Research Article

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Table 7

Attack potential calculation for noncooperative attacks on desktop fingerprint sensors. Scores assigned according to the classification from Common Criteria [16, p. 429].

ā€‰Preparation phasePAI construction + exercising phaseAttack execution phaseTotal factor ratingScore

Elapsed time<1 week (capture subject is noncooperative)1 week (creating PAIs)Few seconds (perform attack)<2 weeks2

ExpertiseLayman (materials can be obtained at normal stores)Proficient (process needs many steps)Layman (not much expertise needed)Proficient3

Knowledge of TOEPublic (well known on the internet that it works)Public (manuals can be found on the internet)Public (no knowledge needed)Public0

Window of opportunityUnnecessary (no access to TOE needed)Easy (access to TOE for practicing)Easy (high chance the PAI will work)Easy1

EquipmentStandard (no equipment needed)Specialized (some sensors might be hard to obtain)Standard (no equipment needed)Specialized4

Overall attack rating10 (Enhanced-basic)

Attack resistanceBasic