Top Banner
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep’s clothing in Sheep’s clothing Lucas Ballard, Fabian Monrose, Daniel Lopresti Presented by : Anuj Sawani 1
15

Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Apr 17, 2018

Download

Documents

lyanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Biometric Authentication Revisited:

Understanding the Impact of Wolves

in Sheep’s clothingin Sheep’s clothingLucas Ballard, Fabian Monrose, Daniel Lopresti

Presented by : Anuj Sawani

1

Page 2: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Biometrics

• What is it?

– identifying, or verifying a person based on

• Physiological characteristics

• Behavioral characteristics

– Examples?– Examples?

• Biometric Authentication vs Identification

– “Am I who I claim to be?”

– “Who am I?”

• Better than passwords?

2

Page 3: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Handwriting as a biometric

• Offline

– 2-D bitmap

• Online

– Real-time data– Real-time data

• Signatures as a biometric?

Feature extraction Hash/Key

3

Page 4: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

So, what’s with the menagerie?

• Sheep

– Easily accepted by the system

• Goats

– Exceptionally unsuccessful at being accepted– Exceptionally unsuccessful at being accepted

• Lambs

– Exceptionally vulnerable to imitations

• Wolves

– Exceptionally successful at imitations

4

Page 5: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

The Threat Model

• Exploiting poorly protected template

databases

• Eavesdropping communication between • Eavesdropping communication between

sensor and the system

• Presenting artificially created samples to the

sensor

5

Page 6: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

A neat idea – Concatenation attack

• Samples of user’s handwriting from other

contexts

• General samples of the style of writing

• Feature analysis …• Feature analysis …

• Generate the user’s handwriting synthetically!

6

Page 7: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Performance Statistics

False Accept Rate (FAR) False Reject Rate (FRR)

Equal Error Rate (ERR)

7

Page 8: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Forgery styles

• Naïve

– Use other users’ writing as it was naturally rendered to forge the passphrase

• Naïve*• Naïve*

– Similar to Naïve, but uses similar writing styles

• Static

– Forgery using an image of the passphrase

• Dynamic

– Real-time rendering of the passphrase

8

Page 9: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Grooming the sheep into wolves

• 11,038 handwriting samples

• Incentives awarded to consistent writers,

“dedicated forgers”

• Three Rounds• Three Rounds

1. Collect the samples

2. Static and Dynamic forging

3. Selected “trained” forgers

9

Page 10: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Handwriting features

• How difficult is the feature to forge?

• Signals – t, x(t), y(t), p(t)

• For every feature f

– rf � missed by legitimate users– rf � missed by legitimate users

– af � missed by forgers

• Quality metric

– Q = (af - rf + 1)/2

• Q = 0 – never reliably reproduced by users

• Q = 1 – never reproduced by forgers

10

Page 11: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

The winning features

• The probability that the ith stroke of c1

connects c2

• Median gap between the adjacent characters

• Median time between end of c and beginning • Median time between end of c1 and beginning

of c2

• Pen-up velocity

• A total of 36 good features out of 144

11

Page 12: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Algorithm to generate a known

passphrase• Select n-grams from different context such that

– g1 || g2 || … ||gk = passphrase

• Normalize t, x(t) and y(t) – match baselines

• Spatial adjustment of x(t)– Use median gap feature

• Fabricate p(t)• Fabricate p(t)– Use probability of connection feature

– Delayed strokes pushed into stack• Executed after each pen-up

• Add time delays– Use median time feature

– Use pen-up velocity and distance between strokes

12

Page 13: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

The system at work…

• Used small sample set of 15 samples of user’s writing

– Each character from passphrase exists in set

– Does not include passphrase– Does not include passphrase

• Also, used 15 samples of similar writing style

• The algorithm caused an EER of 27.4%

– Forgers caused an EER of 20.6%

• n-gram length < 2

• Used 6.67 of the samples on average

13

Page 14: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Conclusion

• Handwriting as a reliable biometric?

– Refutable

• Adversary has been under-estimated till now

• Generative approach produces better • Generative approach produces better

forgeries than trained humans

14

Page 15: Biometric Authentication Revisited: Understanding the ...pdm12/cse544/slides/cse544-biometric-sawani.pdf · Biometric Authentication Revisited: Understanding the Impact of Wolves

Take away

Watch out for the next generation

of wolves!

15