Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Time

Item

Presenter

Notes

Biometric inputs

Mike Chaudoin

  • Looked back at Biometric standards for ideas

    • ISO 30107-3 presentation attack detection - this is the typical system-architecture diagram that biometric folks are familiar with

image-20240228-170829.png

  • Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences

  • Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box.

  • Jay: where do injection attacks happen in this diagram?

    • Dan: for image processing, injections happen at #2 before templatization

  • Mike notes that this diagram was originally created for the fingerprint

  • Stephanie has an updated diagram that addresses deepfakes

image-20240228-172844.png

  • Joey: points out that the new world is both the biometric sampling and also now reference document modifications

    • Synthetically generated ID Documents should be in scope

  • Sean: a big part of the threat is the ability to scale the attacks - important considerations

  • Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)

  •  Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work
  • This content area fits into “attack vectors”

    • Volunteers: Max, Dan

    • Need to add in new boxes for how images are brought into the reference database - e.g. morph image attacks

What to do with Heather’s content topics?

Jay

  • Discussion about how the “hacker motivations” topic areas should be handled

    • An option to merge into other content areas - e.g. who is a target/is vulnerable

    • Look for opportunities to include “motivations” into the other topic areas

A Book with content on cyber-crime motives: https://www.goodreads.com/book/show/38502106-industry-of-anonymity

Next week topic

Dawid: To present on forensics

Joey: to demonstrate live injection of deepfake into Zoom call

Places to follow

...