1. Introduction
The TOE may be vulnerable to presentation attacks where attackers attempt to subvert the biometric enrolment or verification by presenting the Presentation Attack Instruments (PAIs). There is a wide range of PAIs that can be used, including natural biometric characteristics, such as dead eyes, or artefacts created from copied or faked characteristics. Using natural biometric characteristics is out of scope of [BIOPP-Module] evaluation and the evaluator shall only use created artefacts to evaluate the TOE.
The toolbox defines the common artefacts for each biometric modality based on publicly available information (e.g. research papers), experiences and knowledge shared among the BIO-iTC members. The evaluator needs to read the [BIOSD] Section 6 as it explains how the evaluator shall use the toolbox during the ATE_IND.1 (Independent testing) and AVA_VAN.1 (Penetration testing) evaluation for Presentation Attack Detection (PAD) in detail.
This overview is originally developed for evaluation activities for FIA_MBV_EXT.3, however, the evaluator can apply the same principles to evaluation activities for FIA_MBE_EXT.3.
2. Biometric modalities supported
Currently toolbox is developed for the following biometric modalities:
-
Eye
-
Face
-
2D Image
-
3D Image
-
-
Fingerprint
-
Vein
The toolbox is intended to be a state of the art set of test and is continually updated. The latest versions of the toolbox for each supported modality must be used by the evaluator at the time the testing begins.
3. Purpose of this toolbox overview
This toolbox overview describes common instructions and components for all toolboxes, rather than repeating the same information in each toolbox. The evaluator shall refer both the toolbox overview and the relevant toolbox to perform independent and penetration testing. If there is conflict between the toolbox overview and a toolbox, the toolbox takes precedence over the overview.
4. Structure of the Toolbox
Each toolbox shares the same structure and includes following sections.
- modality name Toolbox overview
-
This section provides specific information only applicable to relevant biometric modality.
- modality name Toolbox Inventory
-
This section categorizes tools and materials that the evaluator shall use to capture a image of biometric characteristics and produce artefacts.
- modality name Verification List
-
This section summarizes all test items that the evaluator shall peform during independent testing. As explained in [BIOSD] Section 6, the evaluator shall select specific test items for penetration testing based on the result of independent testing.
- modality name References
-
This section lists all publicly available information referred to create a toolbox.
- Test items
-
Each test item includes the following sub-sections. This toolbox overview provide a general test protocol in common for all toolboxes and these test items describe more detailed information to enable repeatable testing.
Sub-section name Description Number
Identification number of test
Attack type
Category of attack
Overview
General overview of test
Input
Required input to produce artefacts
Attack Tools/Media
Required tools and media to capture an image of biometric characteristics and produce artefacts
Recipe
Procedure to create artefacts
Variations
Variants of artefacts to be generated based on this test item. The evaluator shall create those variants by slightly different procedure (e.g. different Recipe or with different Attack Tools/Media specified here) for the independent testing.
Prerequisite
Any conditions that should meet to perform each test
Presentation
Instructions to present artefact to the TOE
Penetration Testing and Attack Potential Rating Suggestions
Suggestions that the evaluator should consider devising penetration tests from this test item and calculate the attack potential rating. The evaluator may change the rating considering actual expertise or knowledge of TOE used to succeed attacks, however, the evaluator shall report such changes with proper justification
Pass Criteria
If this Pass criteria is defined in test items, evaluator shall follow it. Otherwise, the evaluator shall follow criteria defined in this toolbox overview for independent testing and one defined in [BIOSD] Section 9.3 for penetration testing
5. Common guidance for Independent & Vulnerability Testing
As explained in [BIOPP-Module], the TOE is the whole biometric system, including Comparison, Decision and Presentation Attack Detection Subsystems. This means in order to successfully overcome the TOE by the use of artefacts, a genuine person (test subject) has to be enroled into the TOE, artefacts have to be created referring the toolbox for the corresponding biometric modality and artefacts have to produce a attack presentation match (i.e. a successful presentation attack).
For all types of testing, there are some common steps/procedures to be followed. These are detailed here.
5.1. General test protocol
Presentation attacks can be performed through the following three steps.
5.1.1. Preparation
Before testing can start, the following pre-requisite needs to be met:
-
It has to be ensured that the test subject whose body part is used to produce the artefacts for testing is enroled into the TOE correctly as follows.
-
Enrolment shall be done following guidance provided by the TOE.
-
At least 5 test enrolment transactions shall be performed by the test subject to ensure that the test subject can enrol correctly and be verified after enrolment.
-
In case of repeated failures during the test enrolment, the test subject shall use a different body part (this could mean to use a different finger of the test subject in case of fingerprint verification) and start test enrolment transactions again.
-
If the test subject cannot enrol any body parts during the test enrolment, the test subject shall be exempt from further testing.
-
5.1.2. Artefact production
Artefact production needs to follow these requirements:
-
The evaluator shall document any necessary information so that artefacts used for the test can be re-produced by the evaluator.
-
Each produced artefact shall be identified by a unique identifier. This identifier shall be attached to the artefact at all times (as far as this is possible without destroying the artefact).
5.1.3. Presentation of artefacts
The results of the presentation of artefacts is defined as:
Result | Definition |
---|---|
Successful (Match) Attack |
The TOE matches the artefact to the enroled user |
Failed Attack |
The TOE rejects the artefact |
6. Guidance for Independent Testing (ATE_IND.1)
For independent testing, this guidance is common for all toolboxes. More specific guidance for a specific biometric modality is provided in each toolbox.
This is in addition to guidance in Common guidance for Independent & Vulnerability Testing.
6.1. General test protocol
The presentation attack can be performed through the following two steps after performing Preparation in Section 5.
6.1.1. Artefact production
The production of artefacts for each toolbox shall be performed as follows:
-
The evaluator shall produce all artefacts defined in the toolbox.
-
The evaluator shall follow instructions in the toolbox to produce artefacts, especially the evaluator shall use tools or materials (e.g. camera, display or printer) that meet requirements in toolbox.
-
The evaluator shall produce three artefacts from each test subject.
6.1.2. Presentation of artefacts
The evaluator shall present artefacts to the TOE to perform presentation attacks.
-
Each artefact shall be presented to the TOE 10 times
6.2. Number of Subjects
The evaluator shall prepare three test subjects for the above test. A test subject is defined as one individual, and not different body parts from one person (i.e. three fingers from one person could not be considered to be three test subjects for the creation of artefacts).
6.3. Pass/Fail Criteria
The following pass criteria shall be applied if no other criteria are defined in the toolbox.
A TOE passes the test if and only if it reliably defeats the use of all artefacts (i.e. 3 X 3 = 9 artefacts in total) that have to be built according to the toolbox. This means that none of the artefacts must be able to reproducibly overcome the TOE.
To reproducibly overcome the TOE by the use of a certain artefact in the outlined test scenario is defined as follows:
Attempts | Number of matches | Outcome |
---|---|---|
10 |
0 |
TOE passes this artefact |
10 |
1 |
TOE passes this artefact |
10 |
2 |
Additional ten (10) attempts shall be made |
20 |
2 |
TOE passes this artefact |
Up to 20 |
3 or more |
TOE fails this artefact |
The maximum number of attempts allowed with one artefact is twenty (20). If three (3) matches are made to the artefact, the independent test fails (further attempts are not necessary even if 20 total attempts have not yet been made).
7. Guidance for Penetration Testing (AVA_VAN.1)
The evaluator moves to penetration testing only if the TOE passes independent testing. As described in [BIOSD] Section 6, the evaluator shall select those artefacts that show higher imposter attack presentation match rate during independent testing or higher quality artefacts.
This is in addition to guidance in Common guidance for Independent & Vulnerability Testing.
7.1. General test protocol
Presentation attack can be performed through the following two steps after performing Preparation in Section 5.
7.1.1. Artefact production
The production of artefacts for each toolbox shall be performed as follows:
-
The evaluator should select artefacts in a toolbox that may produce attack presentation match at higher probability considering the result of independent testing.
-
The evaluator may refine the production process of artefacts, as explained in [BIOSD] Section 6. The toolbox describes generalized process to produce artefacts referring to research papers. These research papers may describe more detailed information to produce better artefacts. Such information is valuable if the TOE’s PAD algorithm is the same or similar to ones tested by researchers. The evaluator shall consider relevant research papers to be authoritative over the generalized descriptions provided in a toolbox for improving the creation of artefacts.
-
The evaluator may produce an arbitrary number of artefacts from each test subject within allowed time period. As described in [BIOSD], both independent and penetration testing shall be finished within one week.
7.1.2. Presentation of artefacts
The evaluator shall present artefacts to the TOE to perform presentation attacks.
-
Each artefact shall be presented to the TOE an arbitrary number of times within allowed time period. As described in [BIOSD], both independent and penetration testing shall be finished within one week.
7.2. Number of Subjects
If the evaluator can create artefacts that produce an attack presentation match during independent testing, the evaluator should select the test subjects whose artefacts had successful matches and increase the number of attempts. The evaluator may replace the test subject for penetration testing as described in [BIOSD] Section 6.
7.3. Pass/Fail Criteria
As described in [BIOSD], both independent and penetration testing shall be finished within one week. The evaluator may select one or two artefacts and perform an arbitrary number of attempts within this time period. If the evaluator can create artefacts that meet the criteria defined in [BIOSD] Section 9.3, the TOE fails AVA_VAN.1 evaluation.
8. Related Documents
-
[BIOPP-Module] collaborative PP-Module for Biometric enrolment and verification - for unlocking the device -, May 11, 2020, Version 1.0
-
[BIOSD] Supporting Document Mandatory Technical Document: Evaluation Activities for collaborative PP-Module for Biometric enrolment and verification - for unlocking the device -, May 11, 2020, Version 1.0
9. Revision History
Version | Date | Description |
---|---|---|
0.3 |
May 30, 2019 |
Public Review Draft 1 |
0.5 |
December 20, 2019 |
Public Review Draft 2 |
0.6 |
March 13, 2020 |
Proposed Release |
1.0 |
May 11, 2020 |
Public Release |