Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep Clothing Lucas Ballard, Fabian Monrose, Daniel Lopresti USENIX Security.

Slides:



Advertisements
Similar presentations
Chapter 2 The Process of Experimentation
Advertisements

Lecture 6 User Authentication (cont)
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Alvin Kwan Division of Information & Technology Studies
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Chapter 3 Producing Data 1. During most of this semester we go about statistics as if we already have data to work with. This is okay, but a little misleading.
Forged Handwriting Detection Hung-Chun Chen M.S. Thesis in Computer Science Advisors: Drs. Cha and Tappert.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Evaluating Hypotheses
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Experimental Evaluation
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Objectives: You will understand: How analyst can individualize handwriting to a particular person. What types of evidence are submitted to the document.
Navigating and Browsing 3D Models in 3DLIB Hesham Anan, Kurt Maly, Mohammad Zubair Computer Science Dept. Old Dominion University, Norfolk, VA, (anan,
Dr. Engr. Sami ur Rahman Assistant Professor Department of Computer Science University of Malakand Research Methods in Computer Science Lecture: Research.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Handwritten Signatures Authentication using ANNs Committee Machines M.Heinen, F. Osório and P. Engel October Handwritten Signatures Authentication.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
IIT BOMBAYIDP in Educational Technology * Paper Planning Template Resource – Paper-Planning-Template(SPT)Version 1.0, Dec 2013 Download from:
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Where did plants and animals come from? How did I come to be?
For ABA Importance of Individual Subjects Enables applied behavior analysts to discover and refine effective interventions for socially significant behaviors.
Biometrics Authentication Technology
Economics 173 Business Statistics Lecture 4 Fall, 2001 Professor J. Petry
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Disk Failures Eli Alshan. Agenda Articles survey – Failure Trends in a Large Disk Drive Population – Article review – Conclusions – Criticism – Disk failure.
Biometric for Network Security. Finger Biometrics.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
ApproxHadoop Bringing Approximations to MapReduce Frameworks
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Content-Based MP3 Information Retrieval Chueh-Chih Liu Department of Accounting Information Systems Chihlee Institute of Technology 2005/06/16.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
URBDP 591 A Lecture 16: Research Validity and Replication Objectives Guidelines for Writing Final Paper Statistical Conclusion Validity Montecarlo Simulation/Randomization.
Boosting ---one of combining models Xin Li Machine Learning Course.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Challenge/Response Authentication
FACE RECOGNITION TECHNOLOGY
Forged Handwriting Detection
Document Forgery: Handwriting Analysis
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Dynamic Authentication of Typing Patterns
Do now Which of the following is an observational study and which is an experiment? A Stat instructor announces a study session to be held the night.
A maximum likelihood estimation and training on the fly approach
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Presentation transcript:

Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep Clothing Lucas Ballard, Fabian Monrose, Daniel Lopresti USENIX Security Symposium, 2006 Presenter: Tao Li

Motivation To argue that previous assumption that forgers are minimally motivated and attacks can only be mounted by hand is too optimistic and even dangerous To show that the standard approach of evaluation significantly overestimates the security of the handwriting-based key- generation system

What did the authors do? In this paper, the author described their initial steps toward developing evaluation methodologies for behavior biometrics that take into account threat models which have largely been ignored. Presented a generative attack model based on concatenative synthesis that can provide a rapid indication of the security afforded by the system.

Outline Background Information Experimental Design Human Evaluation Generative Evaluation Conclusion

Background Information Obtaining human input as a system security measure Not reproducible by attackers Eg, passwords Online attacks — limited to a number of wrong attemps Offline attacks — limited only to the resources of the attackers, time & memory. When use passwords to derive cryptographic keys, susceptible to offline attacks

What is biometric? An alternative form of user input intended difficultly to be reproduced by attackers A technique for user to authenticate himself to a reference monitor based on biometric characteristics A means for generating user-specific cryptographic keys. Can it survive offline attacks? — Not sure Password hardening: password + biometric

Which is good biometric features? Traditional procedure of biometric as an authenticate paradigm Sampling an input from user Extracting an proper set of features Compare with previously stored templates Confirm or deny the claimed identity Good features exhibit Large inter-class variability Small intra-class variability

How to evaluate biometric systems? The standard model Enroll some users by collecting training samples, eg, handwriting or speech Test the rate at which users ’ attempts to recreate the biometric within a predetermined tolerance fails--False Reject Rate (FRR). False Accept Rate (FAR): rate to fool the system Equal Error Rate (EER): where FRR=FAR The lower EER, the higher the accuracy.

How to evaluate biometric systems? Commonly divided into na ï ve forgeries & skilled forgeries Missing generative models to create synthetic forgeries Evaluation is misleading under such weak security assumptions which underestimates FAR.

Handwriting Biometrics As a first step to provide a strong methodology for evaluate performance, the authors developed a prototype toolkit using handwriting dynamics as a case in point.

Handwriting Biometrics Offline handwriting A 2-D bitmap, eg, a scan of a paper only spatial info. Features extracted from it like bounding boxes and aspect ratios, stroke densities in a particular region, curvature measurements. Online handwriting Sampling the position of a stylus tip over time on digitizing tablet or pen computer temporal and spatial info. Features includes all from offline and timing and stroke order information

Experimental Design Collect data over 2 months analyzing 6 different forgery styles Three standard evaluation metrics Na ï ve — not really forgeries, naturally forgeries Static — created after seeing static rendering of the target user ’ s passphrase Dynamic — using real-time rendering Three more realistic metrics Na ï ve*--similar to na ï ve, except similar writing style attacker Trained — forgeries after attackers are trained Generative — exploit info to algorithmically generate forgery

Data Collection 11,038 handwriting samples collected on digitized pen tablet computers from 50 users during 3 rounds

Data Collection Round one: 1 hour, two data sets First set established a baseline of “ typical ” user writing 5 different phrases — 2 words oxymoron, ten times each Establish biometric templates for authentication Samples for na ï ve and na ï ve* forgeries Second data set, the “ generative corpus ” To create the generative forgeries Consists of a set of 65 oxymoron

Data Collection Round 2, 90 min, 2 weeks later Same users wrote the 5 phases of round 1 ten times, forge representative samples of round 1 to create 2 sets of 17 forgeries Static forgeries — seeing only static representation Dynamic forgeries — seeing a real-time rendering of the phrase

Data Collection Round 3, select nine users and train them Exhibit a natural tendency of better forgery 3 skilled but untrained users each writing style: cursive, mixed, block Train them: forge 15 samples from their own writing styles with real-time reproduction of the target sample.

Authentication System User ’ s writing sample on the electronic tablet represented by 3 signals over time x(t), y(t) for location of the pen p(t) for pen up or down at time t Tablet computes a set of n statistical features (f1,f2, …..fn) over the signals

Authentication System Based on the variation of feature values in a passphrase written m times and human natural variations, generate a n*2 matrix template {{l1,h1}, …..{ln,hn}}. Compare the user sample with feature values f1,f2, …,fn with it. Each fj hj results in an error.

Feature analysis Not only the entropy of each feature, but rather how difficult the feature is to forge For each feature f Rf: proportion of times that f was missed by legitimate users Af: proportion of times that f was missed by forgers from round 2 Q(f)=(Af-Rf+1)/2 Q(f) more closer to 1, the feature more desirable

Feature analysis Divide feature set into temporal and spatial groups and order them based on Q(f), chose top 40 from each group and discard any with a FRR greater than 10%, finally got 15 spatial and 21 temporal features.

Human Evaluation

At seven errors, the trained mixed, block and cursive forgers improved their FAR by 0.47, 0.34 and This improvements results from less than 2 hours ’ training

Generative Evaluation Fining and training skilled forgers is time consuming To explore the use of an automated approach using generative models as a supplementary techniques for evaluating behavioral biometrics. To investigate whether an automated approach, using a limited writing samples from the target, could match the false accept rates observed for the trained forgers

Generative Evaluation The approach to synthesize handwriting is to assemble a collection of basic units (n-grams) that can be combined in a concatenative fashion to mimic authentic handwriting. The basic units are obtained from General population statistics Statistics specific to a demographic of the targeted user Data gathered from the targeted user

Generative Evaluation

Generative signature using some basic units from the database as above Original signature shown below

Generative Evaluation Limit 15 out of the 65 samples of target user and 15 samples of same style users Result: generative attempt only used 6.67 target users ’ writing samples and the average length of an n-gram was 1.64 characters

Conclusion The authors argued in detail that current evaluation of security of biometric system is not accurate, underestimating the threat To prove this, they analyzed a handwriting- based key-generation system and show that the standard approach of evaluation significantly overestimates its security

Conclusion Present a generative attack model based on concatenative synthesis that automatically produce generative forgeries The generative approach matches or exceeds the effectiveness of forgeries rendered by trained humans

Weakness& Where to improve The handwriting-based key-generation system needs lots of people and work. It remains unclear as to the extent to which these forgeries would fool human judges, especially forensic examiners The generative algorithm needs improvement like incorporating other parameters in it to make it more accurate.

Thanks! Any Questions?