Computer Security 4/15/18

Similar documents
Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security 4/17/2017

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Biometric Security Roles & Resources

Role of Biometrics in Cybersecurity. Sam Youness

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Biometrics&CAPTCHA. 11/29/2010 EJ Jung

Smart Card and Biometrics Used for Secured Personal Identification System Development

Authentication: Beyond Passwords

Authentication Objectives People Authentication I

An Overview of Biometric Image Processing

The Future of Authentication

Information Security Identification and authentication. Advanced User Authentication II

Biometrics Our Past, Present, and Future Identity

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Keystroke Dynamics: Low Impact Biometric Verification

The need for secure biometric devices has been increasing over the past

Touchless Fingerprint recognition using MATLAB

UNDERSTANDING CAPTCHA

HumanAUT Secure Human Identification Protocols

Biometrics: The Password You ll Never Forget

Passwords. EJ Jung. slide 1

CSE 565 Computer Security Fall 2018

Advanced Biometric Access Control Training Course # :

Chapter 3: User Authentication

In this unit we are continuing our discussion of IT security measures.

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Lecture 9 User Authentication

Lecture 11: Human Authentication CS /12/2018

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Fingerprint Authentication for SIS-based Healthcare Systems

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification or Verification? Advanced Identification Technology

Access Control Biometrics User Guide

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Palm Vein Technology

Biometric Cryptosystems: for User Authentication

NIST Tests Supporting Biometric Identification Applications

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Minutiae Based Fingerprint Authentication System

AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

Combating Accuracy Issues in Biometric Solutions

Computer Security Exam 3 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

CSC 474 Network Security. Authentication. Identification

What is a security measure? Types of security measures. What is a security measure? Name types of security measures

FINGERPRINT BIOMETRICS

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

CAN WE ESCAPE PASSWORDS?

Beginner s Guide to Cordova and Mobile Application Development

CS443: Digital Imaging and Multimedia Perceptual Grouping Detecting Lines and Simple Curves

Understanding Fingerprint Biometrics

FSN-PalmSecureID-for ATM Machines

User Authentication and Human Factors

Mobile ID, the Size Compromise

An introduction on several biometric modalities. Yuning Xu

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Vision-Based Technologies for Security in Logistics. Alberto Isasi

TOPIC : FINGERPRINT RECOGNITION

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

Multimodal Biometric Authentication using Face and Fingerprint

Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

ESCAPT: Easy Strategies for Computers to Avoid the Public Turing Test

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Authentication Technologies

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Biometrics Hybrid System Based Verification

CS November 2018

Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications

Touch screen. Uses of Touch screen: Advantages of Touch screen: Disadvantages of Touch screen:

CS Authentication of Humans. Prof. Clarkson Spring 2017

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Charter Pacific Biometrics Acquisition

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.

PALM VEIN TECHNOLOGY

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Biometrics problem or solution?

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

COMPUTER NETWORK SECURITY

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Who are you? Enter userid and password. Means of Authentication. Authentication 2/19/2010 COMP Authentication is the process of verifying that

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

A Review of Emerging Biometric Authentication Technologies

Peg-Free Hand Geometry Verification System

Usable Security Introduction to User Authentication and Human Interaction Proof Research

Transcription:

Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint) accept_user(); else reject_user(); We'd like to use logic like this Paul Krzyzanowski Rutgers University Spring 2018 =? 1 2 Biometrics Biometrics Rely on statistical pattern recognition Thresholds False Accept Rate (FAR) Non-matching pair of biometric data is accepted as a match False Reject Rate (FRR) Matching pair of biometric data is rejected as a match Each biometric system has a characteristic ROC curve (receiver operator characteristic, a legacy from radio electronics) False Reject Rate (FRR) (false non-match) secure trade-off convenient False Accept Rate (FAR) (false match) 3 4 Biometrics: forms Fingerprint Reasonable uniqueness Iris Analyze pattern of spokes: excellent uniqueness, signal can be normalized for fast matching Retinal scan Excellent uniqueness but not popular for non-criminals Hand geometry: length of fingers, width of fingers, thickness, surface area Low guarantee of uniqueness: generally need 1:1 match Signature, Voice Behavioral vs. physical system Can change with demeanor, tend to have low recognition rates Others Facial geometry, facial thermographs, DNA, finger vein scans, palm vein scans, odor Biometrics: distinct features Example: Fingerprints identify minutia Arches Loops Whorls Ridge endings Bifurcations Islands Bridges source: http://anil299.tripod.com/vol_002_no_001/papers/paper005.html 5 6 Paul Krzyzanowski 1

Biometrics: desirable characteristics Robustness Repeatable, not subject to large changes over time Fingerprints & iris patterns are more robust than voice Distinctiveness Differences in the pattern among population Fingerprints: typically 40-60 distinct features Irises: typically >250 distinct features Hand geometry: ~1 in 100 people may have a hand with measurements close to yours. Biometrics: desirable characteristics Biometric Robustness Distinctiveness Fingerprint Moderate High Hand Geometry Moderate Low Voice Moderate Low Iris High Ultra high Retina High Ultra high Signature Low Moderate 7 8 Irises vs. Fingerprints Number of features measured: High-end fingerprint systems: ~40-60 features Iris systems: ~240 features False accept rates (FAR) Fingerprints: ~ 1:100,000 (varies by vendor; may be ~1:500) Irises: ~ 1:1.2 million Retina scan ~1:10,000,000 Irises vs. Fingerprints Ease of data capture More difficult to damage an iris but lighting is an issue Feature capture more difficult for fingerprints: Smudges, gloves, dryness, Ease of searching Fingerprints cannot be normalized 1:many searches are difficult Irises can be normalized to generate a unique IrisCode 1:many searches much faster 9 10 Biometric: authentication process 0. Enrollment The user s entry in a database of biometric signals must be populated. Initial sensing and feature extraction May be repeated to ensure good feature extraction Biometric: authentication process 1. Sensing User s characteristic must be presented to a sensor Output is a function of: Biometric measure The way it is presented Technical characteristics of sensor 2. Feature Extraction Signal processing Extract the desired biometric pattern remove noise and signal losses discard qualities that are not distinctive/repeatable Determine if feature is of good quality 11 12 Paul Krzyzanowski 2

Biometric: authentication process 3. Pattern matching Sample compared to original signal in database Closely matched patterns have small distances between them Distances will hardly ever be 0 (perfect match) 4. Decision Decide if the match is close enough Trade-off: false non-matches leads to false matches Identification vs. Verification Identification: Who is this? 1:many search Verification: Is this Bob? Present a name, PIN, token 1:1 (or 1:small #) search Enrollment Sensing Feature extraction Storage Authentication Sensing Feature extraction Matching Result 13 14 Biometrics: Essential characteristics Trusted sensor Liveness testing Tamper resistance Secure communication Acceptable thresholds Biometrics: other characteristics Cooperative systems (multi-factor) User provides identity, such as name and/or PIN vs. Non-cooperative Users cannot be relied on to identify themselves Need to search large portion of database Overt vs. covert identification Habituated vs. non-habituated Do users regularly use (train) the system 16 17 Problems with biometric systems Requires a sensor Camera works OK for iris scans & facial detection (but a good Iris scan will also take IR light into account) Tampering with device or device link Replace sensed data or just feed new data Tampering with stored data Biometric data cannot be compartmentalized You cannot have different data for your Amazon & bank accounts Biometric data can be stolen Photos, lifting fingerprints Once biometric data is compromised, it remains compromised You cannot change your iris or finger Detecting Humanness 18 19 Paul Krzyzanowski 3

Gestalt Psychology (1922-1923) Gestalt Psychology Max Wertheimer, Kurt Koffka Laws of organization Proximity We tend to group things together that are close together in space Similarity We tend to group things together that are similar Good Continuation We tend to perceive things in good form Closure We tend to make our experience as complete as possible Figure and Ground We tend to organize our perceptions by distinguishing between a figure and a background 18 x 22 pixels Source: http://www.webrenovators.com/psych/gestaltpsychology.htm 20 21 Gestalt Psychology Gestalt Psychology HELLO 22 23 Authenticating humanness Battle the Bots Create a test that is easy for humans but extremely difficult for computers CAPTCHA Example Microsoft CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Image Degradation Exploit our limits in OCR technology Leverages human Gestalt psychology: reconstruction Origins 1997: AltaVista prevent bots from adding URLs to the search engine 2000: Yahoo! and Manuel Blum & team at CMU EZ-Gimpy: one of 850 words Henry Baird @ CMU & Monica Chew at UCB BaffleText: generates a few words + random non-english words Source: http://www.sciam.com/print_version.cfm?articleid=00053ea7-b6e8-1f80-b57583414b7f0103 http://tinyurl.com/dg2zf 24 See captchas.net 25 Paul Krzyzanowski 4

Problems Accessibility Visual impairment audio CAPTCHAs Deaf-blind users suffer Frustration OCR & computer vision has improved a lot! Challenges that are difficult for computers may be difficult for humans Attacks Man in the middle (sort of) Use human labor CAPTCHA farms Automated CAPTCH solvers Initially, educated guesses over a small vocabulary Alternate approaches MAPTCHAs = math CAPTCHAs Solve a simple math problem Puzzles, scene recognition 26 27 recaptcha Ask users to translate images of real words & numbers from archival texts Human labor fixed up the archives of the New York Times Two sections One for known text and the other is the image text Assume that if you get one right then you get the next one correct Try it again on a few other people to ensure identical answers before marking it correct Google bought recaptcha 2009 Used free human labor to improve transcription of old books & street data 2014: Google found that AI could crack CAPTCHA & recaptcha images with 99.8% accuracy NoCAPTCHA recaptcha Ask users if they are robots Reputation management Advanced Risk Analysis backend Check IP addresses of known bots Check Google cookies from your browser Considers user s entire engagement with the CAPTCHA: before, during, and after Mouse movements & acceleration, precise location of clicks Newest version: invisible recaptcha Don t even present a checkbox 28 29 NoCAPTCHA fallback If risk analysis fails, Present a CAPTCHA For mobile users, present a image labeling problem Alternative: Text/email verification Text/email verification Ask users for a phone # or email address Service sends a message containing a verification code Still susceptible to spamming Makes it a bit more difficult and slower Measure form completion times Users take longer than bots to fill out and submit forms Measure completion times Bots can program delays if they realize this is being done 30 31 Paul Krzyzanowski 5

The End 32 Paul Krzyzanowski 6