Transfer Learning

  • PDF / 825,165 Bytes
  • 34 Pages / 547.087 x 737.008 pts Page_size
  • 98 Downloads / 212 Views

DOWNLOAD

REPORT


and procedures are never allowed without the proper authorization. In its more strict implementations, this Operating System will have attack detection mechanisms. If the attack is of a certain level, the Operating System may even delete all its code and/or data.

Introduction

Tamper-Proof The term tamper-proof refers to as a functionality of a device that enables the system to resist and/or protect itself from tampering acts. This functionality sometimes implemented as a combination of a selfdestruction mechanism and sensors that detect any unauthorized access to the device including vandalism. This functionality is also known as temper-resistant or anti-tampering. ▶ Finger Vein Reader

Tamper-proof Operating System R AUL S ANCHEZ -R EILLO University Carlos III of Madrid; Avda. Universidad, Leganes (Madrid), Spain

Synonyms Malicious-code-free Operating System; Secure Biometric Token Operating System

The handling of sensible data in Information Systems is currently very usual. Which data is to be considered sensible is up to the application, but at least we can consider those such as personal data, financial data as well as access control data. Actors dealing with such Information System (clients/citizens, service providers, integrators, etc.) have to be aware of the security level achieved within the system. Although this is a very important issue in any system, when biometric information is handled it becomes a critical point. Reason for this is that biometric information is permanently valid, as it is expected to be kept the same during the whole life of a person. While a private key can be changed as desired and even cancelled, a user cannot change his fingerprint (unless changing finger) or even cancel it. If cancelling biometric raw data, the user will be limited, in case of fingerprints, to 10 successful attacks during his/her whole life. These kind of considerations has already been published even back to 1998, as it can be read in [1]. Therefore, biometric systems have to be kept as secure as possible. There are several Potential Vulnerable Points (PVPs) in any Biometric System, as it can be seen in Fig. 1. All those 9 PVPs have to be considered when designing a biometric solution. A good introduction to threats in a Biometric System can be found in [2, 3], and in BEM [4]. 

Definition Operating System with a robust design, as not to allow the execution of malicious code. Access to internal data #

2009 Springer Science+Business Media, LLC

PVP 1 has to deal with user attitudes, as well as capture device front end. Regarding user attitude, an authorised user can provide his own biometricsample to an impostor unknowingly, unwillingly, or even willingly. From the capture device

1316

T

Tamper-proof Operating System

Tamper-proof Operating System. Figure 1 Potential vulnerable points in a Biometric System where Enrolment is considered secured.

front-end point of view, such device may not be able to: – Detect a nonlive sample – Detect the quality of the input sample, being able to discard those under a d