Broken Hearted: How To Attack ECG Biometrics
نویسندگان
چکیده
In this work we present a systematic presentation attack against ECG biometrics. We demonstrate the attack’s effectiveness using the Nymi Band, a wrist band that uses electrocardiography (ECG) as a biometric to authenticate the wearer. We instantiate the attack using a hardware-based Arbitrary Waveform Generator (AWG), an AWG software using a computer sound card, and the playback of ECG signals encoded as .wav files using an off-the-shelf audio player. In two sets of experiments we collect data from a total of 41 participants using a variety of ECG monitors, including a medical monitor, a smartphone-based mobile monitor and the Nymi Band itself. We use the first dataset to understand the statistical differences in biometric features that arise from using different measurement devices and modes. Such differences are addressed through the automated derivation of so-called mapping functions, whose purpose is to transform ECG signals from any device in order to resemble the morphology of the signals recorded with the Nymi Band. As part of our second dataset, we enroll users into the Nymi Band and test whether data from any of our sources can be used for a signal injection attack. Using data collected directly on the Nymi Band we achieve a success rate of 81%. When only using data gathered on other devices, this rate decreases to 43% when using raw data, and 62% after applying the mapping function. While we demonstrate the attack on the Nymi Band, we expect other ECG-based authentication systems to most likely suffer from the same, fundamental weaknesses.
منابع مشابه
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts
Attacks on behavioral biometrics have become increasingly popular. Most research has been focused on presenting a previously obtained feature vector to the biometric sensor, often by the attacker training themselves to change their behavior to match that of the victim. However, obtaining the victim’s biometric information may not be easy, especially when the user’s template on the authenticatio...
متن کاملElectrocardiogram for Biometrics by using Adaptive Multilayer Generalized Learning Vector Quantization (AMGLVQ): Integrating Feature Extraction and Classification
Electrocardiogram (ECG) signal for human identity recognition is a new area on biometrics research. The ECG is a vital signal of human body, unique, robustness to attack, universality and permanence, difference to others traditional biometrics technic. This study also proposes Adaptive Multilayer Generalized Learning Vector Quantization (AMGLVQ), that integrating feature extraction and classifi...
متن کاملFusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system
This paper explores the effectiveness of a novel multibiometric system that is resulted from the fusion of the electrocardiogram (ECG) with an unobtrusive biometric face and another biometric fingerprint which is known to be a least obtrusive for efficient individual authentication. The unimodal systems of the face and the fingerprint biometrics are neither secure nor they can achieve the optim...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA collusion attack on the fuzzy vault scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017