{"title":"创建有效的指纹伪迹:一种高成功率绕过电容式和光学传感器的合作和非合作方法","authors":"Ryan Carvalho, Norbert Tihanyi","doi":"10.1109/ICCST49569.2021.9717377","DOIUrl":null,"url":null,"abstract":"Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate\",\"authors\":\"Ryan Carvalho, Norbert Tihanyi\",\"doi\":\"10.1109/ICCST49569.2021.9717377\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.\",\"PeriodicalId\":101539,\"journal\":{\"name\":\"2021 International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCST49569.2021.9717377\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCST49569.2021.9717377","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate
Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.