Poster: Rethinking fingerprint identification on smartphones

Seungyeon Kim, Hoyeon Lee, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Modern smartphones popularly adopt a small touch sensor for fingerprint identification of a user, but it captures only a partial limited portion of a fingerprint. Recently we have studied a gap between actual risk and user perception of latent fingerprints remaining on a smartphone, and developed a fake fingerprint a.ack that exploits the latent fingerprints as actual risk. We successfully reconstructed a fake fingerprint image in good quality for small touch sensors. In this paper, we subsequently conduct post hoc experimental studies on the facts that we have missed or have since learned. First of all, we examine that the presented a.ack is not conceptual but realistic. We employ the reconstructed image and make its fake fingerprint, using a conductive printing or a silicon-like glue, to pass directly the touch sensor of real smartphones. Our target smartphones are Samsung Galaxy S6, S7 and iPhone 5s, 6, 7. Indeed we have succeeded in passing Galaxy S6, S7, and now work on the remaining smartphones. We also conduct an experimental study for one of our mitigation methods to see how it can reduce actual risk. Finally, we perform a user survey study to understand user perception on the fake fingerprint a.acks and the mitigation methods.

Original languageEnglish
Title of host publicationCCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages2515-2517
Number of pages3
ISBN (Electronic)9781450349468
DOIs
Publication statusPublished - 2017 Oct 30
Event24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 - Dallas, United States
Duration: 2017 Oct 302017 Nov 3

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017
CountryUnited States
CityDallas
Period17/10/3017/11/3

Fingerprint

Smartphones
Galaxies
Sensors
Glues
Printing
Silicon

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Cite this

Kim, S., Lee, H., & Kwon, T. (2017). Poster: Rethinking fingerprint identification on smartphones. In CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 2515-2517). (Proceedings of the ACM Conference on Computer and Communications Security). Association for Computing Machinery. https://doi.org/10.1145/3133956.3138832
Kim, Seungyeon ; Lee, Hoyeon ; Kwon, Taekyoung. / Poster : Rethinking fingerprint identification on smartphones. CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2017. pp. 2515-2517 (Proceedings of the ACM Conference on Computer and Communications Security).
@inproceedings{483d708d02a04c6a8634bb057dd3fdeb,
title = "Poster: Rethinking fingerprint identification on smartphones",
abstract = "Modern smartphones popularly adopt a small touch sensor for fingerprint identification of a user, but it captures only a partial limited portion of a fingerprint. Recently we have studied a gap between actual risk and user perception of latent fingerprints remaining on a smartphone, and developed a fake fingerprint a.ack that exploits the latent fingerprints as actual risk. We successfully reconstructed a fake fingerprint image in good quality for small touch sensors. In this paper, we subsequently conduct post hoc experimental studies on the facts that we have missed or have since learned. First of all, we examine that the presented a.ack is not conceptual but realistic. We employ the reconstructed image and make its fake fingerprint, using a conductive printing or a silicon-like glue, to pass directly the touch sensor of real smartphones. Our target smartphones are Samsung Galaxy S6, S7 and iPhone 5s, 6, 7. Indeed we have succeeded in passing Galaxy S6, S7, and now work on the remaining smartphones. We also conduct an experimental study for one of our mitigation methods to see how it can reduce actual risk. Finally, we perform a user survey study to understand user perception on the fake fingerprint a.acks and the mitigation methods.",
author = "Seungyeon Kim and Hoyeon Lee and Taekyoung Kwon",
year = "2017",
month = "10",
day = "30",
doi = "10.1145/3133956.3138832",
language = "English",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",
pages = "2515--2517",
booktitle = "CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security",

}

Kim, S, Lee, H & Kwon, T 2017, Poster: Rethinking fingerprint identification on smartphones. in CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 2515-2517, 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, United States, 17/10/30. https://doi.org/10.1145/3133956.3138832

Poster : Rethinking fingerprint identification on smartphones. / Kim, Seungyeon; Lee, Hoyeon; Kwon, Taekyoung.

CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2017. p. 2515-2517 (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Poster

T2 - Rethinking fingerprint identification on smartphones

AU - Kim, Seungyeon

AU - Lee, Hoyeon

AU - Kwon, Taekyoung

PY - 2017/10/30

Y1 - 2017/10/30

N2 - Modern smartphones popularly adopt a small touch sensor for fingerprint identification of a user, but it captures only a partial limited portion of a fingerprint. Recently we have studied a gap between actual risk and user perception of latent fingerprints remaining on a smartphone, and developed a fake fingerprint a.ack that exploits the latent fingerprints as actual risk. We successfully reconstructed a fake fingerprint image in good quality for small touch sensors. In this paper, we subsequently conduct post hoc experimental studies on the facts that we have missed or have since learned. First of all, we examine that the presented a.ack is not conceptual but realistic. We employ the reconstructed image and make its fake fingerprint, using a conductive printing or a silicon-like glue, to pass directly the touch sensor of real smartphones. Our target smartphones are Samsung Galaxy S6, S7 and iPhone 5s, 6, 7. Indeed we have succeeded in passing Galaxy S6, S7, and now work on the remaining smartphones. We also conduct an experimental study for one of our mitigation methods to see how it can reduce actual risk. Finally, we perform a user survey study to understand user perception on the fake fingerprint a.acks and the mitigation methods.

AB - Modern smartphones popularly adopt a small touch sensor for fingerprint identification of a user, but it captures only a partial limited portion of a fingerprint. Recently we have studied a gap between actual risk and user perception of latent fingerprints remaining on a smartphone, and developed a fake fingerprint a.ack that exploits the latent fingerprints as actual risk. We successfully reconstructed a fake fingerprint image in good quality for small touch sensors. In this paper, we subsequently conduct post hoc experimental studies on the facts that we have missed or have since learned. First of all, we examine that the presented a.ack is not conceptual but realistic. We employ the reconstructed image and make its fake fingerprint, using a conductive printing or a silicon-like glue, to pass directly the touch sensor of real smartphones. Our target smartphones are Samsung Galaxy S6, S7 and iPhone 5s, 6, 7. Indeed we have succeeded in passing Galaxy S6, S7, and now work on the remaining smartphones. We also conduct an experimental study for one of our mitigation methods to see how it can reduce actual risk. Finally, we perform a user survey study to understand user perception on the fake fingerprint a.acks and the mitigation methods.

UR - http://www.scopus.com/inward/record.url?scp=85038914980&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85038914980&partnerID=8YFLogxK

U2 - 10.1145/3133956.3138832

DO - 10.1145/3133956.3138832

M3 - Conference contribution

AN - SCOPUS:85038914980

T3 - Proceedings of the ACM Conference on Computer and Communications Security

SP - 2515

EP - 2517

BT - CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security

PB - Association for Computing Machinery

ER -

Kim S, Lee H, Kwon T. Poster: Rethinking fingerprint identification on smartphones. In CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery. 2017. p. 2515-2517. (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/3133956.3138832