
silicon or gelatin, can deceive a fingerprint biometric sensor [9][10]. The proce-
dure for materializing this attack is consisted of three steps. The first step is captur-
ing a fingerprint (e.g. from a glass, a door handle or with the user’s consent). The
second step is creating the artefact, which is a procedure that lasts from a few
hours, to a few days maximum. The final step is using the artefact to access the
system. The use of pictures, masks, voice recordings or speech synthesis tools is
possible to deceive iris, face, and voice recognition systems. As a countermeasure,
it must ensured that vitality detection features, which conduct an extra measure-
ment of one or more attributes, such as the relative dielectric constant, the conduc-
tivity, the heartbeat, the temperature, the blood pressure, the detection of vitality
under the epidermis, or the spontaneous dilation and constriction of the pupil or
eye movement, are integrated in the biometric device.
If these features are not pre-
sent, compensating controls must be applied, such as the deployment of multimo-
dal biometrics (e.g. combination of face and lips movement recognition), or the
implementation of interactive techniques (e.g. the request for the user to say a spe-
cific phrase, or place 3 fingers in a certain order on the sensor).
• Server side - Fake templates: Server based architectures, where the biometric tem-
plates are stored centrally, inherit the vulnerabilities of such systems [14]. A possi-
ble attack can be realized when the impostor inserts his template in the system un-
der someone else’s name. Distributed architectures (e.g. template storage in a
smart card) should be preferred. In that case, the template is stored in a tamper re-
sistant memory module that is write-once and erased or destroyed if its content is
altered, resisting to this type of attack. When this scenario is not an option, strong
security controls must protect the server, including encryption of the templates,
system and network security controls (firewalls, intrusion detection and prevention
mechanisms) and a strong security policy followed by detailed procedures based
on international standards.
• Communication links: Data could be captured from the communication channel,
between the various components of a biometric system [14], such as: the sensor
and the feature extractor, the feature extractor and the matching algorithm or the
matching algorithm and the application, in order to be replayed at another time for
gaining access. This is also called electronic impersonation. An effective counter-
measure is the integration of the various parts of the system into a hardware secu-
rity module, or generally the elimination of the transmission of the biometric tem-
plate. An example of such a module is the biometric smart card, that has a finger-
print sensor and the matching mechanism embedded in it, confining the template to
a secure environment. Similar security levels are addressed in integrated terminal
devices, such as PDAs or mobile phones. If this is not an option, challenge and re-
sponse is another approach for addressing this vulnerability. An additional control
is the introduction of a rule to discard a signal when it is identical to the stored
template or to the last measurement that was conducted.
• Cross system: The utilization of the template in two or more applications with
different security levels (i.e. convenience applications and security applications)
tends to equalize these security levels, by decreasing the higher security level to
the lower one - if a template is compromised in one application, it can be used for
gaining access to the other. A countermeasure, depending on the criticality of the
application, is the deployment of custom encoding algorithms in order to ensure
27