Presentation 2006-11-23
Evaluating Biometric Security : Understanding the Impact of Wolves in Sheep's Clothing
Daniel Lopresti, Fabian Monrose, Lucas Ballard,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Growing interest in biometric security has resulted in much work on systems that attempt to exploit the individuality of human behavior. In this paper, we survey our recent research examining issues arising when such biometrics are to be used for authentication or cryptographic key generation. We propose steps towards the development of more rigorous evaluation methodologies for behavioral biometrics that take into account threat models previously ignored in the literature. The pervasive assumption that adversaries are minimally motivated (or, even worse, naive), or that attacks can only be mounted through manual effort, is too optimistic and even dangerous. The discussion is illustrated by summarizing our analysis of a handwriting-based key generation system showing that the standard evaluation methodology significantly overestimates its security. We also present an overview of our work on fully automated (generative) attack models that can be nearly as effective as skilled human forgers and thus present both a serious threat as well as a potential tool for improving the testing of biometric systems.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) biometric security / signature verification / generative models / cryptographic key generation / password hardening
Paper # PRMU2006-123
Date of Issue

Conference Information
Committee PRMU
Conference Date 2006/11/16(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Pattern Recognition and Media Understanding (PRMU)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Evaluating Biometric Security : Understanding the Impact of Wolves in Sheep's Clothing
Sub Title (in English)
Keyword(1) biometric security
Keyword(2) signature verification
Keyword(3) generative models
Keyword(4) cryptographic key generation
Keyword(5) password hardening
1st Author's Name Daniel Lopresti
1st Author's Affiliation Department of Computer Science and Engineering Lehigh University()
2nd Author's Name Fabian Monrose
2nd Author's Affiliation Department of Computer Science Johns Hopkins University
3rd Author's Name Lucas Ballard
3rd Author's Affiliation Department of Computer Science Johns Hopkins University
Date 2006-11-23
Paper # PRMU2006-123
Volume (vol) vol.106
Number (no) 375
Page pp.pp.-
#Pages 10
Date of Issue