The state of the art in abuse of biometrics

I.R. Buhan, Pieter H. Hartel

    Research output: Book/ReportReportProfessional

    175 Downloads (Pure)

    Abstract

    For applications like Terrorist Watch Lists and Smart Guns, a false rejection is more critical than a false acceptance. In this paper a new threat model focusing on false rejections is presented, and the standard architecture of a biometric system is extended by adding components like crypto, audit logging, power, and environment to increase the analytic power of the threat model. Our threat model gives new insight into false rejection attacks, emphasizing the role of an external attacker. The threat model is intended to be used during the design of a system.
    Original languageUndefined
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages43
    Publication statusPublished - Sep 2005

    Publication series

    NameCTIT-Technical Report Series
    No.05-41
    ISSN (Print)1381-3625

    Keywords

    • IR-54534
    • METIS-228790
    • SCS-Cybersecurity
    • EWI-722

    Cite this