PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Abstract: Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive information theft, enormous economic and personnel losses, and even a potential compromise of national security. As a fingerprint that can coincidentally match a specific proportion of the overall fingerprint population, MasterPrint rings the alarm bells for the security of fingerprint authentication. In this paper, we propose a new side-channel attack on the minutiae-based Automatic Fingerprint Identification System (AFIS), called PrintListener, which leverages users' fingertip swiping actions on the screen to extract fingerprint pattern features (the first-level features) and synthesizes a stronger targeted PatternMasterPrint with potential second-level features. The attack scenario of PrintListener is extensive and covert. It only needs to record users' fingertip friction sound and can be launched by leveraging a large number of social media platforms. Extensive experimental results in realworld scenarios show that Printlistener can significantly improve the attack potency of MasterPrint.
- Y. Zhang, Z. Chen, H. Xue, and T. Wei, “Fingerprints on mobile devices: Abusing and leaking,” in Black Hat Conference, 2015.
- I. Echizen and T. Ogane, “Biometricjammer: method to prevent acquisition of biometric information by surreptitious photography on fingerprints,” IEICE TRANSACTIONS on Information and Systems, vol. 101, no. 1, pp. 2–12, 2018.
- A. Roy, N. Memon, and A. Ross, “Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2013–2025, 2017.
- P. Bontrager, A. Roy, J. Togelius, N. Memon, and A. Ross, “Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution,” in Proc. of IEEE BTAS, 2018, pp. 1–9.
- A. S. Rathore, W. Zhu, A. Daiyan, C. Xu, K. Wang, F. Lin, K. Ren, and W. Xu, “Sonicprint: a generally adoptable and secure fingerprint biometrics in smart devices,” in Proc. of ACM MobiSys, 2020, pp. 121–134.
- Z. Shu, Z. Wang, G. Yang, C. Zang, Z. Ma, F. Lin, and K. Ren, “Fingersound: A low-cost and deployable authentication system with fingertip sliding sound,” in Proc. of IEEE ICPADS, 2023, pp. 33–40.
- M. Zhou, Y. Zhou, S. Su, Q. Wang, Q. Li, S. Hu, C. Yu, and Z. Li, “Fingerpattern: Securing pattern lock via fingerprint-dependent friction sound,” IEEE Transactions on Mobile Computing, vol. PP, pp. 1–1, DOI: 10.1109/TMC.2023.3 338 148, 2023.
- R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, “Fingerprint image reconstruction from standard templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, 2007.
- K. Karu and A. K. Jain, “Fingerprint classification,” Pattern Recognition, vol. 29, no. 3, pp. 389–404, 1996.
- D. Yambay, L. Ghiani, P. Denti, G. L. Marcialis, F. Roli, and S. Schuckers, “Livdet 2011—fingerprint liveness detection competition 2011,” in Proc. of IEEE ICB, 2012, pp. 208–215.
- A. Akay, “Acoustics of friction,” The Journal of the Acoustical Society of America, vol. 111, no. 4, pp. 1525–1548, 2002.
- H. Zahouani, R. Vargiolu, G. Boyer, C. Pailler-Mattei, L. Laquièze, and A. Mavon, “Friction noise of human skin in vivo,” Wear, vol. 267, no. 5-8, pp. 1274–1280, 2009.
- H. B. Abdelounis, A. Le Bot, J. Perret-Liaudet, and H. Zahouani, “An experimental study on roughness noise of dry rough flat surfaces,” Wear, vol. 268, no. 1-2, pp. 335–345, 2010.
- S. Derler, M. Preiswerk, G.-M. Rotaru, J.-P. Kaiser, and R. Rossi, “Friction mechanisms and abrasion of the human finger pad in contact with rough surfaces,” Tribology International, vol. 89, pp. 119–127, 2015.
- M. Zhou, Q. Wang, K. Ren, D. Koutsonikolas, L. Su, and Y. Chen, “Dolphin: Real-time hidden acoustic signal capture with smartphones,” IEEE Transactions on Mobile Computing, vol. 18, no. 3, pp. 560–573, 2019.
- Y. Neuvo, D. Cheng-Yu, and S. Mitra, “Interpolated finite impulse response filters,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 32, no. 3, pp. 563–570, 1984.
- M. T. Islam, U. Saha, K. Shahid, A. B. Hussain, and C. Shahnaz, “Speech enhancement based on non-stationary noise-driven geometric spectral subtraction and phase spectrum compensation,” arXiv:1803.02870, 2018.
- L. Nanni, G. Maguolo, and M. Paci, “Data augmentation approaches for improving animal audio classification,” Ecological Informatics, vol. 57, p. 101084, 2020.
- W. Verhelst and M. Roelands, “An overlap-add technique based on waveform similarity (wsola) for high quality time-scale modification of speech,” in Proc. of IEEE ICASSP, vol. 2, 1993, pp. 554–557.
- H. Peng, F. Long, and C. Ding, “Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1226–1238, 2005.
- K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. of IEEE CVPR, 2016, pp. 770–778.
- G. S. Bumbrah, R. M. Sharma, and O. P. Jasuja, “Emerging latent fingerprint technologies: a review,” Research and Reports in Forensic Medical Science, vol. 6, pp. 39–50, 2016.
- W. Wang, W. Gu, P. Liu, J. Liu, X. Wang, J. Liu, X. Yu, W. S. Wong, and Y. Zhang, “Heterogeneously-wetting glass with enhanced anti-fingerprint properties,” Chemical Engineering Journal, vol. 430, p. 132902, 2022.
- K. Cao and A. K. Jain, “Automated latent fingerprint recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 4, pp. 788–800, 2018.
- Z. Zhang, S. Liu, and M. Liu, “A multi-task fully deep convolutional neural network for contactless fingerprint minutiae extraction,” Pattern Recognition, vol. 120, p. 108189, 2021.
- K. Cao and A. K. Jain, “Hacking mobile phones using 2d printed fingerprints,” Michigan State University, Tech. Rep. MSU-CSE-16-2, 2016.
- Y. Chen, Y. Yu, and L. Zhai, “Infinitygauntlet: Brute-force attack on smartphone fingerprint authentication,” in Proc. of USENIX Security, 2023.
- D. Asonov and R. Agrawal, “Keyboard acoustic emanations,” in Proc. of IEEE S&P, 2004, pp. 3–11.
- Y. Berger, A. Wool, and A. Yeredor, “Dictionary attacks using keyboard acoustic emanations,” in Proc. of ACM CCS, 2006, pp. 245–254.
- L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” ACM Transactions on Information and System Security, vol. 13, no. 1, p. 3, 2009.
- T. Zhu, Q. Ma, S. Zhang, and Y. Liu, “Context-free attacks using keyboard acoustic emanations,” in Proc. of ACM CCS, 2014, pp. 453–464.
- J. Wang, K. Zhao, X. Zhang, and C. Peng, “Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization,” in Proc. of ACM MobiSys, 2014, pp. 14–27.
- J. Liu, Y. Wang, G. Kar, Y. Chen, J. Yang, and M. Gruteser, “Snooping keystrokes with mm-level audio ranging on a single phone,” in Proc. of ACM MobiCom, 2015, pp. 142–154.
- D. Arp, E. Quiring, C. Wressnegger, and K. Rieck, “Privacy threats through ultrasonic side channels on mobile devices,” in Proc. of IEEE EuroS&P, 2017, pp. 35–47.
- M. Zhou, Q. Wang, J. Yang, Q. Li, F. Xiao, Z. Wang, and X. Chen, “Patternlistener: Cracking android pattern lock using acoustic signals,” in Proc. of ACM CCS, 2018, pp. 1775–1787.
- X. Liu, Y. Li, and R. H. Deng, “Ultrapin: Inferring pin entries via ultrasound,” in Proc. of ACM AsiaCCS, 2021, pp. 944–957.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.