YoVDO

Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Machine Learning Courses Blockchain Development Courses Privacy Courses Mobile Device Security Courses Spoofing Courses

Course Description

Overview

Explore attack vectors in biometric recognition systems through this comprehensive conference talk. Delve into mobile authentication use cases, blockchain applications, and emerging trends in biometric security. Examine vulnerabilities, spoofing techniques, and presentation attack detection methods. Learn about template security, biometric encryption, and the challenges of distinguishing between genuine users and imposters. Investigate mobile device vulnerabilities, industry standards, and the future of biometric recognition. Gain insights into cutting-edge topics such as virtual reality, adaptive storage, and brain wave authentication. Understand the implications of blockchain technology in biometric systems and explore potential risks and concerns. Discover how biometric recognition is evolving and its impact on various sectors, including travel security and identity management.

Syllabus

Intro
Biometric Enrollment
Terms
Presentation
Vulnerabilities
Presentation Attacks
Black Hat USA 2015
Warmup slides
Contest
Mobile Top 10
Product Roadmaps
Liveness Detection
USAA
Biometric Standards
Virtual Reality
Tabula Rasa
Alternatives
Algorithms
Multiple Heartbeats
Template Protection
Biometric Encryption
Biometric Templates
ID20 Project
IBM Hyper Ledger
TSA Interpol
Concerns
Blockchain
Risk
ACM Magazine
Adaptive Storage
Brain Waves
Cloaking
Separation of Duties


Taught by

LASCON

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network