Indirect Attacks on Biometric Systems

Similar documents
From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems

On the Vulnerability of Face Verification Systems to Hill-Climbing Attacks

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Hill-Climbing Attack to an Eigenface-Based Face Verification System

Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification

On the relation between biometric quality and user-dependent score distributions in fingerprint verification

On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

Fingerprint Liveness Detection Based on Quality Measures

Spoof Detection of Fingerprint Biometrics using PHOG Descriptor

Supporting Document Guidance. Characterizing Attacks to Fingerprint Verification Mechanisms. Version 3.0 CCDB

Privacy and Security Assessment of Biometric Systems

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

On the Vulnerability of Palm Vein Recognition to Spoofing Attacks


Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT

FVC2004: Third Fingerprint Verification Competition

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

Biometrics Evaluation and Testing. Dr Alain MERLE CEA-LETI

Off-line Signature Verification Using Contour Features

Detection of Fake Biometric: Application to Face Recognition, IRIS and FINGERPRINT

Exploring Similarity Measures for Biometric Databases

Comparison of ROC-based and likelihood methods for fingerprint verification

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

Repositorio Institucional de la Universidad Autónoma de Madrid. Pattern Recognition 40.4, (2007):

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Adapted Fusion Schemes for Multimodal Biometric Authentication. Dr. Julian Fierrez Advisor: Javier Ortega-Garcia. Madrid, November 2006.

Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System

A Study on Attacks and Security Against Fingerprint Template Database

A Survey on Biometric Security Threats and Countermeasure

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Multimodal Biometric Authentication using Face and Fingerprint

CSE / 60537: Biometrics

Find Pretend Biometric Mistreatment Image Quality Assessment for animateness Detection

On the Vulnerability of an EEG-based Biometric System to Hill-climbing Attacks Algorithms Comparison and Possible Countermeasures

Secure Access System Using Signature Verification over Tablet PC

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Multimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology

Synthetic Generation of Handwritten Signatures Based on Spectral Analysis

Images can be regenerated from quantized biometric match score data

Secure Learning Algorithm for Multimodal Biometric Systems against Spoof Attacks

Time Analysis of Pulse-based Face Anti-Spoofing in Visible and NIR

BIOMETRIC TECHNOLOGY: A REVIEW

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters

On the effects of sampling rate and interpolation in HMM-based dynamic signature verification

Biometrics: Machines recognizing people

Combined Fingerprint Minutiae Template Generation

Biometric Detection in Fingerprint, Iris, and 2D face using hybrid of IQA and SIFT

SECURE MODULAR AUTHENTICATION SYSTEMS BASED ON CONVENTIONAL XOR BIOMETRICS

Call for participation. FVC2004: Fingerprint Verification Competition 2004

Quality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France

Hiding Fingerprint Minutiae in Images

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Enhanced Authentication for Self-organizing Software platform using Smart SSD. Im Y. Jung, Gil-Jin Jang, Jung-Min Yang

Automatic Fingerprints Image Generation Using Evolutionary Algorithm

Repositorio Institucional de la Universidad Autónoma de Madrid.

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Histogram-based matching of GMM encoded features for online signature verification

A Novel Approach to Improve the Biometric Security using Liveness Detection

How to Attack Biometric Systems in Your Spare Time

Secure and Private Identification through Biometric Systems

Biometrics- Fingerprint Recognition

International Journal of Advanced Research in Computer Science and Software Engineering

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

ISSN Vol.07,Issue.12, August-2015, Pages:

An overview of research activities in Biometrics

A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Match Score Values in Fingerprint Verification

Parallel versus Serial Classifier Combination for Multibiometric Hand-Based Identification

Template Protection and its Implementation in 3D Face Recognition Systems

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Fake Detection of IRIS, Fingerprint and 2D Face Images by Using Image Quality Parameters

Secure Fingerprint Matching with External Registration

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

A Robust Multimodal Biometric System Integrating Iris, Face and Fingerprint using Multiple SVMs

Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases

On-line Signature Verification on a Mobile Platform

CHAPTER 6 RESULTS AND DISCUSSIONS

II. SYSTEM ARCHITECTURE

Automatic Fingerprints Image Generation Using Evolutionary Algorithm

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION

SECURITY-ENHANCING TECHNOLOGIES FOR BIOMETRIC SYSTEMS

Biometric Security Systems

Online Signature Verification Technique

Local Correlation-based Fingerprint Matching

A Survey on Security in Palmprint Recognition: A Biometric Trait

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

DYNAMIC SIGNATURE VERIFICATION FOR PORTABLE DEVICES

Biometrics Technology: Multi-modal (Part 2)

Biometric Security Roles & Resources

FUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION. Yongjin Wang, K.N. Plataniotis

Transcription:

Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN Gjovik, Norway, March 2015 1/73 Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. General/Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 2/73 1

Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 3/73 Security Evaluation in Biometrics FAQ when dealing with IT solutions for security applications: How secure is this technology? Why should I trust it? Who assures the level of security offered by this system?... INDEPENDENT SECURITY EVALUATION 4/73 2

Where Are We In Biometric Security Evaluation? Five observations from the state of the art: Obs. 1: other works try to answer: is this system vulnerable to this attack?, but not HOW vulnerable is it? Obs. 2: results are obtained without following a specific protocol (very difficult to compare) Obs. 3: different standards for security evaluation (CC, BEM, ISO 19792) very general need for supporting documents with examples, lists of threats... Obs. 4: constant need to search for new threats Obs. 5: need to develop countermeasures for the detected vulnerabilities 5/73 Security Perspective There are two ways of addressing the security problem: SECURITY THROUGH OBSCURITY SECURITY THROUGH TRANSPARENCY Relies on secrecy (of design, implementation, protocols ) to provide security. Publicity helps attackers Relies on openness to provide security. Largely used in cryptography. The simpler and fewer the things that one needs to keep secret, the easier it is to maintain the security Let s face the problems and find solutions for them (controlled risk), before somebody else finds the way to take advantage of our secrets (unpredictable consequences) 6/73 3

Security Perspective Searching for new threats (can the system be broken using this attacking approach?), evaluating those vulnerabilities following a systematic and replicable protocol (how vulnerable is the system to this approach?), proposing new countermeasures that mitigate the effects of the attack, and publicly reporting the results of the whole process, help to develop a more mature and secure biometric technology. Detect Problems Evaluate Problems Find Solutions PUBLICLY 7/73 Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 8/73 4

Attack Points in Biometrics Possible points of attack to a biometric system. DIRECT ATTACKS (Spoofing, mimicry) 1 Sensor 2 INDIRECT ATTACKS (Trojan Horse, Hill Climbing, Brute Force, channel interception, replay attacks, ) 3 4 5 8 Feature extractor Matcher 7 6 Database 9 Threshold 10 Accept/Reject 9/73 Security Evaluation of Biometric Systems Proposed steps for security evaluation of biometric systems: 1) Description of the attack 2) Description of the biometric systems being evaluated 3) Description of the information required to be known by the attacker 4) Description of the database 5) Description of the tests that will be performed 6) Compute the performance (FAR and FRR curves) of the systems being evaluated determine the operating points where they will be tested 7) Execution of the vulnerability evaluation in the defined operating points: Success Rate (SR), and Efficiency (E ff ) Reporting the results SR: percentage of accounts broken out of the total attacked E ff : average number of attempts needed to break an account 10/73 5

Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 11/73 Brute-Force Attack with Synthetic Signatures J.Galbally, J. Fierrez, J. Ortega-Garcia and R. Plamondon, "Synthetic on-line signature generation. Part II: Experimental validation", Pattern Recognition, Vol. 45, pp. 2622-2632, July 2012. 12/73 6

Sensor INDIRECT ATTACK: Brute Force 2 Feature extractor Matcher Database Threshold Accept/Reject 13/73 Synthetic Generation of On-Line Signatures We consider an on-line signature is defined by [x,y,p]. General system architecture: White noise SYNTHETIC INDIVIDUALS GENERATION ALGORITHM (Generative model based on Spectral Analysis) DUPLICATED SAMPLES GENERATION ALGORITHM Synthetic Subject (Master Signature) Duplicated Samples 14/73 7

Synthetic Generation of On-Line Signatures Examples of real and synthetic signatures: 15/73 Database and Systems ENROLL (performance eval.) MCYT db: 330 users 25 Real Signatures / user x, y, p signals TEST (security eval.) MCYT-Synth. db: 330 users 25 Synth. Signatures / user x, y, p signals 330 accounts attacked (5/20 training signatures) HMM-based system: 4 states, 12 gaussians per state EER 3.5% J. Fierrez, et al., "HMM-based on-line signature verification: feature extraction and signature modeling", Pattern Recog. Letters, Dec. 2007. 16/73 8

Results Operating Points SR of the attack in % The system distinguishes better between real and synthetic signatures than in the case of considering only real signatures. The difference is lower when we take into account the pressure function pressure information is useful The difference is higher for more training signatures 17/73 Brute-Force with Synthetic Data: Other Biometrics J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez and J. Ortega-Garcia, "Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms", Comp. Vision and Image Under., Oct 2013 (Also in Elsevier Virtual Issue: Celebrating the Breadth of Biometrics Research; and featured in CNN, Wire, BBC, 18/73 etc.) 9

Brute-Force with Synthetic Data: Other Biometrics Unrealistically high security scenario 75% of breaking the system For the most likely attacking scenario 92% SR More than one reconstruction 30% SR increase J. Galbally, A. Ross, M. Gomez-Barrero, J. Fierrez and J. Ortega-Garcia, "Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms", Comp. Vision and Image Under., Oct 2013 (Also in Elsevier Virtual Issue: Celebrating the Breadth of Biometrics Research; and featured in CNN, Wire, BBC, 19/73 etc.) Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 20/73 10

Direct & Indirect Masquerade Attacks Starting from an ISO Minutiae Template J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez-de-Rivera, D. Maltoni, J. Fierrez, J. Ortega-Garcia and D. Maio, "An Evaluation of Direct Attacks Using Fake Fingers Generated from ISO Templates", Pattern Recognition Letters, June 2010. Invited paper on Special Issue with selected papers from ICPR 2008 21/73 Sensor INDIRECT ATTACK: Masquerade attack 2 Feature extractor 6 Matcher Database Threshold Accept/Reject 22/73 11

The Problem Attacks to biometric systems DIRECT / INDIRECT Biometric Trait Direct Attacks Indirect Attacks Biometric System Accept/Reject Direct attacks are easier to perform: No information about the system is needed Interaction with the system is done in a straight forward manner WHAT IF AN INDIRECT ATTACK IS TRANSFORMED INTO A DIRECT ATTACK? 23/73 From a Minutiae Template to a Gummy Finger DIRECT ATTACK (Spoofing) INDIRECT ATTACK (Masquerade Attack) Gummy finger generation Reconstruction Process Gummy Finger Reconstructed Image Stolen ISO Template Computer Sensor Feature Extractor Matcher Template Storage Fingerprint Accept/Reject 24/73 12

From a Minutiae Template to a Gummy Finger DIRECT Cappelli, ATTACK Lumini, (Spoofing) Maio, and Maltoni [PAMI2007] INDIRECT ATTACK (Masquerade Attack) Gummy finger generation Reconstruction Process Gummy Finger Reconstructed Image Stolen ISO Template Computer Sensor Feature Extractor Matcher Template Storage Fingerprint Accept/Reject 25/73 From a Minutiae Template to a Gummy Finger DIRECT Cappelli, ATTACK Lumini, (Spoofing) Maio, and Maltoni [PAMI2007] INDIRECT ATTACK (Masquerade Attack) Gummy finger generation Reconstruction Process Gummy Finger Reconstructed Image Stolen ISO Template Computer Sensor Feature Extractor Matcher Template Storage Fingerprint Accept/Reject 26/73 13

Database and Systems ENROLL (performance eval.) FVC 2006 DB2 140 users / 12 samples Real TEST (security eval.) 50 users Rec. Images + gummy fingers Rec. Images ISO Minutiae based system (proprietary) EER=0.11% (computed with complete FVC 2006 DB2 140 users/12 samples) Fake 27/73 Results RIASR Reconstructed Images Attack Success Rate DASR Direct Attack Success Rate Loss of performance between the indirect and direct attack related to quality loss The system is still highly vulnerable to the direct attack: SR=50% for very high security point, SR=78% for more realistic op. point Standards are positive, BUT provide information to attackers need for TEMPLATE PROTECTION 28/73 14

Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 29/38 Hill-Climbing Indirect Attacks to Fingerprint Systems M. Martinez-Diaz, J. Fierrez, J. Galbally and J. Ortega-Garcia, "An evaluation of indirect attacks and countermeasures in fingerprint verification systems", Pattern Recognition Letters, September 2011. 30/73 15

Sensor INDIRECT ATTACK: Hill-Climbing Feature extractor 4 8 Matcher Database Threshold Accept/Reject 31/38 Milestones on Hill-Climbing Indirect Attacks 2001: Attacks classification, by Ratha et al. (Proc. AVBPA) 2002: First Hill-Climbing (HC) attack, by Soutar 2003: HC attack to a face recognition system, by Adler 2004: HC attack to a minutia-based system, by Uludag and Jain (Proc. SPIE) 2006: HC attack to a minutia-based MoC system, by Martinez- Diaz et al. (Proc. IEEE ICSST) 2007: HC attack to a signature verification system, by Galbally et al. (Proc. ICB) 16

Hill-Climbing Attacks Hill-climbing attacks send random templates to the matcher which are iteratively adapted, based on the matching score, until the decision threshold is exceeded. ATTACKED ACCOUNT Access Granted SYNTHETIC TEMPLATES MATCHER > < Modification scheme Reference System The NIST Fingerprint Image Recognition System (NFIS) is used as a reference system for our attacks. PC based system composed of several software modules. The following modules are used: MINDTCT: minutiae extractor. BOZORTH3: matcher. 17

Match-on-Card System The Match-on-Card (MoC) System under consideration is an operational implementation. The matcher is fully embedded in a smart-card. The processing capacity of MoC systems is very limited. It is accessed via a smart-card reader connected to a PC. The only information known from the system being attacked is: sensor image size, sensor resolution, minutiae storing format (ISO). Database: MCYT A sub-corpus of the MCYT database is selected. UareU Optical Sensor by Digital Persona. Resolution of 500 dpi. Sub-corpus composed of 10 samples of both index fingers of 75 users: 1,500 samples, 150 accounts Samples are acquired with three different control levels. 18

Region-of-Interest The 2-D histogram of the minutiae of the sub-corpus is computed A Region is heuristically defined, named Region-of-Interest (RoI), where most minutiae are located. Performance of the NFIS2 and MoC Matchers 19

Experimental Protocol Attacks are based on the work by Uludag and Jain in 2004 100 initial synthetic random, 38-minutiae templates are sent to the matcher The template that attains the higher score is stored and iteratively modified by either: a) Changing an existing minutia by moving it to an adjacent cell or by changing its orientation. b) Adding a minutia c) Replacing a minutia d) Deleting a minutia from the template Only if the match score increases, in any of these iterations, the modified template is saved Experimental Protocol The iterations end whenever the decision point is exceeded The following thresholds are set: NFIS2 Threshold = 35 FAR = 0.10% MoC Threshold = 55 FAR = 0.16% 1,000 average Brute-force attempts 640 average Brute-force attempts The success rate of the attacks will be determined by the attacks that need fewer iterations than the attempts a bruteforce attack would need 20

Example attacks: NFIS2 Short attack Score progression Unsuccessful attack Original minutiae Original minutiae (black circles) vs. synthetic minutiae (grey triangles) Example attacks: Match-on-Card Short attack Score progression Unsuccessful attack Original minutiae Original minutiae (black circles) vs. synthetic minutiae (grey triangles) 21

Experimental Results Using the initial configuration, only 2/150 accounts are broken below 1,000 iterations (NFIS). Generating minutiae only inside the ROI increases the success rate to 7/150 (NFIS). Deleting the low performing steps, a) and d), the success rate is increased to 40/150 broken accounts (NFIS). The biggest difference in behavior against attacks found between NFIS and MoC is with respect to the number of initial minutiae (maybe due to the limited capacity of the MoC matcher): 38 leads to the maximum attack success rate for NFIS: 40/150 25 leads to the maximum attack success rate for MoC: 123/150 (i.e., MoC is more vulnerable to attacks) Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 44/38 22

Side-Channel Hill-Climbing Attack to Fingerprint Biometrics (Time Attack) J. Galbally, S. Carballo, J. Fierrez and J. Ortega-Garcia, "Vulnerability Assessment of Fingerprint Matching Based on Time Analysis", in Proc. Biometric ID Management and Multimodal Communication, Springer LNCS-5707, September 2009. 45/73 Sensor INDIRECT ATTACK: Time-based Side-Channel Hill-Climbing Feature extractor 4 8 Matcher Database Threshold Accept/Reject 46/38 23

Milestones Related to our Work RELATED BIOMETRIC VULNERABILITIES 2001: Attacks classification, by Ratha et al. (AVBPA) 2002: First HC attack, by Soutar 2005: HC attack to a minutia based system, by Uludag and Jain (Proc. SPIE) 2007: HC attack to an on-line signature system, by Galbally et al. (ICB) RELATED VULNERABILITIES ON CRYPTOGRAPHY 1995: Timing attacks, by Kocher (ICCAC) 1999: Differential Power Analysis (DPA), by Kocher et al. (Crypto) Score vs Time General diagram of a biometric system. Identity claim Database Feature Extractor Matcher S Decision ACCEPT REJECT T m T m S? Why? SCORE: difficult to access TIME: easy to measure 24

Possible Application: Hill-Climbing Attacks General diagram of a hill-climbing attack. Attacked Account Access Granted SYNTHETIC TEMPLATES MATCHER S X > < T m Modification scheme f(s) X f(t m) Reference System The NIST Fingerprint Image Recognition System 2 (NFIS2) is used as a reference system in many research works. It s a PC based system composed of several software modules. The following modules are used: MINDTCT: minutiae extractor. BOZORTH3: matcher. 25

Database: MCYT Performance Evaluation: A sub-corpus of the MCYT database is selected (http://atvs.ii.uam.es/): UareU Optical, Digital Persona, 500dpi. Sub-corpus composed of 10 samples of both index fingers of 75 users: 1500 samples. Samples are acquired with three different control levels. EER=1.47% Experiments: 1 controled sample of the 75 users Results: Experiment 1 EXPERIMENT 1: Relation between Score and Time t(s[0,10]) vs t(s[90,100]) t(s[10,20]) vs t(s[80,90]). t(s[40,50]) vs t(s[50,60]) 26

Results: Experiment 1 t(s[0,10]) vs t(s[90,100]) t(s[10,20]) vs t(s[80,90]) t(s[20,30]) vs t(s[70,80]) TIME: + distant bands - overlap t(s[30,40]) vs t(s[60,70]) t(s[40,50]) vs t(s[50,60]) Results: Experiment 2 EXPERIMENT 2: Relation between Score and Time variations The original template is matched against itself (maximum score). The matching time is measured. The template is iteratively modified by (one change at a time): a) Changing an existing minutia by moving it to an adjacent cell or by changing its orientation. b) Adding a minutia c) Replacing a minutia d) Deleting a minutia from the template After each change the resulting template is matched against the original one. The matching time is measured. The algorithm stops after 300 iterations (original and resulting template totally different very low matching score) 27

Results: Experiment 2 A Individual Examples B Average behavior of the system Two areas can be distinguished: A. Evolution of score and time are clearly correlated: a decrease in score implies a decrease in time B. Score and time are independent Conclusions The relation between score and matching time have been analyzed. A reference fingerprint system was used: NFIS2. Experiments are carried out on the publicly available database MCYT. Results show that matching time and score are not independent: A higher score implies a higher matching time. An increase in the score implies (on average) an increase on the matching time. This relation could be exploited to break the system (as has been done in cryptography with the timing attacks). 28

Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. General/Advanced Hill-Climbing (Face) Score Quantization A Note on Common Criteria Conclusions 57/38 Bayesian Hill-Climbing Attack J. Galbally, C. McCool, J. Fierrez, S. Marcel and J. Ortega-Garcia, "On the Vulnerability of Face Verification Systems to Hill-Climbing Attacks", Pattern Recognition, vol. 43, pp. 1027-1038, 2010. 58/73 29

Sensor INDIRECT ATTACK: General/Advanced Hill-Climbing Feature extractor 4 8 Matcher Database General Knowledge Threshold Accept/Reject 59/38 Hill-Climbing Attack Based on Bayesian Adaptation General diagram of a hill-climbing attack. ATTACKED ACCOUNT Access Granted SYNTHETIC TEMPLATES MATCHER > Threshold < Modification scheme HILL-CLIMBING ATTACK 60/73 30

Hill-Climbing Attack Based on Bayesian Adaptation Bayesian hill-climbing algorithm. G=A G 1-1st ITERATION Best M out of N scores A L 30th ITERATION Reynolds et al, [DSP2000] 61/73 Database and Systems Database XM2VTS db: 295 users 4 sessions 2 samples per session 200 accounts attacked (4 training images) Eigenface-based system (91 dim 80% variance). EER=4.7% DCT-based system (GMM 512 gaussians). EER=1.2% Turk and Pentland [ICCVPR1991] Cardinaux, Sanderson, et al. [AVBPA2003] 62/73 31

Results For the best attack configuration (N=25, M=5, =0.5) the performance in other operation points is analyzed Eingenface+distance system DCT+GMM system For smaller FA bigger average number of comparisons and worse success rate. Always better efficiency than a BF attack 63/73 Attack Example Example of a successful attack 64/73 32

Other Hill-Climbing Approaches Hill climbing based on the uphill simplex algorithm. New point Stopping criteria: One of the points of the simplex is close enough => success Maximum number of iterations allowed reached => failure M. Gomez-Barrero, J. Galbally, J. Fierrez and J. Ortega-Garcia, "Face verification put to test: a hill-climbing attack based on the uphill-simplex algorithm", in Proc. ICB 2012. 65/73 Attack Protection Using Score Quantization 66/73 33

Results Score Quantization increase the quantization step of the score so that the HC attack cannot take advantage of small increases in the score. Should not change the system performance maximum step Eingenface-Based system GMM-Based system SR and Eff decrease in both cases. More efficient for the PCA-based system. Not enough, other countermeasures should be studied. 67/73 Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 68/38 34

Copyright 2010 Idiap www.idiap.ch 69 Attack Potential Rating Resistance level < 20 No rating None Compatible with 20-27 Basic AVA_VAN.2 28-34 Enhanced AVA_VAN.3 basic 35-42 Moderate AVA_VAN.4 >= 42 High AVA_VAN.5 Table identical to the CEM one Specific level definition Copyright 2010 Idiap www.idiap.ch 70 35

Outline Introduction: Security Perspective Introduction to Vulnerabilities in Biometrics: Indirect Attacks Case Studies: 1. Brute-Force Attack with Synthetic Data (Signature & Iris) 2. Stolen Template > Masquerade Indirect Attack (Finger) 3. Matcher-Specific Hill-Climbing (Finger) 4. Time-based Side-Channel Hill-Climbing (Finger) 5. Advanced Hill-Climbing (Face) Score Quantization CM A Note on Common Criteria Conclusions 71/38 Conclusions Security through transparency: need for security vulnerability assessment Indirect Attacks: [NO INFO] > Brute-Force (Synthetic Data): Low SRs [STOLEN TEMPLATE] > Masquerade: Very-High SRs [MATCH SCORE] > Matcher-specific HC: Med-High SRs [SIDE-CHANNEL - TIME] > HC: Med SRs [MATCH SCORE] > General/Advanced HC: Med-High SRs Score Quantization as a CM: Useful, but not definitive Relation with Common Criteria 72/73 36

Indirect Attacks on Biometric Systems Dr. Julian Fierrez (with contributions from Dr. Javier Galbally) Biometric Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN Gjovik, Norway, March 2015 73/73 37