메뉴 건너뛰기




Volumn 26, Issue 1, 2007, Pages 14-25

Biometric attack vectors and defences

Author keywords

Attack vector; Biometric; Countermeasures; Defences; Identification; Security; Threat

Indexed keywords

BIOSENSORS; COMPUTER CRIME; RISK ASSESSMENT; SECURITY OF DATA;

EID: 33846817469     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.12.008     Document Type: Article
Times cited : (146)

References (37)
  • 1
    • 33846816915 scopus 로고    scopus 로고
    • Adler Andy. Reconstruction of source images from quantized biometric match score data. University of Ottawa, [accessed 25.11.05].
  • 2
    • 33846833614 scopus 로고    scopus 로고
    • AS/NZS 4360:2004 risk management, Standards New Zealand, [accessed 01.09.06].
  • 3
    • 33846838642 scopus 로고    scopus 로고
    • Bartlow Nick, Cukic Bojan. The vulnerabilities of biometric systems - an integrated look and old and new ideas. Technical report, West Virginia University; 2005a.
  • 4
    • 33846833613 scopus 로고    scopus 로고
    • Bartlow Nick, Cukic Bojan. Biometric system threats and countermeasures: a risk-based approach. In: Biometric Consortium Conference, ; September 2005b.
  • 5
    • 33846833615 scopus 로고    scopus 로고
    • Biometric Device Protection Profile, UK Government Biometrics Working Group, Draft issue 0.82-5, ; September 2001 [accessed 13.10.06].
  • 6
    • 33846797938 scopus 로고    scopus 로고
    • Biometrics security technical implementation guide version 1. Release 2. Defense information systems agency for the US department of defense, ; 23 August 2004 [accessed 13.09.05].
  • 7
    • 33846794330 scopus 로고    scopus 로고
    • Bromba Manferd. On the reconstruction of biometric raw data from template data, M.U.A. Bromba, Bromba GmbH ; July 2003 [accessed 14.08.06].
  • 8
    • 33846786592 scopus 로고    scopus 로고
    • Check Body, Thalheim Lisa, Krissler Jan, Ziegler Peter-Michael. Biometrie (Translated from the original German by Robert W. Smith) c't magazine 2002;114. [accessed 05.02.06].
  • 9
    • 33846828326 scopus 로고    scopus 로고
    • Chetty Girija, Wagner Michael. Audio-video biometric systems with liveness checks, University of Canberra, [accessed 03.09.06].
  • 10
    • 33846781167 scopus 로고    scopus 로고
    • Clarkson University Engineer Outwits High-Tech Fingerprint Fraud, Clarkson University, ; 10 December 2005 [accessed 19.12.05].
  • 11
    • 33846839036 scopus 로고    scopus 로고
    • ®, [accessed 10.09.06].
  • 12
    • 33846781168 scopus 로고    scopus 로고
    • Computer Crime and Security Survey, University of Otago, ; 2005 [accessed 08.09.06].
  • 13
    • 33846794329 scopus 로고    scopus 로고
    • Computer Security Resource Center, National Institute of Standards and Technology, [accessed 10.09.06].
  • 14
    • 33846837100 scopus 로고    scopus 로고
    • CSI/FBI annual surveys, computer security institute, 1996 to 2006, .
  • 15
    • 74749089012 scopus 로고    scopus 로고
    • Elsevier Digital Press, Rittinghouse and Hancock. 1-55558-306-7
    • Cybersecurity operations handbook. 1st ed. (2003), Elsevier Digital Press, Rittinghouse and Hancock. 1-55558-306-7
    • (2003) Cybersecurity operations handbook. 1st ed.
  • 16
    • 33846813376 scopus 로고    scopus 로고
    • Evaluation criteria for IT security - Parts 1, 2 & 3: International Organization for Standardization, [accessed 10.09.06].
  • 17
    • 33846803934 scopus 로고    scopus 로고
    • Hackers claim new fingerprint biometric attack
    • [accessed 13.08.06]
    • Harrison A. Hackers claim new fingerprint biometric attack. SecurityFocus (13 August 2003). http://www.securityfocus.com/print/news/6717 [accessed 13.08.06]
    • (2003) SecurityFocus
    • Harrison, A.1
  • 18
    • 33846828327 scopus 로고    scopus 로고
    • Information Security Management Systems, International Organization for Standardization, [accessed 10.09.06].
  • 19
    • 33846781169 scopus 로고    scopus 로고
    • Information security standard. BSI management systems, [accessed 10.09.06].
  • 20
    • 33846840429 scopus 로고    scopus 로고
    • Integrated risk management framework (IRMF), the treasury board of Canada secretariat (TBS), ; April 2001 [accessed 01.09.06].
  • 21
    • 33846794331 scopus 로고    scopus 로고
    • ISO/IEC 27001:2005, Information technology - security techniques - information security management systems - requirements, [accessed 10.02.06].
  • 22
    • 33846816916 scopus 로고    scopus 로고
    • IT infrastructure library, Hompage, [accessed 10.02.06].
  • 23
    • 33846814924 scopus 로고    scopus 로고
    • Jain Anil K, Uludag Umut. IEEE transactions on pattern analysis and machine intelligence, vol. 25, No. 11, November 2003. [accessed 08.09.06].
  • 25
    • 33846840553 scopus 로고    scopus 로고
    • Jain Anil K, Pankanti Sharath, Prabhakar Salil, Hong Lin, Ross Arun, Wayman James L. In: Proceedings of international conference on pattern recognition (ICPR) Cambridge, UK, Aug. 2004. Michigan State University/IBM T. J. Watson Research Center/DigitalPersona Inc./Siemens Corporate Research/West Virginia University/San Jose State University. [accessed 05.02.06].
  • 26
    • 33846846150 scopus 로고    scopus 로고
    • Liveness detection in biometric systems, Biometrics information resource, [accessed 05.02.06].
  • 27
    • 33846816919 scopus 로고    scopus 로고
    • Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-Garcia J, Siguenza, JA. Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification, Universidad Autonoma de Madrid, [accessed 03.09.06].
  • 28
    • 33846826756 scopus 로고    scopus 로고
    • Graduate School of Environment and Information Sciences Yokohama National University, Japan [accessed 29.09.05]
    • Matsumoto T., Matsumoto H., Yamada K., and Hoshino S. Proceedings of SPIE. Optical security and counterfeit deterrence techniques IV vol. #4677 (24-25 January 2002), Graduate School of Environment and Information Sciences Yokohama National University, Japan. http://cryptome.org/gummy.htm [accessed 29.09.05]
    • (2002) Optical security and counterfeit deterrence techniques IV , vol.4677
    • Matsumoto, T.1    Matsumoto, H.2    Yamada, K.3    Hoshino, S.4
  • 29
    • 33846813380 scopus 로고    scopus 로고
    • Nessus vulnerability scanner. Tenable network security, [accessed 10.09.06].
  • 30
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • [accessed 01.09.06]
    • Ratha N.K., Connell J.H., and Bolle R.M. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40 3 (2001). http://domino.research.ibm.com/tchjr/journalindex.nsf/a3807c5b4823c53f85256561006324be/dd12e71773f23bcb85256bfa00685d76?OpenDocument [accessed 01.09.06]
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 31
    • 33846805506 scopus 로고    scopus 로고
    • Risk Management Guide for Information Technology Systems. Special publication 800-30, National Institute of Standards and Technology, [accessed 01.09.06].
  • 32
    • 33846816494 scopus 로고    scopus 로고
    • Site security handbook, RFC 2196, Internet engineering task force, [accessed 10.09.06].
  • 33
    • 33846808827 scopus 로고    scopus 로고
    • Soutar Colin. Biometric systems security, Bioscrypt Inc., [accessed 03.09.06].
  • 34
    • 33846849062 scopus 로고    scopus 로고
    • Study report on biometrics in E-authentication Ver 0.2. InterNational Committee for Information Technology Standards, ; February 2006 [accessed 08.09.06].
  • 35
    • 0002232310 scopus 로고    scopus 로고
    • Technical testing and evaluation of biometric devices
    • [Michigan State University]. Jain A.K., Bolle R., and Pankanti S. (Eds), Kluwer Academic Publisher
    • Wayman J.L. Technical testing and evaluation of biometric devices. [Michigan State University]. In: Jain A.K., Bolle R., and Pankanti S. (Eds). Biometrics - personal identification in networked society (1999), Kluwer Academic Publisher.
    • (1999) Biometrics - personal identification in networked society
    • Wayman, J.L.1
  • 36
    • 85050971468 scopus 로고    scopus 로고
    • Six biometric devices point the finger at security
    • [accessed 29.01.06]
    • Wills D., and Lees M. Six biometric devices point the finger at security. Network Computing (1 June 1998). http://www.networkcomputing.com/910/910r1.html [accessed 29.01.06]
    • (1998) Network Computing
    • Wills, D.1    Lees, M.2
  • 37
    • 33846794336 scopus 로고    scopus 로고
    • Yeung Minerva M, Pankanti Sharath. Verification watermarks on fingerprint recognition and retrieval, [accessed 08.09.06].


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.