Options
2010
Conference Paper
Titel
On security evaluation of fingerprint recognition systems
Abstract
This paper discusses the methodology for evaluating the security of fingerprint recognition systems. For keeping track of the multitude of potential vulnerabilities an attack tree is used. Only potential vulnerabilities specific to fingerprint verification systems are considered. The attack tree is truncated where the efforts required for a successful attack (the attack potential) can be estimated. The attack potential of the parent nodes is the aggregation of the attack potentials of the child nodes.