Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack in...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/5609195 |
id |
doaj-cfb85068c79043d19368b5830365daa7 |
---|---|
record_format |
Article |
spelling |
doaj-cfb85068c79043d19368b5830365daa72020-11-24T21:25:47ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/56091955609195Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?Ines Goicoechea-Telleria0Raul Sanchez-Reillo1Judith Liu-Jimenez2Ramon Blanco-Gonzalo3The University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe University Group for Identification Technologies, Carlos III University of Madrid, 28911 Leganes, SpainThe use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.http://dx.doi.org/10.1155/2018/5609195 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ines Goicoechea-Telleria Raul Sanchez-Reillo Judith Liu-Jimenez Ramon Blanco-Gonzalo |
spellingShingle |
Ines Goicoechea-Telleria Raul Sanchez-Reillo Judith Liu-Jimenez Ramon Blanco-Gonzalo Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? Wireless Communications and Mobile Computing |
author_facet |
Ines Goicoechea-Telleria Raul Sanchez-Reillo Judith Liu-Jimenez Ramon Blanco-Gonzalo |
author_sort |
Ines Goicoechea-Telleria |
title |
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? |
title_short |
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? |
title_full |
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? |
title_fullStr |
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? |
title_full_unstemmed |
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone? |
title_sort |
attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3. |
url |
http://dx.doi.org/10.1155/2018/5609195 |
work_keys_str_mv |
AT inesgoicoecheatelleria attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone AT raulsanchezreillo attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone AT judithliujimenez attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone AT ramonblancogonzalo attackpotentialevaluationindesktopandsmartphonefingerprintsensorscantheybeattackedbyanyone |
_version_ |
1725982732925796352 |