Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

Vulnerabilities

Articles 1 - 1 of 1

Full-Text Articles in Systems Architecture

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks Nov 2010

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

Australian Security and Intelligence Conference

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …