Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez
{"title":"Vulnerabilities of biometric systems integrated in mobile devices: An evaluation","authors":"Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez","doi":"10.1109/CCST.2016.7815677","DOIUrl":null,"url":null,"abstract":"With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815677","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.