skip to main content
10.1145/3133956.3138832acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Rethinking Fingerprint Identification on Smartphones

Published:30 October 2017Publication History

ABSTRACT

Modern smartphones popularly adopt a small touch sensor for fingerprint identification of a user, but it captures only a partial limited portion of a fingerprint. Recently we have studied a gap between actual risk and user perception of latent fingerprints remaining on a smartphone, and developed a fake fingerprint attack that exploits the latent fingerprints as actual risk. We successfully reconstructed a fake fingerprint image in good quality for small touch sensors. In this paper, we subsequently conduct post hoc experimental studies on the facts that we have missed or have since learned. First of all, we examine that the presented attack is not conceptual but realistic. We employ the reconstructed image and make its fake fingerprint, using a conductive printing or a silicon-like glue, to pass directly the touch sensor of real smartphones. Our target smartphones are Samsung Galaxy S6, S7 and iPhone 5s, 6, 7. Indeed we have succeeded in passing Galaxy S6, S7, and now work on the remaining smartphones. We also conduct an experimental study for one of our mitigation methods to see how it can reduce actual risk. Finally, we perform a user survey study to understand user perception on the fake fingerprint attacks and the mitigation methods.

References

  1. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith 2010. Smudge attacks on smartphone touch screens. In Proceedings of WOOT '10, Vol. Vol. 10. 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kai Cao and Anil K. Jain 2016. Hacking mobile phones using 2D printed fingerprints. Technical Report. Department of Computer Science and Engineering, Michigan State University.Google ScholarGoogle Scholar
  3. Eric Decoux and Patrick Bovey 2017. Marking comprising two patterns on a surface. (Aug. 2017). US Patent 9,747,473.Google ScholarGoogle Scholar
  4. JLaservideo. 2016. How To Copy a Fingerprint Like a Spy - iPhone Touch ID Hack!!! https://www.youtube.com/watch?v=bp-MrrAmprA.Google ScholarGoogle Scholar
  5. Hoyeon Lee, Seungyeon Kim, and Taekyoung Kwon. 2017. Here is your fingerprint! actual risk versus user perception of latent fingerprints and smudges remaining on smartphones. In Proceedings of ACSAC '17.Google ScholarGoogle Scholar
  6. Marc Rogers. 2014. Hacking Apple TouchID on the iPhone 6. https://www.youtube.com/watch?v=GPLiEC_tG1k.Google ScholarGoogle Scholar
  7. Oki Rosgani. 2013. faking the Apple trackID fingerprint sensor. https://www.youtube.com/watch?v=qjRD8_ZoGuE.Google ScholarGoogle Scholar
  8. Dale R Setlak. 2017. Electronic device including finger biometric sensor carried by a touch display and related methods. (Feb. 2017). US Patent 9,582,102.Google ScholarGoogle Scholar
  9. Robert Važan. 2017. SourceAFIS. https://sourceafis.angeloflogic.com/.Google ScholarGoogle Scholar

Index Terms

  1. POSTER: Rethinking Fingerprint Identification on Smartphones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
      October 2017
      2682 pages
      ISBN:9781450349468
      DOI:10.1145/3133956

      Copyright © 2017 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 October 2017

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      CCS '17 Paper Acceptance Rate151of836submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader