Definition
Operating System with a robust design, as not to allow the execution of malicious code. Access to internal data and procedures are never allowed without the proper authorization. In its more strict implementations, this Operating System will have attack detection mechanisms. If the attack is of a certain level, the Operating System may even delete all its code and/or data.
Introduction
The handling of sensible data in Information Systems is currently very usual. Which data is to be considered sensible is up to the application, but at least we can consider those such as personal data, financial data as well as access control data. Actors dealing with such Information System (clients/citizens, service providers, integrators, etc.) have to be aware of the security level achieved within the system.
Although this is a very important issue in any system, when biometric information is handled it...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rejman-Greene: Security considerations in the use of biometric devices. Information Security Technical Report 3, 77–80 (1998)
Ratha, N.K., Connell, J.H.B.R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Roberts, C.: Biometric attack vectors and defences. Computers & Security 26(1), 14–25 (2007)
Criteria, C.: Biometric evaluation methodology supplement (bem). Common Methodology for Information Technology Security Evaluation - http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf (2002)
Matthews, A.: Side-channel attacks on smartcards. Network Security 2006(12), 18–20 (2006)
Sanchez-Reillo, R.: Achieving Security in Integrated Circuit Card Applications: Reality or Desire? IEEE Aerospace and Electronic Systems Magazine 17, 4–8 (2002)
Sanchez-Reillo, R., Gonzalez-Marcos, A.: Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE 15(2), 45–48. DOI 10.1109/62.825671(2000)
Sanchez-Reillo, R.: Smart card information and operations using biometrics. Aerospace and Electronic Systems Magazine, IEEE 16(4), 3–6 DOI 10.1109/62.918014(2001)
ISO ∕ IEC_JTC1 ∕ SC17: ISO/IEC 7816 Parts 3, 4, 8, 9 & 11 (1987–2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Sanchez-Reillo, R. (2009). Tamper-proof Operating System. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_291
Download citation
DOI: https://doi.org/10.1007/978-0-387-73003-5_291
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73002-8
Online ISBN: 978-0-387-73003-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering