CS G357: Computer Security, Privacy and Usability Simson L. Garfinkel.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Ch. 11: IS Security Gerhard Steinke BUS 3620
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
BIOMETRICS.
Biometrics Tasanawan Soonklang. 2 Biometrics Biometrics – what is? Applications – who use? Operation – how does it work? Types – what are the different?
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Gerhard Steinke BUS 3620 Steinke1 According to Internetworldstats.com, there are 2,405,518,376Internetworldstats.com internet users worldwide.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
Challenge/Response Authentication
Challenge/Response Authentication
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

CS G357: Computer Security, Privacy and Usability Simson L. Garfinkel

Analysis of HW5: Good Reports Explains what tools were used Explains what was found. Gives specific details without compromising privacy

HW5: Things to avoid Spending more than a paragraph describing your tools Giving a few paragraphs of vague generalities talking about what was found. Listing filenames without any thought as to what might be in the files.

Schedule Issues Option #1 - Class on July 5th: ***** Option #2 - Class on July 8th: ***** Option #3 - July 1 till 9pm : *******

Final Projects You will need to have groups of two. Justification: Two people can do a better project than one person. Group work ethic should prevent some people from leaving this to the last minute. You can write code, you can do policy, but the best projects will do both.

Biometrics and Privacy Simson L. Garfinkel

Biometrics Something that you know Something that you have Something that you are

Uses of Biometrics: Simple: Verification – Is this who he claims to be? Identification – who is this? Advanced: Detecting multiple identities Patrolling public spaces

Why the Interest in Biometrics? Convenient Passwords are not user-friendly Perceived as more secure May actually be more secure May be useful as a deterrent Passive identification

Verification Compare a sample against a single stored template Typical application: voice lock ?

Identification Search a sample against a database of templates. Typical application: identifying fingerprints ?

Bertillion System of Anthropomorphic Measurement Alphonse Bertillion Appointed to Prefecture of Police in 1877 as Records Clerk Biometrics to give harsher sentences to repeat offenders Measurements: Head size Fingers Distance between eyes Scars Etc… Key advance: Classification System Discredited in 1903: Will West was not William West

Fingerprints (ca ) Henry Faulds letter to Nature (1880) Fingerprints might be useful for crime scene investigations W. J. Herschel letter to Nature (1880) Had been using fingerprints in India for 20 years; suggested a universal registration system to establish identity and prevent impersonations

Fingerprints after Faulds… Pudd’nhead Wilson, Mark Twain (Century Magazine, 1893) Prints quickly become tool of police. Manual card systems: 10 point classification Scaling problems in the mid 1970s. AFIS introduced in the 1980s Solves back murder cases Cuts burglary rates in San Francisco, other cities.

VoiceKey (ca. 1989) Access Control System Z80 Microprocessor PLC coding 40 stored templates 4-digit PINs False negative rate: 0-25% False positive rate: 0%* “Airplane”

Biometrics Today Fingerprints Retina Prints Face Prints DNA Identification Voice Prints Palm Prints Handwriting Analysis Etc…

Biometrics In Practice… Inherently not democratic Always have a back door Discrimination function tradeoffs: Low false negatives => high false positives Low false positives => high false negatives

Policy Issues That Effect Biometrics: Strong identification may not be necessary or appropriate in many circumstances Voters may be scared off if forced to give a fingerprint Authorization can be granted to the individual or to the template. It is frequently not necessary to identify an individual with a name.

Biometrics and Privacy Long association of biometrics with crime-fighting Biometrics collected for one purpose can be used for another

Accuracy Rates: False Match Rate (FMR) Single False Match Rate vs. System False Match Rate If the FMR is 1/10,000 but you have 10,000 templates on file — odds of a match are very high False Nonmatch Rate (FNR) Failure-to-Enroll (FTE) rate Ability to Verify (ATV) rate: % of user population that can be verified ATV = (1-FTE)(1-FNMR)

Other Issues: Stability of Characteristic ofver Lifetime Suitability for Logical and Physical Access Difficulty of Usage

Biometrics in Detail

Finger-scan A live acquisition of a person’s fingerprint. Image Acquisition  Image Processing  Template Creation  Template Matching Acquisition Devices: Glass plate Electronic Ultrasound

Fingerprint SWAD Strengths: Fingerprints don’t change over time Widely believed fingerprints are unique Weaknesses: Scars Attacks: Surgery to alter or remove prints Finger Decapitation “Gummy fingers” Corruption of the database Defenses: Measure physical properties of a live finger (pulse)

Facial Scan Based on video Images Templates can be based on previously- recorded images Technologies: Eigenface Approach Feature Analysis (Visionics) Neural Network

Facial Scan: SWAD Strengths: Database can be built from driver’s license records, visas, etc. Can be applied covertly (surveillance photos). (Super Bowl 2001) Few people object to having their photo taken Weaknesses: No real scientific validation Attacks: Surgery Facial Hair Hats Turning away from the camera Defenses: Scanning stations with mandated poses

Iris Scan Image Acquisition  Image Processing  Template Creation  Template Matching Uses to date: Physical access control Computer authentication

Iris Scan: SWAD Strengths: 300+ characteristics; 200 required for match Weaknesses: Fear Discomfort Proprietary acquisition device Algorithms may not work on all individuals No large databases Attacks: Surgery (Minority Report ) Defenses:

Voice Identification Scripted vs. non-scripted

Voice: SWAD Strengths: Most systems have audio hardware Works over the telephone Can be done covertly Lack of negative perception Weaknesses: Background noise (airplanes) No large database of voice samples Attacks: Tape recordings Identical twins / soundalikes Defenses:

Hand Scan Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure Primarily for access control: Machine rooms Olympics Strengths: No negative connotations – non-intrusive Reasonably robust systems Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification Bulky scanner

Oddballs Retina Scan Very popular in the 1980s military; not used much anymore. Facial Thermograms Vein identification Scent Detection Gait recognition

DNA Identification RFLP - Restriction Fragment Length Polymorphism Widely accepted for crime scenes Twin problem

Behavior Biometrics: Handwriting (static & dynamic) Keystroke dynamics

Classifying Biometrics

Template Size BiometricApprox Template Size Voice70k – 80k Face84 bytes – 2k Signature500 bytes – 1000 bytes Fingerprint256 bytes – 1.2k Hand Geometry9 bytes Iris256 bytes – 512 bytes Retina96 bytes

Passive vs. Active Passive: Latent fingerprints Face recognition DNA identification Active Fingerprint reader Voice recognition (?) Iris identification (?)

Knowing vs. Unknowing Knowing: Fingerprint reader Hand geometry Voice prints* Iris prints (?) Unknowing: Latent fingerprints

Body Present vs. Body Absent Performance-based biometrics Voice print Hand Geometry Facial Thermograms Iris Prints Fingerprint DNA Identification

Template: Copy or Summary Copy Original fingerprint Original DNA sample Summary Iris Prints Voice Prints DNA RFLPs

Racial Clustering? Inherited? Racial Clustering DNA fingerprints No Racial Clustering Fingerprints? Iris prints

Racial Clustering? Inherited? Racial Clustering DNA fingerprints No Racial Clustering Fingerprints? Iris prints

System Design and Civil Liberties Biometric Verification Is biometric verified locally or sent over a network? Biometric Template: Matches a name?  “Simson L. Garfinkel” Matches a right?  “May open the door.”

Identity Card Card has: Biometric Digital Signature? Database Identifier? Central Database has: Biometric? Biometric Template?

Biometric Encryption Big problems: Biometrics are noisy Need for “error correction” Potential Problems: Encryption with a 10-bit key? Are some “corrected” values more likely than others? What happens when the person changes --- you still need a back door.