Blanco Gonzalo, R., Corsetti, B, Goicoechea-Telleria, I., Husseis, A, Liu-Jimenez, J., Sanchez-Reillo, R., Eglitis, Teodors, Ellavarason, Elakkiya, Guest, Richard, Lunerti, Chiara, and others. (2018) Attacking a smartphone biometric fingerprint system:a novice’s approach. In: 2018 International Carnahan Conference on Security Technology (ICCST). IEEE ICCST 2018. International Carnahan Conference on Security Technology . IEEE ISBN 978-1-5386-7931-9. (doi:10.1109/CCST.2018.8585726) (KAR id:69851)
PDF
Publisher pdf
Language: English |
|
Download this file (PDF/386kB) |
Preview |
Request a format suitable for use with assistive technology e.g. a screenreader | |
Official URL: http://dx.doi/10.1109/CCST.2018.8585726 |
Abstract
Biometric systems on mobile devices are an
increasingly ubiquitous method for identity verification. The
majority of contemporary devices have an embedded fingerprint
sensor which may be used for a variety of transactions including
unlock a device or sanction a payment. In this study we explore
how easy it is to successfully attack a fingerprint system using a
fake finger manufactured from commonly available materials.
Importantly our attackers were novices to producing the fingers
and were also constrained by time. Our study shows the relative
ease that modern devices can be attacked and the material
combinations that lead to these attacks.
Item Type: | Conference or workshop item (Proceeding) |
---|---|
DOI/Identification number: | 10.1109/CCST.2018.8585726 |
Uncontrolled keywords: | biometric systems, fingerprints, spoofing, attack assessments |
Divisions: | Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts |
Depositing User: | Richard Guest |
Date Deposited: | 30 Oct 2018 14:49 UTC |
Last Modified: | 05 Nov 2024 12:32 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/69851 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):