{"id":"https://openalex.org/W4416189841","doi":"https://doi.org/10.48550/arxiv.2511.07841","title":"CAHICHA: Computer Automated Hardware Interaction test to tell Computer and Humans Apart","display_name":"CAHICHA: Computer Automated Hardware Interaction test to tell Computer and Humans Apart","publication_year":2025,"publication_date":"2025-11-11","ids":{"openalex":"https://openalex.org/W4416189841","doi":"https://doi.org/10.48550/arxiv.2511.07841"},"language":null,"primary_location":{"id":"pmh:oai:arXiv.org:2511.07841","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.07841","pdf_url":"https://arxiv.org/pdf/2511.07841","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2511.07841","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027239805","display_name":"Aditya Mitra","orcid":"https://orcid.org/0000-0002-9612-0810"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mitra, Aditya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076304950","display_name":"Sibi Chakkaravarthy Sethuraman","orcid":"https://orcid.org/0000-0001-7778-0453"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sethuraman, Sibi Chakkaravarthy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5061002643","display_name":"Devi Priya V S","orcid":"https://orcid.org/0000-0002-0230-9779"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S, Devi Priya V","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027239805"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.8715999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.8715999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12128","display_name":"AI in Service Interactions","score":0.012600000016391277,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10667","display_name":"Emotion and Mood Recognition","score":0.009100000374019146,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/captcha","display_name":"CAPTCHA","score":0.6858000159263611},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6700000166893005},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.47839999198913574},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.4564000070095062},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.3571000099182129},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3544999957084656},{"id":"https://openalex.org/keywords/human-intelligence","display_name":"Human intelligence","score":0.33719998598098755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7736999988555908},{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.6858000159263611},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6700000166893005},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5184000134468079},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.47839999198913574},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.4564000070095062},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36070001125335693},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3571000099182129},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C105409693","wikidata":"https://www.wikidata.org/wiki/Q5937824","display_name":"Human intelligence","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.29440000653266907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2892000079154968},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C159437735","wikidata":"https://www.wikidata.org/wiki/Q1519524","display_name":"Gesture recognition","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C161759796","wikidata":"https://www.wikidata.org/wiki/Q3982902","display_name":"Teleoperation","level":3,"score":0.26339998841285706},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26260000467300415}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2511.07841","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.07841","pdf_url":"https://arxiv.org/pdf/2511.07841","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2511.07841","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.07841","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2511.07841","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.07841","pdf_url":"https://arxiv.org/pdf/2511.07841","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4416189841.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"automation":[1],"bot":[2],"technology":[3],"and":[4,17,25,35,44,60,105,125,149,156,172,192],"Artificial":[5,28],"Intelligence":[6,29],"is":[7],"evolving":[8],"rapidly,":[9],"conventional":[10,98],"human":[11,40,71,84,103,197],"verification":[12,198],"techniques":[13],"like":[14,41,53],"voice":[15],"CAPTCHAs":[16],"knowledge-based":[18],"authentication":[19],"are":[20],"becoming":[21],"less":[22],"effective.":[23],"Bots":[24],"scrapers":[26],"with":[27],"(AI)":[30],"capabilities":[31],"can":[32],"now":[33],"detect":[34],"solve":[36],"visual":[37],"challenges,":[38],"emulate":[39],"typing":[42],"patterns,":[43],"avoid":[45],"most":[46],"security":[47],"tests,":[48],"leading":[49],"to":[50,91,97,116,128],"high-volume":[51],"threats":[52],"credential":[54],"stuffing,":[55],"account":[56],"abuse,":[57],"ad":[58],"fraud,":[59],"automated":[61,133],"scalping.":[62],"This":[63],"leaves":[64],"a":[65,78,106,123,188],"vital":[66],"gap":[67],"in":[68,144],"identifying":[69],"real":[70,83],"users":[72,85,131],"versus":[73],"advanced":[74],"bots.":[75],"We":[76],"present":[77],"novel":[79],"technique":[80],"for":[81,195],"distinguishing":[82],"based":[86],"on":[87],"hardware":[88,115],"interaction":[89],"signals":[90],"address":[92],"this":[93],"issue.":[94],"In":[95],"contrast":[96],"approaches,":[99],"our":[100],"method":[101],"leverages":[102],"interactions":[104],"cryptographically":[107],"attested":[108],"User":[109],"Presence":[110],"(UP)":[111],"flag":[112],"from":[113,132],"trusted":[114],"verify":[117],"genuine":[118],"physical":[119],"user":[120,163],"engagement":[121],"providing":[122],"secure":[124],"reliable":[126],"way":[127],"distinguish":[129],"authentic":[130],"bots":[134],"or":[135],"scripted":[136],"routines.":[137],"The":[138,151],"suggested":[139,185],"approach":[140],"was":[141],"thoroughly":[142],"assessed":[143],"terms":[145],"of":[146],"performance,":[147],"usability,":[148],"security.":[150],"system":[152,186],"demonstrated":[153],"consistent":[154],"throughput":[155],"zero":[157],"request":[158],"failures":[159],"under":[160],"prolonged":[161],"concurrent":[162],"demand,":[164],"indicating":[165],"good":[166],"operational":[167],"reliability,":[168],"efficient":[169],"load":[170],"handling,":[171],"the":[173,181,184],"underlying":[174],"architecture's":[175],"robustness.":[176],"These":[177],"thorough":[178],"analyses":[179],"support":[180],"conclusion":[182],"that":[183],"provides":[187],"safer,":[189],"more":[190],"effective,":[191],"easier-to-use":[193],"substitute":[194],"current":[196],"methods.":[199]},"counts_by_year":[],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-11-13T00:00:00"}
