Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack in...

Full description

Bibliographic Details
Main Authors: Ines Goicoechea-Telleria, Raul Sanchez-Reillo, Judith Liu-Jimenez, Ramon Blanco-Gonzalo
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/5609195
id doaj-cfb85068c79043d19368b5830365daa7
record_format Article
spelling doaj-cfb85068c79043d19368b5830365daa72020-11-24T21:25:47ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/56091955609195Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?Ines Goicoechea-Telleria0Raul Sanchez-Reillo1Judith Liu-Jimenez2Ramon Blanco-Gonzalo3The University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.http://dx.doi.org/10.1155/2018/5609195
collection DOAJ
language English
format Article
sources DOAJ
author Ines Goicoechea-Telleria
Raul Sanchez-Reillo
Judith Liu-Jimenez
Ramon Blanco-Gonzalo
spellingShingle Ines Goicoechea-Telleria
Raul Sanchez-Reillo
Judith Liu-Jimenez
Ramon Blanco-Gonzalo
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
Wireless Communications and Mobile Computing
author_facet Ines Goicoechea-Telleria
Raul Sanchez-Reillo
Judith Liu-Jimenez
Ramon Blanco-Gonzalo
author_sort Ines Goicoechea-Telleria
title Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
title_short Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
title_full Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
title_fullStr Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
title_full_unstemmed Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
title_sort attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone?
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.
url http://dx.doi.org/10.1155/2018/5609195
work_keys_str_mv AT inesgoicoecheatelleria attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone
AT raulsanchezreillo attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone
AT judithliujimenez attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone
AT ramonblancogonzalo attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone
_version_ 1725982732925796352