2

A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices

Towards Understanding the Security of Modern Image Captchas and Underground Captcha-solving Services