[go: up one dir, main page]

Toli et al., 2015 - Google Patents

Provoking security: Spoofing attacks against crypto-biometric systems

Toli et al., 2015

View PDF
Document ID
3938108679916804821
Author
Toli C
Preneel B
Publication year
Publication venue
2015 World Congress on Internet Security (WorldCIS)

External Links

Snippet

Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Dasgupta et al. Advances in user authentication
Jain Biometric recognition: how do I know who you are?
Dinca et al. The fall of one, the rise of many: a survey on multi-biometric fusion methods
Uludag et al. Attacks on biometric systems: a case study in fingerprints
Kaur et al. Biometric template protection using cancelable biometrics and visual cryptography techniques
Ahmad et al. Technical issues and challenges of biometric applications as access control tools of information security
Matyas Jr et al. A biometric standard for information management and security
Xiao Security issues in biometric authentication
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Matyáš et al. Security of biometric authentication systems
Maltoni et al. Securing fingerprint systems
Habibu et al. Assessment of vulnerabilities of the biometric template protection mechanism
Toli et al. Provoking security: Spoofing attacks against crypto-biometric systems
Ratha Privacy protection in high security biometrics applications
Ashish et al. Biometric Temp
Oluwadamilola et al. An improved authentication system using hybrid of biometrics and cryptography
Toli Secure and Privacy-Preserving Biometric Systems
Choudhry et al. Security and privacy issues in ai-based biometric systems
Toli et al. A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks
Cimato et al. Biometrics and privacy
Nabil et al. Threats models on biometri systems: A comparative study
Emmanuel et al. Vulnerability of Biometric Authentication System
Jain et al. Signal processing for biometric systems [DSP Forum]
Furnell Biometric Technology and User Identity
Menakadevi et al. Biometric System Attacks-A Case Study