Regardless of the application domain, adversaries may conduct spoofing attacks in order to bypass an authentication system. The difficulty of fooling a biometric sensor, known as circumvention; can be paired with an additional property based on the easiness of identifying ongoing presentation attacks which could help selecting the most suitable characteristic(s) when designing a biometric system. To such extent, this paper proposes spoofing detectability, as a property of biometric characteristics, to indicate the likelihood of detecting ongoing presentation attacks aiming at overcoming authentication mechanisms. We define and then quantitatively estimate spoofing detectability through unsupervised anomaly detection on publicly available biometric datasets, collecting metric scores which are then converted into the Low, Medium, High categories for 8 different biometric characteristics. We built our results upon unsupervised algorithms as they represent the most suitable answer to the detection of zero-day attacks. Alongside with our experimental process, we show the intrinsic relevance of spoofing detectability to complement circumvention. As a final contribution of the paper, we show how to embed an anomaly-based spoofing detection module into an authentication system for runtime support.

Spoofing detectability as a property of biometric characteristics / Zoppi T.; Schiavone E.; Bicchierai I.; Brancati F.; Bondavalli A.. - ELETTRONICO. - 2940:(2021), pp. 92-105. (Intervento presentato al convegno 5th Italian Conference on Cybersecurity, ITASEC 2021 nel 2021).

Spoofing detectability as a property of biometric characteristics

Zoppi T.;Bondavalli A.
2021

Abstract

Regardless of the application domain, adversaries may conduct spoofing attacks in order to bypass an authentication system. The difficulty of fooling a biometric sensor, known as circumvention; can be paired with an additional property based on the easiness of identifying ongoing presentation attacks which could help selecting the most suitable characteristic(s) when designing a biometric system. To such extent, this paper proposes spoofing detectability, as a property of biometric characteristics, to indicate the likelihood of detecting ongoing presentation attacks aiming at overcoming authentication mechanisms. We define and then quantitatively estimate spoofing detectability through unsupervised anomaly detection on publicly available biometric datasets, collecting metric scores which are then converted into the Low, Medium, High categories for 8 different biometric characteristics. We built our results upon unsupervised algorithms as they represent the most suitable answer to the detection of zero-day attacks. Alongside with our experimental process, we show the intrinsic relevance of spoofing detectability to complement circumvention. As a final contribution of the paper, we show how to embed an anomaly-based spoofing detection module into an authentication system for runtime support.
2021
CEUR Workshop Proceedings
5th Italian Conference on Cybersecurity, ITASEC 2021
2021
Zoppi T.; Schiavone E.; Bicchierai I.; Brancati F.; Bondavalli A.
File in questo prodotto:
File Dimensione Formato  
paper9.pdf

Accesso chiuso

Tipologia: Pdf editoriale (Version of record)
Licenza: Tutti i diritti riservati
Dimensione 1.68 MB
Formato Adobe PDF
1.68 MB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1294563
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact