Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3576915.3623153acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

Published: 21 November 2023 Publication History

Abstract

Recently, in-display fingerprint sensors have been widely adopted in newly-released smartphones. However, we find this new technique can leak information about the user's fingerprints during a screen-unlocking process via the electromagnetic (EM) side channel that can be exploited for fingerprint recovery. We propose FPLogger to demonstrate the feasibility of this novel side-channel attack. Specifically, it leverages the emitted EM emanations when the user presses the in-display fingerprint sensor to extract fingerprint information, then maps the captured EM signals to fingerprint images and develops 3D fingerprint pieces to spoof and unlock the smartphones. We have extensively evaluated the effectiveness of FPlogger on five commodity smartphones equipped with both optical and ultrasonic in-display fingerprint sensors, and the results show it achieves promising similarities in recovering fingerprint images. In addition, results from 50 end-to-end spoofing attacks also present FPLogger achieves 24% (top-1) and 54% (top-3) success rates in spoofing five different smartphones.

References

[1]
Asaf Ashkenazi and Dmitry Akselrod. 2007. Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices. Computers & Electrical Engineering (2007).
[2]
Sanghoon Bae, Yan Ling, Weiping Lin, and Hong Zhu. 2018. 76--2: Invited paper: optical fingerprint sensor based on a-Si: H TFT technology. In SID Symposium Digest of Technical Papers, Vol. 49. Wiley Online Library, 1017--1020.
[3]
Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In Proceedings of the 28th USENIX Security Symposium.
[4]
Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, and Wenke Lee. 2018. Broken Fingers: On the Usage of the Fingerprint API in Android. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium.
[5]
Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aurélien Francillon. 2018. Screaming channels: When electromagnetic side channels meet radio transceivers. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 163--177.
[6]
OPPO Care. 2022. How To enable In-Display Fingerprint Sensor on your OPPO phone - OPPO Care. (2022). https://youtu.be/EjqFfHtYZxY.
[7]
Jin Chen, Per Jönsson, Masayuki Tamura, Zhihui Gu, Bunkei Matsushita, and Lars Eklundh. 2004. A simple method for reconstructing a high-quality NDVI time-series data set based on the Savitzky--Golay filter. Remote sensing of Environment, Vol. 91, 3--4 (2004), 332--344.
[8]
Yongliang Chen, Tao Ni, Weitao Xu, and Tao Gu. 2022. SwipePass: Acoustic-based Second-factor User Authentication for Smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (2022).
[9]
Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, and Lili Qiu. 2019. Magattack: Guessing application launching and operation via smartphone. In Proceedings of ACM Asia Conference on Computer and Communications Security (AsiaCCS). 283--294.
[10]
Myeongwon Choi, Sangeun Oh, Insu Kim, and Hyosu Kim. 2022. MagSnoop: listening to sounds induced by magnetic field fluctuations to infer mobile payment tokens. In Proceedings of MobiSys. 409--421.
[11]
Chaos Computer Club. 2004. How to fake fingerprints? (2004). https://biometrics.mainguet.org/alive/site_archive/CCC_01_How_to_fake_fingerprints.htm.
[12]
Patrick Cronin, Xing Gao, Chengmo Yang, and Haining Wang. 2021. Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. In Proceedings of the 30th USENIX Security Symposium. 681--698.
[13]
Joan Daemen and Craig Clapp. 1998. Fast hashing and stream encryption with PANAMA. In Fast Software Encryption: 5th International Workshop, FSE'98 Paris, France, March 23--25, 1998 Proceedings. Springer, 60--74.
[14]
Thom Does and Mike Maarse. 2016. Subverting Android 6.0 fingerprint authentication. University of Amsterdam, Amsterdam (2016), 22.
[15]
Ling Du, Anthony TS Ho, and Runmin Cong. 2020. Perceptual hashing for image authentication: A survey. Signal Processing: Image Communication (2020).
[16]
Foxgard. 2023. Foxgard Smart Fingerprint Door Lock. (2023). https://www.amazon.com/Foxgard-Fingerprint-Keyless-Biometric-Storage/dp/B08Y8QTN7T/.
[17]
Sergiu Gatlan. 2019. Samsung Galaxy S10 Fingerprint Scanner Tricked with 3D Print. (2019). https://www.bleepingcomputer.com/news/security/samsung-galaxy-s10-fingerprint-scanner-tricked-with-3d-print/.
[18]
GeekTale. 2023. GeekTale Smart Door knob. (2023). https://www.amazon.com/GeekTale-Fingerprint-Biometric-Cloakroom-Apartments/dp/B0BCJKNTGS/.
[19]
Daniel Genkin, Noam Nissan, Roei Schuster, and Eran Tromer. 2022. Lend Me Your Ear: Passive Remote Physical Side Channels on PCs. In Proceedings of the 31st USENIX Security Symposium. 4437--4454.
[20]
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, and Yuval Yarom. 2016. ECDSA key extraction from mobile devices via nonintrusive physical side channels. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 1626--1638.
[21]
R Blanco Gonzalo, Barbara Corsetti, Ines Goicoechea-Telleria, Anas Husseis, Judith Liu-Jimenez, Raul Sanchez-Reillo, Teodors Eglitis, Elakkiya Ellavarason, Richard Guest, Chiara Lunerti, et al. 2018. Attacking a Smartphone Biometric Fingerprint System: A Novice's Approach. In Proceedings of the International Carnahan Conference on Security Technology (ICCST). IEEE, 1--5.
[22]
Kang Han and Wei Xiang. 2022. Inference-Reconstruction Variational Autoencoder for Light Field Image Reconstruction. IEEE Transactions on Image Processing, Vol. 31 (2022), 5629--5644.
[23]
Sam Farisa Chaerul Haviana, Dedy Kurniadi, et al. 2016. Average hashing for perceptual image similarity in mobile phone application. Journal of Telematics and Informatics, Vol. 4, 1 (2016), 12--18.
[24]
Jiaji He, Xiaolong Guo, Mark Tehranipoor, Apostol Vassilev, and Yier Jin. 2021. EM side channels in hardware security: Attacks and defenses. IEEE Design and Test, Vol. 39, 2 (2021), 100--111.
[25]
Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems, Vol. 33 (2020), 6840--6851.
[26]
HONGFA. 2023. HFD4 SUBMINIATURE SIGNAL RELAY. (2023). https://www.hongfa.com/Product/Item/HFD4.
[27]
David Hsu. 2016. Fingerprint Sensor Technology And Security Requirements. (2016). https://semiengineering.com/fingerprint-senor-technology-and-security-requirements/.
[28]
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu. 2023. GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. In Proceedings of the 32st USENIX Security Symposium, Vol. 23.
[29]
Wenqiang Jin, Srinivasan Murali, Huadi Zhu, and Ming Li. 2021. Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 700--714.
[30]
Hyun-Joon Kim-Lee, Seog Woo Hong, Dong Kyun Kim, Jinmyoung Kim, Hong Suk Kim, Seok-Whan Chung, Eun-Hyoung Cho, Hae-Sung Kim, and Byung-Kyu Lee. 2020. On-screen fingerprint sensor with optically and electrically tailored transparent electrode patterns for use on high-resolution mobile displays. Microsystems & Nanoengineering, Vol. 6, 1 (2020), 98.
[31]
Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[32]
Mohammad Rami Koujan, Michail Christos Doukas, Anastasios Roussos, and Stefanos Zafeiriou. 2020. Head2head: Video-based neural head synthesis. In Proceedings of the 15th IEEE International Conference on Automatic Face and Gesture Recognition. 16--23.
[33]
David M Kreindler and Charles J Lumsden. 2016. The effects of the irregular sample and missing data in time series analysis. Nonlinear Dynamical Systems Analysis for the Behavioral Sciences Using Real Data.
[34]
Hoyeon Lee, Seungyeon Kim, and Taekyoung Kwon. 2017. Here is your fingerprint! Actual risk versus user perception of latent fingerprints and smudges remaining on smartphones. In Proceedings of ACSAC. 512--527.
[35]
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, and Na Ruan. 2016. When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 1068--1079.
[36]
Qianru Liao, Yongzhi Huang, Y Zhong, H Jin, and K Wu. 2022. MagEar: eavesdropping via audio recovery using magnetic side channel. In Proceedings of MobiSys. 371--383.
[37]
Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena. 2017. VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 73--87.
[38]
Zhuoran Liu, Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium.
[39]
EGO INNOVATION LTD. 2021. EGO MAGPOWER Gen.2 6000mAh 15W magsafe powerbank. (2021). https://www.egoshop.co/en/products/ego-magpower-15w-magsafe-6000mah-powerbank-1.
[40]
Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, and Changxi Zheng. 2022. Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel. In Proceedings of the 31st USENIX Security Symposium.
[41]
Seita Maruyama, Satohiro Wakabayashi, and Tatsuya Mori. 2019. Tap'n ghost: A compilation of novel attack techniques against smartphone touchscreens. In Proceedings of the 40th IEEE Symposium on Security and Privacy (SP). 620--637.
[42]
Arduino Nano. 2022. Arduino Nano Document. (2022). https://docs.arduino.cc/hardware/nano.
[43]
Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, and Weitao Xu. 2023 a. Eavesdropping Mobile App Activity via $$Radio-Frequency$$ Energy Harvesting. In 32nd USENIX Security Symposium (USENIX Security 23). 3511--3528.
[44]
Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023 b. Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking.
[45]
Tao Ni, Xiaokuan Zhang, and Qingchuan Zhao. 2023 c. EM Fingerprints: Attack In-Display Fingerprint Sensors via Electromagnetic (EM) Side Channel. (2023). https://em-fingerprints.github.io.
[46]
Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023 d. Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 3399--3415.
[47]
Yuval Nirkin, Yosi Keller, and Tal Hassner. 2019. Fsgan: Subject agnostic face swapping and reenactment. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV). 7184--7193.
[48]
Hyun Sung Park, Hyundo Shin, Jisoo Kim, Yudeok Seo, Dongjin Seo, and Yongjo Kim. 2020. P-129: Operating Frequency and Sensitivity Prediction of In-Display Ultrasonic Fingerprint Sensing Systems. In SID Symposium Digest of Technical Papers, Vol. 51. Wiley Online Library, 1851--1854.
[49]
Nandini Patil. 2023. In-Display Fingerprint Sensors Market. (2023). https://issuu.com/npatil29/docs/in-display_fingerprint_sensors_market.
[50]
Chang Peng, Mengyue Chen, and Xiaoning Jiang. 2021. Under-display ultrasonic fingerprint recognition with finger vessel imaging. IEEE Sensors Journal (2021).
[51]
Albert Pumarola, Antonio Agudo, Aleix M Martinez, Alberto Sanfeliu, and Francesc Moreno-Noguer. 2018. Ganimation: Anatomically-aware facial animation from a single image. In Proceedings of ECCV. 818--833.
[52]
K Ramamohan Rao and Ping Yip. 2014. Discrete cosine transform: algorithms, advantages, applications. Academic press.
[53]
Aditya Singh Rathore, Weijin Zhu, Afee Daiyan, Chenhan Xu, Kun Wang, Feng Lin, Kui Ren, and Wenyao Xu. 2020. SonicPrint: A generally adoptable and secure fingerprint biometrics in smart devices. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services. 121--134.
[54]
Robin Rombach, Andreas Blattmann, Dominik Lorenz, Patrick Esser, and Björn Ommer. 2022. High-resolution image synthesis with latent diffusion models. In Proceedings of the IEEE/CVF CVPR. 10684--10695.
[55]
Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention--MICCAI 2015: 18th International Conference, Munich, Germany, October 5--9, 2015, Proceedings, Part III 18. Springer, 234--241.
[56]
Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, and Yier Jin. 2022. Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. In Proceedings of the IEEE Symposium on Security and Privacy (SP). 1246--1262.
[57]
Yahaya Isah Shehu, Ariel Ruiz-Garcia, Vasile Palade, and Anne James. 2018. Sokoto coventry fingerprint dataset. arXiv preprint arXiv:1807.10609 (2018).
[58]
Dai Shi, Dan Tao, Jiangtao Wang, Muyan Yao, Zhibo Wang, Houjin Chen, and Sumi Helal. 2021. Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones. Proceedings of the ACM IMWUT (2021).
[59]
Synaptics. 2017. Synaptics Brings World's First In-Display Fingerprint Sensors for Smartphones to Mass Production with a Top Five OEM. (2017). https://www.synaptics.com/company/news/Clear-ID-mass-production.
[60]
Zhiqiang Tao, Hongfu Liu, Huazhu Fu, and Yun Fu. 2017. Image cosegmentation via saliency-guided constrained clustering with cosine similarity. In Proceedings of the AAAI conference on artificial intelligence, Vol. 31.
[61]
R QIDI TECHNOLOGY. 2023. R QIDI TECHNOLOGY X-CF Pro Industrial Grade 3D Printer. (2023). https://www.amazon.com/QIDI-TECHNOLOGY-Industrial-Specially-11--8x9--8x11--8/dp/B09L7XCW3B/.
[62]
Danny Thakkar. 2023. Fingerprint Reader Technology Comparison: Optical Fingerprint Scanner; Capacitive-based Fingerprint Reader and Multispectral Imaging Sensor. (2023). https://www.bayometric.com/fingerprint-reader-technology-comparison/.
[63]
Justus Thies, Michael Zollhofer, Marc Stamminger, Christian Theobalt, and Matthias Nießner. 2016. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE/CVF CVPR. 2387--2395.
[64]
Dries Van Wageningen and Toine Staring. 2010. The Qi wireless power standard. In Proceedings of 14th International Power Electronics and Motion Control Conference (EPE-PEMC). IEEE, S15--25.
[65]
Tao Wei and Yulong Zhang. 2015. Fingerprints On Mobile Devices: Abusing And Leaking. (2015).
[66]
Petros Xanthopoulos, Panos M Pardalos, Theodore B Trafalis, Petros Xanthopoulos, Panos M Pardalos, and Theodore B Trafalis. 2013. Linear discriminant analysis. Robust data mining (2013), 27--33.
[67]
Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang. 2017. Cracking android pattern lock in five attempts. In Proceedings of the Network and Distributed System Security (NDSS) Symposium.
[68]
Dong Yu, Kaisheng Yao, Hang Su, Gang Li, and Frank Seide. 2013. KL-divergence regularized deep neural network adaptation for improved large vocabulary speech recognition. In Proceedings of the IEEE ICASSP.
[69]
Muhammad Rehman Zafar and Munam Ali Shah. 2016. Fingerprint authentication and security risks in smart devices. In Proceedings of the 22nd International Conference on Automation and Computing (ICAC). 548--553.
[70]
Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, and Xenofon Koutsoukos. 2022. Graphics peeping unit: Exploiting EM side-channel information of GPUs to eavesdrop on your neighbors. In Proceedings of IEEE Symposium on Security and Privacy (SP). 1440--1457.
[71]
Xinchen Zhang, Yafeng Yin, Lei Xie, Hao Zhang, Zefan Ge, and Sanglu Lu. 2020. TouchID: User authentication on mobile devices via inertial-touch gesture analysis. Proceedings of the ACM IMWUT (2020).
[72]
Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, and Xinwen Fu. 2012. Fingerprint attack against touch-enabled devices. Proceedings of the 2nd ACM workshop on security and privacy in smartphones and mobile devices. 57--68.
[73]
Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. 2018. Patternlistener: Cracking android pattern lock using acoustic signals. In Proceedings of ACM CCS. 1775--1787. io

Cited By

View all
  • (2025)Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and ChallengesIET Information Security10.1049/ise2/26545502025:1Online publication date: 9-Jan-2025
  • (2024)SelTZ: Fine-Grained Data Protection for Edge Neural Networks Using Selective TrustZone ExecutionElectronics10.3390/electronics1401012314:1(123)Online publication date: 31-Dec-2024
  • (2024)Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense MechanismACM Transactions on the Web10.1145/3708514Online publication date: 17-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 2023
3722 pages
ISBN:9798400700507
DOI:10.1145/3576915
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. denoising diffusion model
  2. electromagnetic side channels
  3. in-display fingerprint sensors

Qualifiers

  • Research-article

Funding Sources

  • CityU APRC grant
  • The Research Grants Council of Hong Kong

Conference

CCS '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)637
  • Downloads (Last 6 weeks)44
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and ChallengesIET Information Security10.1049/ise2/26545502025:1Online publication date: 9-Jan-2025
  • (2024)SelTZ: Fine-Grained Data Protection for Edge Neural Networks Using Selective TrustZone ExecutionElectronics10.3390/electronics1401012314:1(123)Online publication date: 31-Dec-2024
  • (2024)Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense MechanismACM Transactions on the Web10.1145/3708514Online publication date: 17-Dec-2024
  • (2024)Detecting Hidden Voice Recorders via ADC Electromagnetic RadiationACM Transactions on Sensor Networks10.1145/370059520:6(1-26)Online publication date: 23-Nov-2024
  • (2024)EM-Rhythm: An Authentication Method for Heterogeneous IoT DevicesACM Transactions on Sensor Networks10.1145/370044120:6(1-21)Online publication date: 22-Nov-2024
  • (2024)XSolar: A Generative Framework for Solar-based Human Gesture Sensing via Wearable SignalsProceedings of the Workshop on Body-Centric Computing Systems10.1145/3662009.3662024(41-46)Online publication date: 3-Jun-2024
  • (2024)Sensor Security in Virtual Reality: Exploration and MitigationProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661389(758-759)Online publication date: 3-Jun-2024
  • (2024)EarDA: Towards Accurate and Data-Efficient Earable Activity Sensing2024 IEEE Coupling of Sensing & Computing in AIoT Systems (CSCAIoT)10.1109/CSCAIoT62585.2024.00005(1-7)Online publication date: 13-May-2024
  • (2024)LπCETIET Information Security10.1049/2024/26347442024Online publication date: 12-Jun-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media