Side-Channel Attacks on Fingerprint Matching Algorithms
Title | Side-Channel Attacks on Fingerprint Matching Algorithms |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Dürmuth, Markus, Oswald, David, Pastewka, Niklas |
Conference Name | Proceedings of the 6th International Workshop on Trustworthy Embedded Devices |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4567-5 |
Keywords | biometric encryption, biometrics, biometry, bozorth3, Collaboration, composability, fingerprint matching, Human Behavior, Metrics, pubcrawl, Resiliency, Scalability, side-channel analysis, simple power analysis |
Abstract | Biometric authentication schemes are frequently used to establish the identity of a user. Often, a trusted hardware device is used to decide if a provided biometric feature is sufficiently close to the features stored by the legitimate user during enrollment. In this paper, we address the question whether the stored features can be extracted with side-channel attacks. We consider several models for types of leakage that are relevant specifically for fingerprint verification, and show results for attacks against the Bozorth3 and a custom matching algorithm. This work shows an interesting path for future research on the susceptibility of biometric algorithms towards side-channel attacks. |
URL | http://doi.acm.org/10.1145/2995289.2995294 |
DOI | 10.1145/2995289.2995294 |
Citation Key | durmuth_side-channel_2016 |