A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions
- URL: http://arxiv.org/abs/2411.17321v1
- Date: Tue, 26 Nov 2024 11:10:11 GMT
- Title: A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions
- Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Galeb, Chris Eckl,
- Abstract summary: This paper introduces a formal framework for constructing secure and privacy-preserving biometric systems.
By leveraging the principles of universal composability, we enable the modular analysis and verification of individual system components.
- Score: 1.5446015139136167
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Biometric systems, while offering convenient authentication, often fall short in providing rigorous security assurances. A primary reason is the ad-hoc design of protocols and components, which hinders the establishment of comprehensive security proofs. This paper introduces a formal framework for constructing secure and privacy-preserving biometric systems. By leveraging the principles of universal composability, we enable the modular analysis and verification of individual system components. This approach allows us to derive strong security and privacy properties for the entire system, grounded in well-defined computational assumptions.
Related papers
- PICO: Secure Transformers via Robust Prompt Isolation and Cybersecurity Oversight [0.0]
We propose a robust transformer architecture designed to prevent prompt injection attacks.
Our PICO framework structurally separates trusted system instructions from untrusted user inputs.
We incorporate a specialized Security Expert Agent within a Mixture-of-Experts framework.
arXiv Detail & Related papers (2025-04-26T00:46:13Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Quantitative Information Flow Control by Construction for
Component-Based Systems [0.0]
This paper presents doctoral research in its early stages concerned with creating constructive methods for building secure component-based systems.
This research aim at developing a method that allows software architects to develop secure systems from a repository of secure components.
arXiv Detail & Related papers (2024-01-15T13:46:07Z) - Leveraging Traceability to Integrate Safety Analysis Artifacts into the
Software Development Process [51.42800587382228]
Safety assurance cases (SACs) can be challenging to maintain during system evolution.
We propose a solution that leverages software traceability to connect relevant system artifacts to safety analysis models.
We elicit design rationales for system changes to help safety stakeholders analyze the impact of system changes on safety.
arXiv Detail & Related papers (2023-07-14T16:03:27Z) - A Model Based Framework for Testing Safety and Security in Operational
Technology Environments [0.46040036610482665]
We propose a model-based testing approach which we consider a promising way to analyze the safety and security behavior of a system under test.
The structure of the underlying framework is divided into four parts, according to the critical factors in testing of operational technology environments.
arXiv Detail & Related papers (2023-06-22T05:37:09Z) - A Survey of Secure Computation Using Trusted Execution Environments [80.58996305474842]
This article provides a systematic review and comparison of TEE-based secure computation protocols.
We first propose a taxonomy that classifies secure computation protocols into three major categories, namely secure outsourced computation, secure distributed computation and secure multi-party computation.
Based on these criteria, we review, discuss and compare the state-of-the-art TEE-based secure computation protocols for both general-purpose computation functions and special-purpose ones.
arXiv Detail & Related papers (2023-02-23T16:33:56Z) - Multi-Biometric Fuzzy Vault based on Face and Fingerprints [3.6934118484548306]
fuzzy vault scheme has been established as cryptographic primitive suitable for privacy-preserving biometric authentication.
We construct a multi-biometric fuzzy vault based on face and multiple fingerprints.
arXiv Detail & Related papers (2023-01-17T13:39:12Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Evaluation of User Perception on Biometric Fingerprint System [0.0]
Biometric systems involve security assurance to make our system highly secured and robust.
Several innovative system have been introduced, and most of them have biometrics installed to protect military bases, banking machines, and other sophisticated systems.
Despite the benefits and enhancements in security that biometrics offer, there are also some vulnerabilities.
arXiv Detail & Related papers (2022-05-21T23:39:07Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Quantifying Assurance in Learning-enabled Systems [3.0938904602244355]
Dependability assurance of systems embedding machine learning components is a key step for their use in safety-critical applications.
This paper develops a quantitative notion of assurance that an LES is dependable, as a core component of its assurance case.
We illustrate the utility of assurance measures by application to a real world autonomous aviation system.
arXiv Detail & Related papers (2020-06-18T08:11:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.