减轻生物识别认证中活性检测组件之间不希望的交互

Emma Lavens, D. Preuveneers, W. Joosen
{"title":"减轻生物识别认证中活性检测组件之间不希望的交互","authors":"Emma Lavens, D. Preuveneers, W. Joosen","doi":"10.1145/3600160.3604992","DOIUrl":null,"url":null,"abstract":"Biometric authentication has made great strides throughout the years thanks to better hardware and software support. However, attackers are unrelenting in finding new ways to spoof a subject, hereby breaking existing presentation attack detection schemes. Similar to combining multiple authentication factors, a combination of liveness detection defenses is expected to strengthen security against spoofing attacks. The problem that we address is that many defenses have only been evaluated in isolation or in ideal circumstances. In this work, we demonstrate how different liveness components for face authentication can interfere with one another, thereby jeopardizing security. Furthermore, contextual and environmental influences can endanger their robustness. In this work, we propose a security framework for biometric authentication that supports adaptive liveness detection by reasoning upon undesired interactions between defenses, the impact of new attacks, and the context in which they emerge. We validate the flexibility of our framework to account for both historic and novel interplays between attacks and defenses. Our experiments show that our framework effectively accounts for undesired interactions while only incurring a limited and acceptable performance overhead.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mitigating undesired interactions between liveness detection components in biometric authentication\",\"authors\":\"Emma Lavens, D. Preuveneers, W. Joosen\",\"doi\":\"10.1145/3600160.3604992\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometric authentication has made great strides throughout the years thanks to better hardware and software support. However, attackers are unrelenting in finding new ways to spoof a subject, hereby breaking existing presentation attack detection schemes. Similar to combining multiple authentication factors, a combination of liveness detection defenses is expected to strengthen security against spoofing attacks. The problem that we address is that many defenses have only been evaluated in isolation or in ideal circumstances. In this work, we demonstrate how different liveness components for face authentication can interfere with one another, thereby jeopardizing security. Furthermore, contextual and environmental influences can endanger their robustness. In this work, we propose a security framework for biometric authentication that supports adaptive liveness detection by reasoning upon undesired interactions between defenses, the impact of new attacks, and the context in which they emerge. We validate the flexibility of our framework to account for both historic and novel interplays between attacks and defenses. Our experiments show that our framework effectively accounts for undesired interactions while only incurring a limited and acceptable performance overhead.\",\"PeriodicalId\":107145,\"journal\":{\"name\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 18th International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3600160.3604992\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 18th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3600160.3604992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

由于更好的硬件和软件支持,生物识别认证在过去几年里取得了巨大的进步。然而,攻击者不断地寻找新的欺骗主题的方法,从而破坏现有的表示攻击检测方案。与组合多个身份验证因素类似,活动检测防御的组合有望增强抵御欺骗攻击的安全性。我们要解决的问题是,许多防御措施只在孤立的情况下或在理想的情况下进行了评估。在这项工作中,我们展示了面部认证的不同活动组件如何相互干扰,从而危及安全性。此外,上下文和环境影响可能危及它们的稳健性。在这项工作中,我们提出了一个用于生物识别身份验证的安全框架,该框架通过推理防御之间的非期望交互,新攻击的影响以及它们出现的背景来支持自适应活动检测。我们验证了框架的灵活性,以解释攻击和防御之间的历史和新的相互作用。我们的实验表明,我们的框架有效地解释了不希望的交互,同时只产生有限的和可接受的性能开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Mitigating undesired interactions between liveness detection components in biometric authentication
Biometric authentication has made great strides throughout the years thanks to better hardware and software support. However, attackers are unrelenting in finding new ways to spoof a subject, hereby breaking existing presentation attack detection schemes. Similar to combining multiple authentication factors, a combination of liveness detection defenses is expected to strengthen security against spoofing attacks. The problem that we address is that many defenses have only been evaluated in isolation or in ideal circumstances. In this work, we demonstrate how different liveness components for face authentication can interfere with one another, thereby jeopardizing security. Furthermore, contextual and environmental influences can endanger their robustness. In this work, we propose a security framework for biometric authentication that supports adaptive liveness detection by reasoning upon undesired interactions between defenses, the impact of new attacks, and the context in which they emerge. We validate the flexibility of our framework to account for both historic and novel interplays between attacks and defenses. Our experiments show that our framework effectively accounts for undesired interactions while only incurring a limited and acceptable performance overhead.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Confidential Quantum Computing Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era Fingerprint forgery training: Easy to learn, hard to perform Experiences with Secure Pipelines in Highly Regulated Environments Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1