Skip to content

Commit

Permalink
* update 2024-08-01 06:18:26
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Jul 31, 2024
1 parent a7dc68a commit 1e9ab98
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -2214,3 +2214,15 @@

</details>

<details>

<summary>2024-07-30 08:47:54 - Exploit the Leak: Understanding Risks in Biometric Matchers</summary>

- *Axel Durbet, Kevin Thiry-Atighehchi, Dorine Chagnon, Paul-Marie Grollemund*

- `2307.13717v5` - [abs](http://arxiv.org/abs/2307.13717v5) - [pdf](http://arxiv.org/pdf/2307.13717v5)

> In a biometric authentication or identification system, the matcher compares a stored and a fresh template to determine whether there is a match. This assessment is based on both a similarity score and a predefined threshold. For better compliance with privacy legislation, the matcher can be built upon a privacy-preserving distance. Beyond the binary output (`yes' or `no'), most schemes may perform more precise computations, e.g., the value of the distance. Such precise information is prone to leakage even when not returned by the system. This can occur due to a malware infection or the use of a weakly privacy-preserving distance, exemplified by side channel attacks or partially obfuscated designs. This paper provides an analysis of information leakage during distance evaluation. We provide a catalog of information leakage scenarios with their impacts on data privacy. Each scenario gives rise to unique attacks with impacts quantified in terms of computational costs, thereby providing a better understanding of the security level.

</details>

Loading

0 comments on commit 1e9ab98

Please sign in to comment.