{"title":"智能设备指纹认证与安全风险","authors":"Muhammad Rehman Zafar, M. A. Shah","doi":"10.1109/IConAC.2016.7604977","DOIUrl":null,"url":null,"abstract":"The smartphone market is growing rapidly and enriching our digital lives by instant of information sharing. As smartphone devices contain sensitive data of users, it is very essential to protect this information efficiently. To fulfill this, modern smartphones are adopting fingerprint scanners for biometric authentication. Fingerprint biometric authentication is simple and quick, however, it is vulnerable to attacks as hackers can steel fingerprint biometric data. Therefore, a consistent fingerprint biometric authentication mechanism is required to protect personal information of the user as well as biometrics data. In this paper, we will analyze different attacks and security risks associated with fingerprint authentication. Previously, there are eight levels of attacks studied to compromise biometric data. Here, we propose two additional levels of attacks to provide a more robust mechanism to deal with security vulnerabilities in future.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"41 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Fingerprint authentication and security risks in smart devices\",\"authors\":\"Muhammad Rehman Zafar, M. A. Shah\",\"doi\":\"10.1109/IConAC.2016.7604977\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The smartphone market is growing rapidly and enriching our digital lives by instant of information sharing. As smartphone devices contain sensitive data of users, it is very essential to protect this information efficiently. To fulfill this, modern smartphones are adopting fingerprint scanners for biometric authentication. Fingerprint biometric authentication is simple and quick, however, it is vulnerable to attacks as hackers can steel fingerprint biometric data. Therefore, a consistent fingerprint biometric authentication mechanism is required to protect personal information of the user as well as biometrics data. In this paper, we will analyze different attacks and security risks associated with fingerprint authentication. Previously, there are eight levels of attacks studied to compromise biometric data. Here, we propose two additional levels of attacks to provide a more robust mechanism to deal with security vulnerabilities in future.\",\"PeriodicalId\":375052,\"journal\":{\"name\":\"2016 22nd International Conference on Automation and Computing (ICAC)\",\"volume\":\"41 8\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 22nd International Conference on Automation and Computing (ICAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IConAC.2016.7604977\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 22nd International Conference on Automation and Computing (ICAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IConAC.2016.7604977","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fingerprint authentication and security risks in smart devices
The smartphone market is growing rapidly and enriching our digital lives by instant of information sharing. As smartphone devices contain sensitive data of users, it is very essential to protect this information efficiently. To fulfill this, modern smartphones are adopting fingerprint scanners for biometric authentication. Fingerprint biometric authentication is simple and quick, however, it is vulnerable to attacks as hackers can steel fingerprint biometric data. Therefore, a consistent fingerprint biometric authentication mechanism is required to protect personal information of the user as well as biometrics data. In this paper, we will analyze different attacks and security risks associated with fingerprint authentication. Previously, there are eight levels of attacks studied to compromise biometric data. Here, we propose two additional levels of attacks to provide a more robust mechanism to deal with security vulnerabilities in future.