2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN) 2012
DOI: 10.1109/cason.2012.6412400
|View full text |Cite
|
Sign up to set email alerts
|

Threats models on biometri systems: A comparative study

Abstract: Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Penetration testing is conducted to discover hidden vulnerabilities and establish attack vectors that can then be mitigated [41]. Figure 5 shows the system model of TBS with different points of attacks, as identified by the different works in literature [21,66,153,166]. In this figure, only the authentication phase of the system is shown, since enrollment is subsumed in the authentication except for the template creation stage, the security-related significance of which was already described in Section 1.…”
Section: Threats Attacks and Defenses For Tbs And Wbsmentioning
confidence: 99%
“…Penetration testing is conducted to discover hidden vulnerabilities and establish attack vectors that can then be mitigated [41]. Figure 5 shows the system model of TBS with different points of attacks, as identified by the different works in literature [21,66,153,166]. In this figure, only the authentication phase of the system is shown, since enrollment is subsumed in the authentication except for the template creation stage, the security-related significance of which was already described in Section 1.…”
Section: Threats Attacks and Defenses For Tbs And Wbsmentioning
confidence: 99%