Abstract
For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit logging, power, and environment to increase the analytic power of the threat model. Our threat model gives new insight into false rejection attacks, emphasizing the role of an external attacker. The threat model is intended to be used during the design of a system.
Original language | English |
---|---|
Title of host publication | Advances in Biometrics |
Subtitle of host publication | International Conference, ICB 2006, Hong Kong, China |
Editors | David Zhang, Anil K. Jain |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 728-736 |
Number of pages | 9 |
ISBN (Electronic) | 978-3-540-31621-3 |
ISBN (Print) | 978-3-540-31111-9 |
DOIs | |
Publication status | Published - Jan 2006 |
Event | 1st International Conference on Biometrics, ICB 2006 - Hong Kong, China Duration: 5 Jan 2006 → 7 Jan 2006 Conference number: 1 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 3832 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 1st International Conference on Biometrics, ICB 2006 |
---|---|
Abbreviated title | ICB |
Country/Territory | China |
City | Hong Kong |
Period | 5/01/06 → 7/01/06 |
Keywords
- SCS-Safety
- SCS-Cybersecurity
- Biometric system
- Biometric authentication
- Attack trees
- False rejection
- Security function