In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure. We show that such attacks can be carried out even by attackers with physical limitations (no digital access to the sensor) and zero knowledge of training data (they know neither decision boundaries nor user template). Based on the adversaries' own templates, they craft several intermediate samples that incrementally bridge the distance between their own template and the legitimate user's. As these adversarial samples are added to the template, the attacker is eventually accepted alongside the leg...
Since, their are numerous advantages of biometrics-based authentication systems over traditional sec...
Authentication systems are vulnerable to model inversion attacks where an adversary is able to appro...
Abstract — In order to render a biometric system robust against malicious tampering, it is important...
Adaptive biometric systems update clients' templates during operation to account for natural changes...
Adaptive biometric recognition systems have been proposed to deal with natural changes of the client...
International audienceSince several years, there is a high interest in the creation of template upda...
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the a...
In this article, we review previous work on biometric security under a recent framework proposed in ...
Since several years, there is a high interest in the cre-ation of template update mechanisms in biom...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
Major improvements in biometric authentication have been made in recent years due to the advancement...
International audienceBiometric recognition is more and more employed in authentication and access c...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Biometric recognition encompasses two operating modes. The first one is biometric identification whi...
Since, their are numerous advantages of biometrics-based authentication systems over traditional sec...
Authentication systems are vulnerable to model inversion attacks where an adversary is able to appro...
Abstract — In order to render a biometric system robust against malicious tampering, it is important...
Adaptive biometric systems update clients' templates during operation to account for natural changes...
Adaptive biometric recognition systems have been proposed to deal with natural changes of the client...
International audienceSince several years, there is a high interest in the creation of template upda...
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the a...
In this article, we review previous work on biometric security under a recent framework proposed in ...
Since several years, there is a high interest in the cre-ation of template update mechanisms in biom...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
Major improvements in biometric authentication have been made in recent years due to the advancement...
International audienceBiometric recognition is more and more employed in authentication and access c...
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with re...
Biometric Authentication Protocols (BAPs) have increasingly been employed to guarantee reliable acce...
Biometric recognition encompasses two operating modes. The first one is biometric identification whi...
Since, their are numerous advantages of biometrics-based authentication systems over traditional sec...
Authentication systems are vulnerable to model inversion attacks where an adversary is able to appro...
Abstract — In order to render a biometric system robust against malicious tampering, it is important...