Główne pojęcia
Biometric authentication systems face information leakage risks due to fuzzy matchers, impacting data privacy and security.
Streszczenie
The article analyzes information leakage in fuzzy matchers used in biometric authentication systems.
It discusses various scenarios of leakage, including distance, error positions, and values.
Different attacks exploiting the leakage are presented, such as exhaustive search and accumulation attacks.
The impact of leakage on data privacy and security is evaluated, highlighting vulnerabilities in practical applications.
The study provides insights into the complexities of attacks based on different types of leakage.
The article concludes by suggesting potential improvements in attack techniques and the need for further research.
Statystyki
Biometric authentication systems face information leakage risks.
Attacks exploiting leakage below and above the threshold have varying complexities.
Different leakage scenarios provide attackers with varying levels of information.
Cytaty
"The security of the mentioned building blocks is typically assessed through adversarial models that rule out vulnerabilities arising in concrete applications."
"The accumulation attack allows the attacker to recover the secret vector when a genuine authentication leaks bits of information."