biometric authentication revisited understanding the
play

Biometric Authentication Revisited: Understanding the Impact of - PowerPoint PPT Presentation

Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheeps clothing in Sheeps clothing Lucas Ballard, Fabian Monrose, Daniel Lopresti Presented by : Anuj Sawani 1 Biometrics What is it? identifying, or


  1. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep’s clothing in Sheep’s clothing Lucas Ballard, Fabian Monrose, Daniel Lopresti Presented by : Anuj Sawani 1

  2. Biometrics • What is it? – identifying, or verifying a person based on • Physiological characteristics • Behavioral characteristics – Examples? Examples? • Biometric Authentication vs Identification – “Am I who I claim to be?” – “Who am I?” • Better than passwords? 2

  3. Handwriting as a biometric • Offline – 2-D bitmap • Online – Real-time data Real-time data • Signatures as a biometric? Feature extraction Hash/Key 3

  4. So, what’s with the menagerie? • Sheep – Easily accepted by the system • Goats – Exceptionally unsuccessful at being accepted Exceptionally unsuccessful at being accepted • Lambs – Exceptionally vulnerable to imitations • Wolves – Exceptionally successful at imitations 4

  5. The Threat Model • Exploiting poorly protected template databases • Eavesdropping communication between Eavesdropping communication between sensor and the system • Presenting artificially created samples to the sensor 5

  6. A neat idea – Concatenation attack • Samples of user’s handwriting from other contexts • General samples of the style of writing • Feature analysis … Feature analysis … • Generate the user’s handwriting synthetically! 6

  7. Performance Statistics Equal Error Rate (ERR) False Accept Rate (FAR) False Reject Rate (FRR) 7

  8. Forgery styles • Naïve – Use other users’ writing as it was naturally rendered to forge the passphrase • Naïve* Naïve* – Similar to Naïve, but uses similar writing styles • Static – Forgery using an image of the passphrase • Dynamic – Real-time rendering of the passphrase 8

  9. Grooming the sheep into wolves • 11,038 handwriting samples • Incentives awarded to consistent writers, “dedicated forgers” • Three Rounds Three Rounds 1. Collect the samples 2. Static and Dynamic forging 3. Selected “trained” forgers 9

  10. Handwriting features • How difficult is the feature to forge? • Signals – t, x(t), y(t), p(t) • For every feature f – r f � missed by legitimate users – r f � missed by legitimate users – a f � missed by forgers • Quality metric – Q = (a f - r f + 1)/2 • Q = 0 – never reliably reproduced by users • Q = 1 – never reproduced by forgers 10

  11. The winning features • The probability that the i th stroke of c 1 connects c 2 • Median gap between the adjacent characters • Median time between end of c 1 and beginning Median time between end of c and beginning of c 2 • Pen-up velocity • A total of 36 good features out of 144 11

  12. Algorithm to generate a known passphrase • Select n -grams from different context such that – g 1 || g 2 || … ||g k = passphrase • Normalize t , x(t) and y(t) – match baselines • Spatial adjustment of x(t) – Use median gap feature • Fabricate p(t) Fabricate p(t) – Use probability of connection feature – Delayed strokes pushed into stack • Executed after each pen-up • Add time delays – Use median time feature – Use pen-up velocity and distance between strokes 12

  13. The system at work… • Used small sample set of 15 samples of user’s writing – Each character from passphrase exists in set – Does not include passphrase Does not include passphrase • Also, used 15 samples of similar writing style • The algorithm caused an EER of 27.4% – Forgers caused an EER of 20.6% • n-gram length < 2 • Used 6.67 of the samples on average 13

  14. Conclusion • Handwriting as a reliable biometric? – Refutable • Adversary has been under-estimated till now • Generative approach produces better Generative approach produces better forgeries than trained humans 14

  15. Take away Watch out for the next generation of wolves! 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend