Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez
{"title":"集成在移动设备中的生物识别系统的漏洞:评估","authors":"Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez","doi":"10.1109/CCST.2016.7815677","DOIUrl":null,"url":null,"abstract":"With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Vulnerabilities of biometric systems integrated in mobile devices: An evaluation\",\"authors\":\"Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez\",\"doi\":\"10.1109/CCST.2016.7815677\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.\",\"PeriodicalId\":6510,\"journal\":{\"name\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"22 1\",\"pages\":\"1-8\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2016.7815677\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815677","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerabilities of biometric systems integrated in mobile devices: An evaluation
With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.