A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems

Ileana Buhan, Asker Bazen, Pieter Hartel, Raymond Veldhuis

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
    95 Downloads (Pure)

    Abstract

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit logging, power, and environment to increase the analytic power of the threat model. Our threat model gives new insight into false rejection attacks, emphasizing the role of an external attacker. The threat model is intended to be used during the design of a system.
    Original languageEnglish
    Title of host publicationAdvances in Biometrics
    Subtitle of host publicationInternational Conference, ICB 2006, Hong Kong, China
    EditorsDavid Zhang, Anil K. Jain
    Place of PublicationBerlin
    PublisherSpringer
    Pages728-736
    Number of pages9
    ISBN (Electronic)978-3-540-31621-3
    ISBN (Print)978-3-540-31111-9
    DOIs
    Publication statusPublished - Jan 2006
    Event1st International Conference on Biometrics, ICB 2006 - Hong Kong, China
    Duration: 5 Jan 20067 Jan 2006
    Conference number: 1

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume3832
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference1st International Conference on Biometrics, ICB 2006
    Abbreviated titleICB
    Country/TerritoryChina
    CityHong Kong
    Period5/01/067/01/06

    Keywords

    • SCS-Safety
    • SCS-Cybersecurity
    • Biometric system
    • Biometric authentication
    • Attack trees
    • False rejection
    • Security function

    Fingerprint

    Dive into the research topics of 'A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems'. Together they form a unique fingerprint.

    Cite this