Papers
Topics
Authors
Recent
Search
2000 character limit reached

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound

Published 14 Apr 2024 in cs.CR | (2404.09214v1)

Abstract: Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive information theft, enormous economic and personnel losses, and even a potential compromise of national security. As a fingerprint that can coincidentally match a specific proportion of the overall fingerprint population, MasterPrint rings the alarm bells for the security of fingerprint authentication. In this paper, we propose a new side-channel attack on the minutiae-based Automatic Fingerprint Identification System (AFIS), called PrintListener, which leverages users' fingertip swiping actions on the screen to extract fingerprint pattern features (the first-level features) and synthesizes a stronger targeted PatternMasterPrint with potential second-level features. The attack scenario of PrintListener is extensive and covert. It only needs to record users' fingertip friction sound and can be launched by leveraging a large number of social media platforms. Extensive experimental results in realworld scenarios show that Printlistener can significantly improve the attack potency of MasterPrint.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (36)
  1. Y. Zhang, Z. Chen, H. Xue, and T. Wei, “Fingerprints on mobile devices: Abusing and leaking,” in Black Hat Conference, 2015.
  2. I. Echizen and T. Ogane, “Biometricjammer: method to prevent acquisition of biometric information by surreptitious photography on fingerprints,” IEICE TRANSACTIONS on Information and Systems, vol. 101, no. 1, pp. 2–12, 2018.
  3. A. Roy, N. Memon, and A. Ross, “Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2013–2025, 2017.
  4. P. Bontrager, A. Roy, J. Togelius, N. Memon, and A. Ross, “Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution,” in Proc. of IEEE BTAS, 2018, pp. 1–9.
  5. A. S. Rathore, W. Zhu, A. Daiyan, C. Xu, K. Wang, F. Lin, K. Ren, and W. Xu, “Sonicprint: a generally adoptable and secure fingerprint biometrics in smart devices,” in Proc. of ACM MobiSys, 2020, pp. 121–134.
  6. Z. Shu, Z. Wang, G. Yang, C. Zang, Z. Ma, F. Lin, and K. Ren, “Fingersound: A low-cost and deployable authentication system with fingertip sliding sound,” in Proc. of IEEE ICPADS, 2023, pp. 33–40.
  7. M. Zhou, Y. Zhou, S. Su, Q. Wang, Q. Li, S. Hu, C. Yu, and Z. Li, “Fingerpattern: Securing pattern lock via fingerprint-dependent friction sound,” IEEE Transactions on Mobile Computing, vol. PP, pp. 1–1, DOI: 10.1109/TMC.2023.3 338 148, 2023.
  8. R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, “Fingerprint image reconstruction from standard templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, 2007.
  9. K. Karu and A. K. Jain, “Fingerprint classification,” Pattern Recognition, vol. 29, no. 3, pp. 389–404, 1996.
  10. D. Yambay, L. Ghiani, P. Denti, G. L. Marcialis, F. Roli, and S. Schuckers, “Livdet 2011—fingerprint liveness detection competition 2011,” in Proc. of IEEE ICB, 2012, pp. 208–215.
  11. A. Akay, “Acoustics of friction,” The Journal of the Acoustical Society of America, vol. 111, no. 4, pp. 1525–1548, 2002.
  12. H. Zahouani, R. Vargiolu, G. Boyer, C. Pailler-Mattei, L. Laquièze, and A. Mavon, “Friction noise of human skin in vivo,” Wear, vol. 267, no. 5-8, pp. 1274–1280, 2009.
  13. H. B. Abdelounis, A. Le Bot, J. Perret-Liaudet, and H. Zahouani, “An experimental study on roughness noise of dry rough flat surfaces,” Wear, vol. 268, no. 1-2, pp. 335–345, 2010.
  14. S. Derler, M. Preiswerk, G.-M. Rotaru, J.-P. Kaiser, and R. Rossi, “Friction mechanisms and abrasion of the human finger pad in contact with rough surfaces,” Tribology International, vol. 89, pp. 119–127, 2015.
  15. M. Zhou, Q. Wang, K. Ren, D. Koutsonikolas, L. Su, and Y. Chen, “Dolphin: Real-time hidden acoustic signal capture with smartphones,” IEEE Transactions on Mobile Computing, vol. 18, no. 3, pp. 560–573, 2019.
  16. Y. Neuvo, D. Cheng-Yu, and S. Mitra, “Interpolated finite impulse response filters,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 32, no. 3, pp. 563–570, 1984.
  17. M. T. Islam, U. Saha, K. Shahid, A. B. Hussain, and C. Shahnaz, “Speech enhancement based on non-stationary noise-driven geometric spectral subtraction and phase spectrum compensation,” arXiv:1803.02870, 2018.
  18. L. Nanni, G. Maguolo, and M. Paci, “Data augmentation approaches for improving animal audio classification,” Ecological Informatics, vol. 57, p. 101084, 2020.
  19. W. Verhelst and M. Roelands, “An overlap-add technique based on waveform similarity (wsola) for high quality time-scale modification of speech,” in Proc. of IEEE ICASSP, vol. 2, 1993, pp. 554–557.
  20. H. Peng, F. Long, and C. Ding, “Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1226–1238, 2005.
  21. K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proc. of IEEE CVPR, 2016, pp. 770–778.
  22. G. S. Bumbrah, R. M. Sharma, and O. P. Jasuja, “Emerging latent fingerprint technologies: a review,” Research and Reports in Forensic Medical Science, vol. 6, pp. 39–50, 2016.
  23. W. Wang, W. Gu, P. Liu, J. Liu, X. Wang, J. Liu, X. Yu, W. S. Wong, and Y. Zhang, “Heterogeneously-wetting glass with enhanced anti-fingerprint properties,” Chemical Engineering Journal, vol. 430, p. 132902, 2022.
  24. K. Cao and A. K. Jain, “Automated latent fingerprint recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 4, pp. 788–800, 2018.
  25. Z. Zhang, S. Liu, and M. Liu, “A multi-task fully deep convolutional neural network for contactless fingerprint minutiae extraction,” Pattern Recognition, vol. 120, p. 108189, 2021.
  26. K. Cao and A. K. Jain, “Hacking mobile phones using 2d printed fingerprints,” Michigan State University, Tech. Rep. MSU-CSE-16-2, 2016.
  27. Y. Chen, Y. Yu, and L. Zhai, “Infinitygauntlet: Brute-force attack on smartphone fingerprint authentication,” in Proc. of USENIX Security, 2023.
  28. D. Asonov and R. Agrawal, “Keyboard acoustic emanations,” in Proc. of IEEE S&P, 2004, pp. 3–11.
  29. Y. Berger, A. Wool, and A. Yeredor, “Dictionary attacks using keyboard acoustic emanations,” in Proc. of ACM CCS, 2006, pp. 245–254.
  30. L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations revisited,” ACM Transactions on Information and System Security, vol. 13, no. 1, p. 3, 2009.
  31. T. Zhu, Q. Ma, S. Zhang, and Y. Liu, “Context-free attacks using keyboard acoustic emanations,” in Proc. of ACM CCS, 2014, pp. 453–464.
  32. J. Wang, K. Zhao, X. Zhang, and C. Peng, “Ubiquitous keyboard for small mobile devices: harnessing multipath fading for fine-grained keystroke localization,” in Proc. of ACM MobiSys, 2014, pp. 14–27.
  33. J. Liu, Y. Wang, G. Kar, Y. Chen, J. Yang, and M. Gruteser, “Snooping keystrokes with mm-level audio ranging on a single phone,” in Proc. of ACM MobiCom, 2015, pp. 142–154.
  34. D. Arp, E. Quiring, C. Wressnegger, and K. Rieck, “Privacy threats through ultrasonic side channels on mobile devices,” in Proc. of IEEE EuroS&P, 2017, pp. 35–47.
  35. M. Zhou, Q. Wang, J. Yang, Q. Li, F. Xiao, Z. Wang, and X. Chen, “Patternlistener: Cracking android pattern lock using acoustic signals,” in Proc. of ACM CCS, 2018, pp. 1775–1787.
  36. X. Liu, Y. Li, and R. H. Deng, “Ultrapin: Inferring pin entries via ultrasound,” in Proc. of ACM AsiaCCS, 2021, pp. 944–957.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.