{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:06:23Z","timestamp":1740103583234,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T00:00:00Z","timestamp":1523836800000},"content-version":"vor","delay-in-days":105,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013410","name":"Spanish National Cybersecurity Institute","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013410","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play\u2010Doh and other easy\u2010to\u2010obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO\/IEC 30107\u20103.<\/jats:p>","DOI":"10.1155\/2018\/5609195","type":"journal-article","created":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T23:30:46Z","timestamp":1523921446000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3990-7972","authenticated-orcid":false,"given":"Ines","family":"Goicoechea-Telleria","sequence":"first","affiliation":[]},{"given":"Raul","family":"Sanchez-Reillo","sequence":"additional","affiliation":[]},{"given":"Judith","family":"Liu-Jimenez","sequence":"additional","affiliation":[]},{"given":"Ramon","family":"Blanco-Gonzalo","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,4,16]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"Blanco-GonzaloR. Sanchez-ReilloR. Liu-JimenezJ. andSanchez-RedondoC. How to assess user interaction effects in biometric performance Proceedings of the IEEE International Conference on Identity Security and Behavior Analysis (ISBA \u203217) February 2017 https:\/\/doi.org\/10.1109\/ISBA.2017.7947699.","DOI":"10.1109\/ISBA.2017.7947699"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2301517"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_2_9_4_2","doi-asserted-by":"crossref","unstructured":"van der PutteT.andKeuningJ. Biometrical fingerprint recognition: do not get your fingers burned 31 Proceedings of 4th Working Conference on Smart Card Research and Advanced Applications IFIP TC8\/WG8 September 2000 Bristol UK.","DOI":"10.1007\/978-0-387-35528-3_17"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(02)00407-7"},{"key":"e_1_2_9_6_2","unstructured":"ChoiniereA.andLubyshevaT. Novetta\u2014Protecting against Fingerprint Vulnerabilities when Deploying Biometric Systems 2015."},{"key":"e_1_2_9_7_2","unstructured":"Blomm\u00e9J. Evaluation of biometric security systems against artificial fingers 2003."},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.07.002"},{"key":"e_1_2_9_9_2","unstructured":"WieheA. S\u00f8ndrolT. OlsenO. K. andSkarderudF. Attacking fingerprint sensors 2004."},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"MatsumotoT. MatsumotoH. YamadaK. andHoshinoS. Impact of artificial \u2018gummy\u2019 fingers on fingerprint systems 4677 Proceedings of the Optical Security and Counterfeit Deterrence Techniques IV January 2002 275\u2013289 Proceedings of SPIE https:\/\/doi.org\/10.1117\/12.462719 2-s2.0-0036030112.","DOI":"10.1117\/12.462719"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"Galbally-HerreroJ. Fierrez-AguilarJ. Rodriguez-GonzalezJ. D. Alonso-FernandezF. Ortega-GarciaJ. andTapiadorM. On the vulnerability of fingerprint verification systems to fake fingerprints attacks Proceedings of the 40th Annual IEEE International Carnahan Conference on Security Technology October 2006 130\u2013136 https:\/\/doi.org\/10.1109\/CCST.2006.313441 2-s2.0-37849011664.","DOI":"10.1109\/CCST.2006.313441"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.03.016"},{"key":"e_1_2_9_13_2","unstructured":"Frank Chaos Computer Club breaks Apple TouchID 2013 https:\/\/www.ccc.de\/en\/updates\/2013\/ccc-breaks-apple-touchid."},{"key":"e_1_2_9_14_2","article-title":"Hacker fakes German minister\u2019s fingerprints using photos of her hands","author":"Hern A.","year":"2014","journal-title":"The Guardian"},{"key":"e_1_2_9_15_2","unstructured":"Common Criteria Common Criteria for information technology security evaluation part 1: introduction and general model September 2012 revision 4 ISO\/IEC 2012 no. 15408 Common Criteria Part 12012 International Organization for Standardization and International Electrotechnical Commission."},{"key":"e_1_2_9_16_2","unstructured":"Common Criteria Common methodology for information technology security evaluation evaluation methodology September 2012 revision 4 foreword 2012 no. Ccmb-2012-09-004."},{"volume-title":"Text of FDIS 30107-3, Information Technology\u2014Biometric Presentation Attack Detection\u2014Part 3: Testing And Reporting","year":"2009","author":"ISO\/IECJTC 1\/SC37","key":"e_1_2_9_17_2"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"Fernandez-SaavedraB. Sanchez-ReilloR. Liu-JimenezJ. andRuizJ. G. Best practices for the security evaluation of biometric systems Proceedings of the 48th Annual IEEE International Carnahan Conference on Security Technology October 2014 https:\/\/doi.org\/10.1109\/CCST.2014.6987034 2-s2.0-84931036056.","DOI":"10.1109\/CCST.2014.6987034"},{"key":"e_1_2_9_19_2","doi-asserted-by":"crossref","unstructured":"Fernandez-SaavedraB. Sanchez-ReilloR. Alonso-MorenoR. andSanchez-AvilaC. Evaluation methodology for fake samples detection in biometrics Proceedings of the 42nd Annual 2008 IEEE International Carnahan Conference on Security Technology October 2008 233\u2013240 https:\/\/doi.org\/10.1109\/CCST.2008.4751307 2-s2.0-62249094534.","DOI":"10.1109\/CCST.2008.4751307"},{"key":"e_1_2_9_20_2","doi-asserted-by":"crossref","unstructured":"Fernandez-SaavedraB. Sanchez-ReilloR. Sanchez-RedondoC. andBlanco-GonzaloR. Testing of biometric systems integrated in mobile devices Proceedings of the 49th Annual IEEE International Carnahan Conference on Security Technology September 2015 321\u2013326 https:\/\/doi.org\/10.1109\/CCST.2015.7389704 2-s2.0-84964858960.","DOI":"10.1109\/CCST.2015.7389704"},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"Goicoechea-TelleriaI. Liu-JimenezJ. Sanchez-ReilloR. andPonce-HemandezW. Vulnerabilities of biometric systems integrated in mobile devices: an evaluation Proceedings of the 50th Annual IEEE International Carnahan Conference on Security Technology October 2016 https:\/\/doi.org\/10.1109\/CCST.2016.7815677 2-s2.0-85011632898.","DOI":"10.1109\/CCST.2016.7815677"},{"key":"e_1_2_9_22_2","unstructured":"Goicoechea-TelleriaI. Fernandez-SaavedraB. andSanchez-ReilloR. An evaluation of presentation attack detection of fingerprint biometric systems applying ISO\/IEC 30107-3 Proceedings of the International Biometric Performance Testing Conference 2016."},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77627-9"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8973828"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7129505"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031942"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.6"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2065948"},{"key":"e_1_2_9_30_2","unstructured":"ThalheimL. KrisslerJ. andZieglerP.-M. Body Check: Biometrics Defeated 2002 http:\/\/www.pcmag.com\/article2\/0 2817 13919 00.asp."},{"key":"e_1_2_9_31_2","unstructured":"YambayD. GhianiL. DentiP. MarcialisG. L. RoliF. andSchuckersS. LivDet 2009\u2014Fingerprint Liveness Detection Competition 2009 2009."},{"key":"e_1_2_9_32_2","doi-asserted-by":"crossref","unstructured":"YambayD. GhianiL. DentiP. MarcialisG. L. RoliF. andSchuckersS. LivDet 2011\u2014fingerprint liveness detection competition 2011 Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB \u203212) April 2012 208\u2013215.","DOI":"10.1109\/ICB.2012.6199810"},{"key":"e_1_2_9_33_2","doi-asserted-by":"crossref","unstructured":"GhianiL. YambayD. MuraV. ToccoS. MarcialisG. L. RoliF. andSchuckcrsS. LivDet 2013 fingerprint liveness detection competition 2013 Proceedings of the 6th IAPR International Conference on Biometrics (ICB \u203213) June 2013 Madrid Spain 1\u20136.","DOI":"10.1109\/ICB.2013.6613027"},{"key":"e_1_2_9_34_2","doi-asserted-by":"crossref","unstructured":"MuraV. GhianiL. MarcialisG. L. RoliF. YambayD. A. andSchuckersS. A. LivDet 2015 fingerprint liveness detection competition 2015 Proceedings of the 7th IEEE International Conference on Biometrics Theory Applications and Systems (BTAS \u203215) September 2015 https:\/\/doi.org\/10.1109\/BTAS.2015.7358776 2-s2.0-84962882084.","DOI":"10.1109\/BTAS.2015.7358776"},{"key":"e_1_2_9_35_2","unstructured":"CaoK.andJainA. K. Hacking Mobile Phones Using 2D Printed Fingerprints 2016."},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"volume-title":"Multispectral Biometrics: Systems and Applications","year":"2015","author":"Zhang D.","key":"e_1_2_9_37_2"},{"key":"e_1_2_9_38_2","unstructured":"NIST NIST Fingerprint Image Quality Biometric Quality https:\/\/www.nist.gov\/programs-projects\/biometric-quality-homepage."},{"key":"e_1_2_9_39_2","unstructured":"ISO\/IECJTC 1\/SC37 DRAFT INTERNATIONAL STANDARD ISO\/IEC DIS 30107-3 Information technology\u2014Biometric presentation attack detection 2017."},{"key":"e_1_2_9_40_2","unstructured":"NIST NIST Biometric Image Software 2015 http:\/\/www.nist.gov\/itl\/iad\/ig\/nbis.cfm."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5609195.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5609195.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/5609195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:04:12Z","timestamp":1723010652000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/5609195"}},"subtitle":[],"editor":[{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/5609195"],"URL":"https:\/\/doi.org\/10.1155\/2018\/5609195","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-11-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}