@inproceedings{cecba487131f49c3bcb389947d9c2cda,
title = "Studying leakages on an embedded biometric system using side channel analysis",
abstract = "This paper addresses the potential information leakages of a fingerprint comparison algorithm embedded as a hardware implementation. Such solution aims at comparing a reference fingerprint with a freshly acquired one completely inside an embedded system (e.g. ASIC, smart card, FPGA). The same way as for cryptographic operations within a cryptoprocessor, we consider the reference fingerprint template as a sensitive data that one may try to retrieve by attacking the chip. On one hand, we show that we can find relevant information by the means of Side Channel Analysis (SCA) that may help to retrieve the reference fingerprint. On the other hand, we illustrate that reconstructing the fingerprint remains not trivial and we give some simple countermeasures to protect further the comparison algorithm.",
keywords = "Biometric comparison, Fingerprint, Hardware biometric coprocessor, Hill climbing, Side channel analysis",
author = "Ma{\"e}l Berthier and Yves Bocktaels and Julien Bringer and Herv{\'e} Chabanne and Taoufik Chouta and Danger, \{Jean Luc\} and M{\'e}lanie Favre and Tarik Graba",
year = "2014",
month = jan,
day = "1",
doi = "10.1007/978-3-319-10175-0\_19",
language = "English",
isbn = "9783319101743",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "281--298",
booktitle = "Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Revised Selected Papers",
note = "5th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2014 ; Conference date: 13-04-2014 Through 15-04-2014",
}