Abstract
Biometric systems on mobile devices are an increasingly ubiquitous method for identity verification. The majority of contemporary devices have an embedded fingerprint sensor which may be used for a variety of transactions including unlock a device or sanction a payment. In this study we explore how easy it is to successfully attack a fingerprint system using a fake finger manufactured from commonly available materials. Importantly our attackers were novices to producing the fingers and were also constrained by time. Our study shows the relative ease that modern devices can be attacked and the material combinations that lead to these attacks.
Original language | English |
---|---|
Title of host publication | 52nd Annual 2018 IEEE International Carnahan Conference on Security Technology, ICCST 2018 - Proceedings |
Editors | Brian G. Rich |
Publisher | IEEE |
Volume | 2018-October |
ISBN (Electronic) | 978-1-53867931-9 |
ISBN (Print) | 978-1-5386-7932-6 |
DOIs | |
Publication status | Published - 21 Dec 2018 |
Externally published | Yes |
Event | 52nd Annual IEEE International Carnahan Conference on Security Technology - Montreal, Canada Duration: 22 Oct 2018 → 25 Oct 2018 Conference number: 52 |
Publication series
Name | Proceedings - International Carnahan Conference on Security Technology |
---|---|
Volume | 2018-October |
ISSN (Print) | 1071-6572 |
Conference
Conference | 52nd Annual IEEE International Carnahan Conference on Security Technology |
---|---|
Abbreviated title | ICCST 2018 |
Country/Territory | Canada |
City | Montreal |
Period | 22/10/18 → 25/10/18 |
Keywords*
- attack assessments)
- biometric systems
- fingerprints
- spoofing
Field of Science*
- 2.2 Electrical engineering, Electronic engineering, Information engineering
- 1.6 Biological sciences
Publication Type*
- 3.1. Articles or chapters in proceedings/scientific books indexed in Web of Science and/or Scopus database