Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification ---



Similar documents
On the Operational Quality of Fingerprint Scanners

Development of Attendance Management System using Biometrics.

Prof. Davide Maltoni DEIS - University of Bologna - ITALY. Summer School - BIOMETRICS: AUTHENTICATION and RECOGNITION

22 nd NISS Conference

"LOOKING FOR A COMMON ATTACK METHODOLOGY FOCUSED ON FINGERPRINT AUTHENTICATION DEVICES

Embedded and mobile fingerprint. technology. FingerCell EDK

Fingerprint Based Biometric Attendance System

EDUCATOR Plus Color Poster Printer VariQuest Poster Maker 3600

Under Real Spoofing Attacks

Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview

Fingerprint Characteristic Extraction by Ridge Orientation: An Approach for a Supervised Contactless Biometric System

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

David Yambay, Stephanie Schuckers Clarkson University. Luca Ghiani, Gian Luca Marcialis, Fabio Roli, University of Cagliari, Italy CITeR Spring 2011

Good Boards = Results

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

SecuGen USB Fingerprint Reader User Guide

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

DENSITY MEASURING SYSTEMS

Introduction. Inkjet Technology Explained

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Security of Biometric Authentication Systems Parvathi Ambalakat

AN588 ENERGY HARVESTING REFERENCE DESIGN USER S GUIDE. 1. Kit Contents. 2. Introduction. Figure 1. Energy Harvesting Sensor Node

SCREEN PRINTING INSTRUCTIONS

The Government-wide Implementation of Biometrics for HSPD-12

Penetration Testing Biometric System

Biometric authentication systems today and in the future

Polyimide labels for Printed Circuit Boards

May For other information please contact:

MYOB EXO Electronic Timeclocks

Assignment 1 Biometric authentication

Multimodal Biometric Recognition Security System

L-1 Fingerprint Reader Solutions. V-Flex 4G

New Advances in Rapid Prototyping using Inkjet-based 3D Printing

The Development of a Pressure-based Typing Biometrics User Authentication System

The Anatomy of a Label

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Biometrics Unique, simple, convenient

Full page passport/document reader Regula model 70X4M

Auditing Contract Manufacturing Processes

Why Touch Technology?

AX.S Series Access Control and I.AM Series Identity Access Management

Paper-based Document Authentication using Digital Signature and QR Code

Abstract. 1. Introduction Methodology

Low Pressure Molding Solutions

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

DASH KIT INSTALLATION

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

High Resolution Fingerprint Matching Using Level 3 Features

Eddy-current testing - Non-destructive testing for flaw detection of metals, coatings and carbon fibres

Robot Service Network Protocol Developed by Robot Service initiative

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

RAPID PROTOTYPING. Learning Objectives: By the end of the lecture the student should be able to: Explain the fundamentals of Rapid Prototyping

Analysis of a Biometric Authentication Protocol for Signature Creation Application

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

Biometrics for payments. The use of biometrics in banking

Biometrics: Trading Privacy for Security

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Examples of Large Scale Biometrics Systems:

Biometrics in Physical Access Control Issues, Status and Trends White Paper

An Analysis of the Effect of IEEE Publications on the Apple Computer Inc. Patent Portfolio

Neal O Hara. Business Development Manager

MegaMatcher Case Study

PTFE Teflon Glass Fabric Grades & Material Data Sheets

Rapid Prototyping. Training Objective

DOCUMENT SECURITY ISSUES

SCB Access Single Sign-On PC Secure Logon

SC, FC and ST * Hot Melt Fiber Optic Connectors

Prof. Dr. M. H. Assal

Apr 17, 2000 LAB MANUAL

Make up Epoxy adhesive

Keysight Technologies Quickly Identify and Characterize Thermal Measurement Points

Labels. Avery Dennison. Avery Easy Peel Labels. Avery Ink Jet Labels. Avery Laser Labels. Avery Labels for the Personal Label Printer

Computer Peripherals

Treatment of a surface or structure to resist the passage of water in the absence of hydrostatic pressure. presence of hydrostatic pressure.

To make audiovisuals useful they have to be available in a wide choice and to be continuously updated to match the technological development.

Thermal Paper Construction

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

EaSy: Efficient and Secure System for Utility Service Registration

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance

Sensitivity to both h- and i-line makes AZ 9200 photoresist capable for both broadband and i-line steppers.

Cost Effective Automated Test Framework for Touchscreen HMI Verification

MoniUPS Software and Service. with an expert

Chain of evidence refers to the continuity of custody of material and items collected as evidence.

Biologger A Biometric Keylogger

The Keyboard One of the first peripherals to be used with a computer and is still the primary input device for text and numbers.

III. MEMS Projection Helvetica 20 Displays

Securing Mobile Cloud Using Finger Print Authentication

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Specification of 5 Wire Analog Touch Panel

Transcription:

ITU-T Workshop on Security, Seoul Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification --- 14 May 2002 Tsutomu Matsumoto Graduate School of Environment and Information Sciences Yokohama National University email: tsutomu@mlab.jks.ynu.ac.jp

Security Architecture Operating Systems Security Software Tamper Resistance Mobile Code Security Physical Tamper Resistance Communications Security Cryptographic Protocol User Identification Mobile Security Technologies

Adversarial Analysis Security assessment of biometric user identification systems should be conducted not only for the accuracy of authentication, but also for security against fraud. In this presentation we focus on Fingerprint Systems which may become widespread for Mobile Terminals. Examine Adversarial Analysis as A Third Party Can we make artificial fingers that fool fingerprint systems? What are acceptance rates?

Fingerprint Systems Typical structure of a fingerprint system Finger Data Result Finger Capturing Feature Extraction Comparison Presenting Recording Referring Finger Information Database Fingerprint System Enrollment Types of sensors Optical sensors Capacitive sensors Thermal sensors, Ultrasound sensors, etc. Verification or Identification Live and Well Detection

A Risk Analysis for Fingerprint Systems Attackers may present 1) the registered finger, by an armed criminal, under duress, or with a sleeping drug, 2) an unregistered finger (an imposter's finger), i.e., non-effort forgery, 3) a severed fingertip from the registered finger, 4) a genetic clone of the registered finger, 5) an artificial clone of the registered finger, and 6) the others, such as a well-known method as a fault based attack.

Fraud with Artificial Fingers Part of patterns of dishonest acts with artificial fingers against a fingerprint system. L(X): A Live Finger corresponding to Person X A(Y): An Artificial Finger corresponding to Person Y A(Z): An Artificial Finger corresponding to Nobody

Fraud with Artificial Fingers I Enrollment X Y obtains A(X). X L(X) Authentication L(X) Y A(X) X Distribution of A(X)s A(X)s A(X) X or Y

Fraud with Artificial Fingers II X obtains A(Y). X enrolls A(Y). X Y Authentication A(Y) X X A(Y) A(Y) Distribution of A(Y)s A(Y)s A(Y) or L(Y) X or Y

Fraud with Artificial Fingers III Enrollment X Y makes A(X). L(X) X L(X) Authentication L(X) X Y A(X)s A(X) Distribution of A(X)s A(X) Y

Mapping a Fingerprint onto Artificial Fingers Finegerprint e.g., Live Fingers, Generators,... Impression e.g., Molds, Residual Fingerprints,... Artificial Finger

Known Results Process 0 (1) Finger (2) Mold (3) Silicone Rubber Finger

Fact Optical Sensor Capacitive Sensor Finger Finger Light Source Detector Array of Electrodes Often Accepts Silicone Rubber Fingers Usually Rejects Silicone Rubber Fingers

Our Result Gummy Fingers Process 1 (1) Finger (2) Plastic Mold (3) Gummy Finger

Recipe 1-1 Making an Artificial Finger directly from a Live Finger Materials Free molding plastic FREEPLASTIC by Daicel FineChem Ltd. Solid gelatin sheet GELATINE LEAF by MARUHA CORP 350JPY/35grams 200JPY/30grams

Recipe 1-2 Making an Artificial Finger directly from a Live Finger How to make a mold Put the plastic into hot water to soften it. Press a live finger against it. It takes around 10 minutes. The mold

Recipe 1-3 Making an Artificial Finger directly from a Live Finger Preparation of material A liquid in which immersed gelatin at 50 wt.%. Add boiling water (30cc) to solid gelatin (30g) in a bottle and mix up them. It takes around 20 minutes.

Recipe 1-4 Making an Artificial Finger directly from a Live Finger How to make a gummy finger Pour the liquid into the mold. Put it into a refrigerator to cool. It takes around 10 minutes. The gummy finger

Similarity with Live Fingers The photomicrographs of fingers (a) Live Finger (b) Silicone Finger (c) Gummy Finger

Captured Images Captured images with the device C (an optical sensor). (a) Live Finger (b) Silicone Finger (c) Gummy Finger Captured images with the device H (a capacitive sensor). (a) Live Finger (b) Gummy Finger

Fingerprint systems: 11 types Experiments Subjects: five persons whose ages are from 20 s to 40 s We attempted one-to-one verification 100 times counting the number of times that it accepts a finger presented. Types of experiments Experiment Enrollment Verification Type 1 Live Finger Live Finger Type 2 Live Finger Gummy Finger Type 3 Gummy Finger Live Finger Type 4 Gummy Finger Gummy Finger

The List of Fingerprint Devices Device A M anufacturer / Selling Agency Compaq Computer Corporation Product Name Compaq Stand-Alone Fingerprint Identification Unit H ardw are S pecifications Type DFR -200 Product Number E03811US001 Sensor Optical Sensor Live and Well Detection unknown M anufa cturer / S elling Agency Compaq Computer Corporation Software Specifications Product Name (Application) F ingerprint Identification T echnology Software version 1.1 Comparison Levels 1 through 3 Methods fo r Verification Minutiae Matching Device B MITSUBISHI ELECT RIC CORPORATION Fingerprint Recognizer FPR-DT mkii 003136 Optical Sensor unknown Sumikin Izumi Computer Service co. Ltd. S ecfp V1.11 Fixed Minutiae Matching Device C NEC Corporation Fingerprint Identification Unit (P rism) N7950-41 9Y00003 Optical Sensor unknown NEC Corporation B a sic U tilit ie s for F ingerprint Identification Fixed Minutiae Matching (Minutia and Relation) Device D OMRON Corporation Fingerprint Recognition Sensor FPS-1000 90500854 Optical Sensor unknown OM RON Corporation "YUBI PASS " U.a re.u Fingerprint Verification Software Fixed Minutiae Matching Device E Sony Corporation Sony Fingerprint Identification Unit FIU-002-F11 00709 Optical Sensor Live Finger detection TSUBASA SYSTEM CO.,LTD. F ingerprint Identification Unit W indows 95 Interactive Demo Version 1.0 Build 13 1 through 5 Pattern matching Device F FUJITSU LIMITED Fingsensor FS-200U 00AA000257 Capacitive Sensor unknown FUJIT SU LIMITED Logon for Fingsensor V1.0 for W indows 95/98 Fixed Minutiae Matching (Correlation) Device G Device H NEC Corporation Siemens A G (Infineon Technologies AG) Fingerprint Identification Unit (S erial) FingerTIP EVALUATION KIT PK-FP002 EVALUATION- KIT 0300529S C98451- D6100-A900-4 Capacitive Sensor Capacitive Sensor unknown unknown NEC Corporation Siemens AG(Infineon T echnologies AG) B a sic U tilit ie s for F ingerprint Identification FingerTIP Software Development Kit (SDK) Version: V0.90, Beta 3 "Demo Program" Fixed Fixed Minutiae Matching (Minutia and Relation) Minutia matching Device I Sony Corporation Sony Fingerprint Identification Unit FIU-710 3000398 Capacitive Sensor Live Finger detection S ystemneeds Inc. 1 through 5 Pattern matching Device J Secugen EyeD mouse II SM B-800 unknown Device K Ethentica ethenticatior M S 3000 PC Card MS 3000 Ethentica

Experimental Results Making an Artificial Finger directly from a Live Finger

Our Result Gummy Fingers Process 2 (1) Residual Fingerprint (2) Digital Image Data (3) Printed Circuit Board (4) Gummy Finger

Recipe 2-1 Making an Artificial Finger from a Residual Fingerprint Materials A photosensitive coated Printed Circuit Board (PCB) 10K by Sanhayato Co., Ltd. Solid gelatin sheet GELATINE LEAF by MARUHA CORP 320JPY/sheet 200JPY/30grams

Residual Fingerprint Enhancing Capturing Cyanoacrylate Adhesive Recipe 2-2 Digital Microscope Image Processing Fingerprint Image Printing Mask Exposing Developing Etching Mold Adobe Photoshop 6.0 Transparent Film UV light Photosensitive Coated PCB KEYENCE VH6300: 900k pixels Inkjet Printer Canon BJ-F800: 1200x600dpi

Recipe 2-3 An Enhanced Fingerprint A Fingerprint Image A Mask with Fingerprint Images

Recipe 2-4 Gelatin Liquid Drip the liquid onto the mold. Put this mold into a refrigerator to cool, and then peel carefully. 40wt.%

The Mold and the Gummy Finger Mold: 70JPY/piece (Ten molds can be obtained in the PCB.) Gummy Finger: 50JPY/piece

Resolution of Fingerprint Images Pores can be observed. Enhanced Fingerprint Captured Fingerprint Image of the Gummy Finger with the device H (a capacitive sensor)

Experimental Results from Residual Fingerprints (for 1 subject)

Characteristics of Gummy Fingers Moisture Electric Resistance Live Finger 16% 16 Mohms/cm Gummy Finger 23% 20 Mohms/cm Silicone Finger impossible to measure impossible to measure Gummy Finger Live Finger The compliance was also examined for live and gummy fingers.

Conclusions There can be various dishonest acts using artificial fingers against the fingerprint systems. Gummy fingers, which are easy to make with cheep, easily obtainable tools and materials, can be accepted by 11 types of fingerprint systems. The experimental study on the gummy fingers will have considerable impact on security assessment of fingerprint systems. Manufacturers,vendors, and users of biometric systems should carefully examine security of their system against artificial clones. How to treat such information should be an important issue.

For Details Paper: T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV. Send any comments to tsutomu@mlab.jks.ynu.ac.jp