). Countering Automated Exploits with System Security CAPTCHAS. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-77156-2_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77155-5
Online ISBN: 978-3-540-77156-2
eBook Packages: Computer ScienceComputer Science (R0)