Best Practices for the Security Evaluation of Biometric Systems

被引:0
|
作者
Fernandez-Saavedra, Belen [1 ]
Sanchez-Reillo, Raul [2 ]
Liu-Jimenez, Judith [2 ]
Gutierrez Ruiz, Jorge [2 ]
机构
[1] Univ Carlos III Madrid, IDTestingLab, Sci Pk, Madrid, Spain
[2] Univ Carlos III Madrid, GUTI Elect Technol Dept, Madrid, Spain
关键词
biometric systems; security testing; best practices; attack potential;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Improvement in security evaluation of biometric systems
    Sanchez-Reillo, Raul
    Liu-Jimenez, Judith
    Lorenz, Michael G.
    Entrena, Luis
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 137 - +
  • [2] Vascular biometric systems and their security evaluation
    Sanchez-Reillo, R.
    Fernandez-Saavedra, B.
    Liu-Jimenez, J.
    Sanchez-Avila, C.
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 44 - +
  • [3] Security of Biometric Systems
    Adamek, Milan
    Matysek, Miroslav
    Neumann, Petr
    25TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2014, 2015, 100 : 169 - 176
  • [4] Evaluation of Wireless Access Point Security and Best Practices for Mitigation
    Thomas, Aju Mathew
    Kumaran, Gowtham Akshaya
    Ramaguru, R.
    Harish, R.
    Praveen, K.
    2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 422 - 427
  • [5] Security evaluation of biometric keys
    Al-Assam, Hisham
    Jassim, Sabah
    COMPUTERS & SECURITY, 2012, 31 (02) : 151 - 163
  • [6] On the vulnerability of biometric security systems
    Faúndez-Zanuy, M
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2004, 19 (06) : 3 - 8
  • [7] Best practices cyber security
    Scherer, Rob
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2019, 257
  • [8] Best practices for VoIP security
    VanWart, Scott
    COMMUNICATIONS NEWS, 2007, 44 (08): : 28 - 29
  • [9] BEST PRACTICES IN AUTOMATION SECURITY
    McKay, Murray
    2012 IEEE-IAS/PCA 54TH CEMENT INDUSTRY TECHNICAL CONFERENCE, 2012,