[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Forgery Quality and Its Implications for Behavioral Biometric Security

Published: 01 October 2007 Publication History

Abstract

Biometric security is a topic of rapidly growing importance in the areas of user authentication and cryptographic key generation. In this paper, we describe our steps toward developing evaluation methodologies for behavioral biometrics that take into account threat models that have been largely ignored. We argue that the pervasive assumption that forgers are minimally motivated (or, even worse, naive) is too optimistic and even dangerous. Taking handwriting as a case in point, we show through a series of experiments that some users are significantly better forgers than others, that such forgers can be trained in a relatively straightforward fashion to pose an even greater threat, that certain users are easy targets for forgers, and that most humans are a relatively poor judge of handwriting authenticity, and hence, their unaided instincts cannot be trusted. Additionally, to overcome current labor-intensive hurdles in performing more accurate assessments of system security, we present a generative attack model based on concatenative synthesis that can provide a rapid indication of the security afforded by the system. We show that our generative attacks match or exceed the effectiveness of forgeries rendered by the skilled humans we have encountered.

Cited By

View all
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • (2021)Treadmill Assisted Gait Spoofing (TAGS)Digital Threats: Research and Practice10.1145/34421512:3(1-17)Online publication date: 8-Jun-2021
  • (2019)Exploring intentional behaviour modifications for password typing on mobile touchscreen devicesProceedings of the Fifteenth USENIX Conference on Usable Privacy and Security10.5555/3361476.3361499(303-318)Online publication date: 12-Aug-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics  Volume 37, Issue 5
October 2007
341 pages

Publisher

IEEE Press

Publication History

Published: 01 October 2007

Author Tags

  1. Biometric security
  2. forgery models
  3. signature verification

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • (2021)Treadmill Assisted Gait Spoofing (TAGS)Digital Threats: Research and Practice10.1145/34421512:3(1-17)Online publication date: 8-Jun-2021
  • (2019)Exploring intentional behaviour modifications for password typing on mobile touchscreen devicesProceedings of the Fifteenth USENIX Conference on Usable Privacy and Security10.5555/3361476.3361499(303-318)Online publication date: 12-Aug-2019
  • (2018)A Video-based Attack for Android Pattern LockACM Transactions on Privacy and Security10.1145/323074021:4(1-31)Online publication date: 24-Jul-2018
  • (2018)A Design Space for Security Indicators for Behavioural Biometrics on Mobile Touchscreen DevicesExtended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3170427.3188633(1-6)Online publication date: 20-Apr-2018
  • (2018)A new iterative synthetic data generation method for CNN based stroke gesture recognitionMultimedia Tools and Applications10.1007/s11042-017-5285-677:13(17181-17205)Online publication date: 1-Jul-2018
  • (2017)BehavioCog: An Observation Resistant Authentication SchemeFinancial Cryptography and Data Security10.1007/978-3-319-70972-7_3(39-58)Online publication date: 3-Apr-2017
  • (2016)Generating synthetic handwriting using n-gram letter glyphsProceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing10.1145/3009977.3010042(1-8)Online publication date: 18-Dec-2016
  • (2016)Targeted Mimicry Attacks on Touch Input Based Implicit Authentication SchemesProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2906388.2906404(387-398)Online publication date: 20-Jun-2016
  • (2016)Toward Robotic Robbery on the Touch ScreenACM Transactions on Information and System Security10.1145/289835318:4(1-25)Online publication date: 6-May-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media