Biometric Authentication and Penetration of Smartphones

This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric secu...

Full description

Bibliographic Details
Main Author: Aronsson, Erik
Format: Others
Language:English
Published: Högskolan i Halmstad, Akademin för informationsteknologi 2018
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713
id ndltd-UPSALLA1-oai-DiVA.org-hh-37713
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-hh-377132018-08-21T06:19:33ZBiometric Authentication and Penetration of SmartphonesengAronsson, ErikHögskolan i Halmstad, Akademin för informationsteknologi2018biometricauthenticationpenetrationirisfacefingerprintsmarphoneit-forensikbiometriautentiseringpenetrationirissmartphoneComputer and Information SciencesData- och informationsvetenskapThis study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic biometric
authentication
penetration
iris
face
fingerprint
smarphone
it-forensik
biometri
autentisering
penetration
iris
smartphone
Computer and Information Sciences
Data- och informationsvetenskap
spellingShingle biometric
authentication
penetration
iris
face
fingerprint
smarphone
it-forensik
biometri
autentisering
penetration
iris
smartphone
Computer and Information Sciences
Data- och informationsvetenskap
Aronsson, Erik
Biometric Authentication and Penetration of Smartphones
description This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems.
author Aronsson, Erik
author_facet Aronsson, Erik
author_sort Aronsson, Erik
title Biometric Authentication and Penetration of Smartphones
title_short Biometric Authentication and Penetration of Smartphones
title_full Biometric Authentication and Penetration of Smartphones
title_fullStr Biometric Authentication and Penetration of Smartphones
title_full_unstemmed Biometric Authentication and Penetration of Smartphones
title_sort biometric authentication and penetration of smartphones
publisher Högskolan i Halmstad, Akademin för informationsteknologi
publishDate 2018
url http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713
work_keys_str_mv AT aronssonerik biometricauthenticationandpenetrationofsmartphones
_version_ 1718726078629937152