Transcript
Page 1: Security Implications of Biometrics

Colin Dougherty

Page 2: Security Implications of Biometrics

What is it? Oldest form of identification Unique identifiers…not secrets!

Page 3: Security Implications of Biometrics

Examples of Biometrics Physiological

FaceFingerprintIris and RetinalHand VeinsDNA

BehavioralVoiceSignature

Page 4: Security Implications of Biometrics

Comparison of Biometrics Uniqueness Permanence Collectability Performance Circumvention

Page 5: Security Implications of Biometrics

Facial Recognition Primer Principal components analysis Viisage’s “EigenFaces”

Page 6: Security Implications of Biometrics

Real World Error Rates

False PositivesFalse Negatives

Airport BiometricsFace Recognition

Page 7: Security Implications of Biometrics

Fujistu’s Palm Vein Biometric Infrared Rays False Negative = 0.01% False Positive = 0.00008%

Page 8: Security Implications of Biometrics

Attacks and More Problems Verify accuracy and input correctly Replay Attacks Human Risk Poor Failure

Cancelable Biometrics

Page 9: Security Implications of Biometrics

MythBusters Defeat a Fingerprint Scanner

Copy of the fingerprint etched in latex.Ballistics gel copy of the fingerprint.Paper copy the fingerprint.

Page 10: Security Implications of Biometrics

Summary Security is in layers

Biometrics have strengths

Biometrics have weaknesses

Biometrics are unique identifiers not secrets!

Page 11: Security Implications of Biometrics

Sources Secrets & Lies, Digital Security in a

Networked World. Bruce Schneier. John Wiley & Sons, 2000

Jonathan Kent. BBC News, Kuala Lumpur: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm

Worcester Polytechnic Institute. Viisage http://www.wpi.edu/News/Transformations/2002Spring/recognition.html

Page 12: Security Implications of Biometrics

Questions What are two ways of comparing

different Biometrics?

Fill in the blank: Biometrics are unique identifiers not ___________!

Page 13: Security Implications of Biometrics

Colin Dougherty


Top Related