"Please enter your PIN" – On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices

11/18/2019
by   Christian Tiefenau, et al.
0

Nowadays, most mobile devices support biometric authentication schemes like fingerprint or face unlock. However, these probabilistic mechanisms can only be activated in combination with a second alternative factor, usually knowledge-based authentication. In this paper, we show that this aspect can be exploited in a bypass attack. In this bypass attack, the attacker forces the user to "bypass" the biometric authentication by, for example, resetting the phone. This forces the user to enter an easy-to-observe passcode instead. We present the threat model and provide preliminary results of an online survey. Based on our results, we discuss potential countermeasures. We conclude that better feedback design and security-optimized fallback mechanisms can help further improve the overall security of mobile unlock mechanisms while preserving usability.

READ FULL TEXT

page 1

page 2

page 3

research
03/27/2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

This paper presents a comprehensive investigation of authentication sche...
research
05/20/2021

Combining PIN and Biometric Identifications as Enhancement to User Authentication in Internet Banking

Internet banking (IB) continues to face security concerns arising from i...
research
05/18/2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

As mobile devices have become indispensable in modern life, mobile secur...
research
05/21/2020

Towards Seamless Authentication for Zoom-Based Online Teaching and Meeting

The lockdowns and travel restrictions in current coronavirus pandemic si...
research
12/07/2017

A Secure Mobile Authentication Alternative to Biometrics

Biometrics are widely used for authentication in consumer devices and bu...
research
09/02/2020

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

For the time being, mobile devices employ implicit authentication mechan...
research
04/12/2023

On the Adversarial Inversion of Deep Biometric Representations

Biometric authentication service providers often claim that it is not po...

Please sign up or login with your details

Forgot password? Click here to reset