Best Practices for the Security Evaluation of Biometric Systems

被引:0
|
作者
Fernandez-Saavedra, Belen [1 ]
Sanchez-Reillo, Raul [2 ]
Liu-Jimenez, Judith [2 ]
Gutierrez Ruiz, Jorge [2 ]
机构
[1] Univ Carlos III Madrid, IDTestingLab, Sci Pk, Madrid, Spain
[2] Univ Carlos III Madrid, GUTI Elect Technol Dept, Madrid, Spain
关键词
biometric systems; security testing; best practices; attack potential;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Best practices to help improve system security
    Robinson, Ken
    Control Engineering, 2019, 66 (02)
  • [42] Recommendations and Best Practices for Cloud Enterprise Security
    Ramachandran, Muthu
    Chang, Victor
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 983 - 988
  • [43] AUTOMATED ASSESSMENT OF COMPLIANCE WITH SECURITY BEST PRACTICES
    Anwar, Zahid
    Campbell, Roy
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 173 - 187
  • [44] Best Practices for Tackling Security Early in Development
    Dave, Rutul
    ELECTRONICS WORLD, 2011, 117 (1908): : 10 - 11
  • [45] Security Best Practices for Military School Classrooms
    Otto, Doug
    Dale, Steven
    Military Engineer, 2023, 115 (746):
  • [46] Challenges and Best Practices in Information Security Management
    McLaughlin, Mark-David
    Gogan, Janis
    MIS QUARTERLY EXECUTIVE, 2018, 17 (03) : 237 - 262
  • [47] Mitigating Security Attacks in Kubernetes Manifests for Security Best Practices Violation
    Shamim, Shazibul Islam
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1689 - 1690
  • [48] A Security Practices Evaluation Framework
    Morrison, Patrick
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 935 - 938
  • [49] On Biometric Encryption using Fingerprint and It's Security Evaluation
    Hidano, Seira
    Ohki, Tetsushi
    Komatsu, Naohisa
    Kasahara, Masao
    2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, : 950 - +
  • [50] Some results on robustness, security and usability of biometric systems
    Lassmann, G
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : A577 - A579