Trace Attack against Biometric Mobile Applications
Autor: | Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Wadood Abdul, Driss Aboutajdine, Mohammed El Haziti |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2016 |
Předmět: |
Biometrics
Article Subject Computer Networks and Communications Computer science business.industry Fingerprint (computing) Internet privacy Data_MISCELLANEOUS 020206 networking & telecommunications 02 engineering and technology TK5101-6720 Computer security computer.software_genre Mobile authentication Computer Science Applications User privacy Order (exchange) 0202 electrical engineering electronic engineering information engineering Identity (object-oriented programming) Telecommunication 020201 artificial intelligence & image processing business Mobile device computer TRACE (psycholinguistics) |
Zdroj: | Mobile Information Systems, Vol 2016 (2016) |
Popis: | With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen). Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy. |
Databáze: | OpenAIRE |
Externí odkaz: |