Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008



Similar documents
"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Biometric Authentication using Online Signature

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

European Electronic Identity Practices Country Update of Portugal

Conformance test specification for BSI-TR Biometrics for public sector applications

Multimodal Biometric Recognition Security System

Biometrics for public sector applications

Description of Biometric Data Interchange Format Standards

Biometrics, Tokens, & Public Key Certificates

BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW

BehavioSec participation in the DARPA AA Phase 2

Understanding The Face Image Format Standards

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Biometrics for public sector applications

Smart Cards and Biometrics in Physical Access Control Systems

ISO Biometric Template Protection

Smart Card in Biometric Authentication

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Abstract. 1. Introduction Methodology

On the Operational Quality of Fingerprint Scanners

Biometric Enabled Access and Time & Attendance Solutions

A Best Practices Guide to Fingerprint Biometrics

Defining AFIS Latent Print Lights-Out

Landscape of eid in Europe in 2013

Extending EMV payment smart cards with biometric on-card verification

Best Practice Fingerprint Enrolment Standards European Visa Information System

NFC & Biometrics. Christophe Rosenberger

Under Real Spoofing Attacks

Modular biometric architecture with secunet biomiddle

Procedure for obtaining Biometric Device Certification (Authentication)

Towards the Security Evaluation of Biometric Authentication Systems

The Government-wide Implementation of Biometrics for HSPD-12

Biometric SSO Authentication Using Java Enterprise System

Review Article Biometric Template Security

Biometrics & Authentication Technologies: security issues. Andy Adler Systems and Computer Engineering Carleton University, Ottawa

Security Target for PalmSecure

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Biometrics for Public Sector Applications

PIV Data Model Test Guidelines

May For other information please contact:

Entrust Smartcard & USB Authentication

Biometrics and Cyber Security

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Practical Challenges in Adopting PIV/PIV-I

I N F O R M A T I O N S E C U R I T Y

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

MOBILE IDENTIFICATION:

Technology behind Aadhaar. Unique Identification Authority of India Tampa, 20 th September 2012

I N F O R M A T I O N S E C U R I T Y

Department of Homeland Security

Product Testing Programs

Identity - Privacy - Security

Computer and Network Security

SWGFAST. Defining Level Three Detail

High Resolution Fingerprint Matching Using Level 3 Features

David Yambay, Stephanie Schuckers Clarkson University. Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy CITeR Spring 2011

Support Vector Machines for Dynamic Biometric Handwriting Classification

Common Criteria Evaluations for the Biometrics Industry

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Full page passport/document reader Regula model 70X4M

De-duplication The Complexity in the Unique ID context

Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)

Embedded and mobile fingerprint. technology. FingerCell EDK

Signature Verification Why xyzmo offers the leading solution.

Statewatch Briefing ID Cards in the EU: Current state of play

Prof. Davide Maltoni DEIS - University of Bologna - ITALY. Summer School - BIOMETRICS: AUTHENTICATION and RECOGNITION

Personal National Identification System National Population Registry Mexico

Protection Profile for UK Dual-Interface Authentication Card

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Biometrics for payments. The use of biometrics in banking

SCB Access Single Sign-On PC Secure Logon

Biologger A Biometric Keylogger

How To Be Successful In A Competitive Market

Security of Biometric Authentication Systems Parvathi Ambalakat

PRIME IDENTITY MANAGEMENT CORE

Keep Out of My Passport: Access Control Mechanisms in E-passports

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

Spoof Detection and the Common Criteria

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

22 nd NISS Conference

A New Algorithm for Minutiae Extraction and Matching in Fingerprint

Transcription:

Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008

Contents Introduction: Biometric Technology Security Evaluation New Challenges in the VA of Fingerprint TOEs Part 1: Methodological point of view 1) General overview 2) Fingerprint attacks methodologies 3) Characterizing attacks to fingerprint devices Part 2: Technical point of view 1) Reverse engineering on biometric standards 2) Match on Card (MoC) fingerprint devices Future challenges

Introduction: Biometric Technology Security Evaluation (1) Performance evaluation: - NIST, ISO - E.g. ISO/IEC 19795 Objective: FAR: False Acceptance Rate. FRR: False Rejection Rate. ROC: Receiver Operating Characteristics. EER: Equal Error Rate. FTE: Failure to Enroll. (2) Security evaluation: - ISO/IEC 19792 Security Evaluation of Biometrics - Common Criteria: Biometric Evaluation Methodology (BEM) U.K. - PPs and STs: German, U.S. and U.K. Schemes. - Fingerprint Attack Methodology: Spanish Scheme

Methodological Evaluation Challenges General overview in terms of evaluation methodology Common Evaluation Methodology (CEM) provides a general technology-independent framework, more detailed methods to evaluate the security of specific technologies are a clear necessity. In the area of biometric security several attempts to standardize a generic biometric evaluation methodology have been developed, but until now the same situation than in the general field of IT security evaluation has been achieved i.e. very generic methods that are only a general approach for the experts belonging to evaluation facilities that have to deal with this kind of technical testing procedures. The key part of CC/CEM applied to specific technology types is AVA_VAN: penetration testing Previous success cases in other technologies like Smartcards and similar devices can be extended to fingerprint devices.

Methodological Evaluation Challenges Previous experience in the SP CB: Fingerprint Attack Methodology (FAM) Challenge: provide detailed guidance for evaluators doing pen-testing with fingerprint authentication devices Applicable to CC v2.3 and v3.1 1 Preparation Biometrics state-of-the-art review: performace / security evaluation Link to CEM, fingerprint-specific issues: Search of Potential Vulnerabilities Devise of Pen-Test Cases Conduct Pen-Test Cases Attack types: Type 1, sensors: fake fingers / optical, thermal sweep, solid-state Type 4, input to the matcher: brute-force, hill-climbing Presented in ICCC 2006 2 Search of Potential Vulnerabilities 3 Devise Pen-Tests 4 Produce Procedures for Pen-Tests 5 Conduct Pen-Tests 6 Reporting Results 7 Close

Methodological Evaluation Challenges CAFD supporting document: Characterizing Attacks to Fingerprint Devices Proposal: guidance supporting document - CCDB-2008-nn-nnn First draft released: Versión 1.0 Release 1 January 2008 Field of special use: Fingerprint and Biometric devices. Main necessities that are the objective of CAFD: 1) guidance about attack methods to be considered in a fingerprint based biometric product evaluation. 2) standardization of the security rating: guidelines & examples for the attack rating.

Methodological Evaluation Challenges CAFD supporting document: Characterizing Attacks to Fingerprint Devices CEM versions used in CAFD examples: - CC v3.1 attack potential rate tables for AVA. - CC v2.3 approach of attack = ID + Exploitation Template filled for each type of attack: - Description of the attack - Effect of the Attack - Impact on TOE - Characteristics of the Attack - Examples of attack types - Examples of attack potential ratings

Methodological Evaluation Challenges Fake fingers Masquerade Attack Points used in CAFD Masquerade Brute-force Hill-Climbing 1) Direct Attacks e.g. fake fingers 2) Indirect Attacks e.g. hill-climbing Brute-force Hill-Climbing

Methodological Evaluation Challenges CAFD supporting document: Characterizing Attacks to Fingerprint Devices Table of Contents: FINGERPRINT ATTACK METHODS 1) Direct Attacks: Fake Fingerprints Example: Direct Attack with Cooperation Example: Direct Attack without Cooperation 2) Brute Force indirect attacks Example: Brute Force attack to the feature extractor input Example: Brute Force attack to the matcher input 3) Hill-Climbing indirect attacks Example: hill-climbing attack to the matcher input Example: hill-climbing attack to the feature extractor input 4) Masquerade attacks Example: masquerade attack to the feature extractor input Example: masquerade attack to the sensor

Methodological Evaluation Challenges CAFD supporting document: Characterizing Attacks to Fingerprint Devices Biometric mechanisms are analysed basically isolated in CAFD: - Focused on explaining the relevant biometric aspects related to the attack potential rate estimation. - Final or absolute rates could be different depending on the TOE but guidance is provided in order to give evaluators a tool to make their own estimations based on examples. - Real access control functions in TOEs usually will involve other mechanisms complementing the biometric ones. Attack potential rates for fingerprint attacks included in CAFD are achieving ratings BASIC/MODERATE. CCMC: proposal for a new subject area for Biometrics supporting documents

Technical Evaluation Challenges Using standards in biometric devices: project examples 1) EEUU PIV (Personal Identity Verification) NPIVP (NIST Personal Identity Verification Program) MINEX (Minutiae Interoperability Exchange Test) SBMoC (Secure Biometric Match-on-Card) 2) Europe VIS (Visa Information System) 3) Spain DNIe (electronic National ID) 4) International ILO Seafarers ID The ICAO MRTD initiative: e-passport

Technical Evaluation Challenges ISO and ANSI fingerprint minutiae data interchange standards 0 / $ $ $% % %,9,9 50 3,7 $ 3:9,09 50 3:9,0 5,.02039 # / 003/ 3 7 / 0-1:7.,9 43,3/54 39841 3907089 # / 003/ 3 7 / 0-1:7.,9 43,3/49 079 508 # / 003/ 3 7 / 0-1:7.,9 43.4254:3/,3/:3/09072 30/ 49850. 1 0/1479 889,3/,7/ 3:9,047 3 &5507 019.47307 4 07 019.47307 3:9,0.447/ 3,9 43 8 8902,80/433:2-07415 0 8507.039 20907,80/:543:3 941 2 209078 3,,7908,3.447/ 3,908 8902 4.,90/ 3 ":,/7,39 3:9,0,3 0 7,3:,7 9 41/0 7008 7,3:,7 9 41/0 700

Technical Evaluation Challenges Reverse Engineering: how to attack an ISO matcher The ISO/IEC 19794-2 standard: minutiae-based Two formats: 1) general storage and transport 2) compact for use in card-based systems Minutiae encoding: 1) coordinate system 2) angle convention Minutia placement on a ridge ending (left) and on a ridge bifurcation (right).

Technical Evaluation Challenges Reverse Engineering Steps followed to reconstruct the fingerprint image from the ISO minutiae template

Technical Evaluation Challenges Reverse Engineering Process followed to generate the fake fingerprint: reconstructed image (a), negative of the reconstructed image (b), fingerprint on the PCB (c), pour the silicone and catalyst mixture on the PCB (d), spread the mixture over the PCB (e), detach when it hardens (f), cut out each fake finger (g), final fake fingerprint acquired (h)

Technical Evaluation Challenges Reverse Engineering Original fingerprints (left). Reconstructed images without noise (row 1) and with noise (row 3). The respective final fake fingerprints without noise (row 2), and with noise (row 4)

Technical Evaluation Challenges Reverse Engineering Matching score distributions and selected thresholds (dotted lines)

Technical Evaluation Challenges MoC Fingerprint Devices (Match-on-Card) vs. ToC (Template-on-Card) Spanish Scheme Example: Spanish National eid ( DNIe ) Contents: Authentication certificate & keys E-Signature certificate & keys CA certificate Personal data of the citizen Face picture (image) Handwritten signature picture (image) Fingerprint template MoC application included in the smartcard O.S. Biometric functions in DNIe 1. Update of the citizen s certificates 2. PIN: Unlock / change 3. ID Applications

Technical Evaluation Challenges Match-on-Card Specific MoC Standards 1) ISO/IEC 7816 2) ISO/IEC 19785-3: CBEFF patron formats 3) DIN V66400: Finger minutiae encoding format and parameters for on-card matching Other Related Biometric Standards 1) ISO/IEC 19794: Biometric Format Standards 2) ANSI/NIST ITL 1-2007

Technical Evaluation Challenges Match-on-Card: attacking directly to the matcher Hill-climbing matching Brute-force attack modified to use some kind of feedback provided by the device.

Technical Evaluation Challenges Match-on-Card: attacking directly to the matcher Hill-climbing matching

Future Challenges - Hash methods for template storage formats in standards - Matching algoritms in hash-spaces - Cripto-Biometrics - Multimodal devices - Creation of fake fingerprints for - for new types of sensors (ultrasound, etc) - to avoid vitality checks - Methods to lift fingerprints from latents - Vulnerability Analysis focused in other attack points - Automatic evaluation tools for brute-force attacks - Methods to get alternative feedbacks from the matching algorithms: DPAs, etc.

Spanish Certification Body Thank you by your attention Questions? * Contact: http://www.oc.ccn.cni.es organismo.certificacion@cni.es