hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Biometric Authentication and Penetration of Smartphones
Halmstad University, School of Information Technology.
2018 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartphones, as well as techniques for circumventing the securityof these systems. These techniques are then used against a selection of smart-phones in order to gauge the resilience of their biometric security. The function,vulnerabilities, and techniques associated with these systems are compiled usinga literature study of published papers and books on the subject. The performedexperiments apply these techniques in the form of presentation attacks directed atthe fingerprint-, face- and iris recognition systems of the examined smartphones.The result of the experiments showed significant differences between the differentsmartphones, where some exhibited flawless security and others showed significantsecurity flaws. Both fingerprint and face recognition systems were successfullycircumvented, while none of the iris recognition systems were breached. No clearlink could be observed between the cost of the device and success rate of attacks,while only devices using the Android operating system were breached. The resultsundeniably showed that some smartphones are vulnerable to the employed tech-niques. It also showed that some of the tested devices had managed to implementmeasures to counteract the applied presentation attacks. The root cause of thevulnerabilities showcased in the experiment is due to the fact that biometric traitscan be copied and reproduced, highlighting a basic flaw of such systems.

Place, publisher, year, edition, pages
2018. , p. 54
Keywords [en]
biometric, authentication, penetration, iris, face, fingerprint, smarphone
Keywords [sv]
it-forensik, biometri, autentisering, penetration, iris, smartphone
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:hh:diva-37713OAI: oai:DiVA.org:hh-37713DiVA, id: diva2:1239173
Educational program
IT Forensics and Information Security, 180 credits
Supervisors
Examiners
Available from: 2018-08-20 Created: 2018-08-15 Last updated: 2018-08-20Bibliographically approved

Open Access in DiVA

fulltext(1256 kB)91 downloads
File information
File name FULLTEXT02.pdfFile size 1256 kBChecksum SHA-512
411a3eca7a7ca8b43683536fdfe5b535bf12af1a0ef625176d16a265f3102fd400db3dce115f6bbd718effef962a2b9ccab13f5855ff1ea5ffc3f9372af5de87
Type fulltextMimetype application/pdf

By organisation
School of Information Technology
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 91 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 397 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf