NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章标题是“EMIRIS: 通过电磁侧信道窃听虹膜信息”。作者们来自山东大学,他们研究的是虹膜识别系统中的电磁攻击问题。虹膜识别被认为是非常安全的生物识别方法,因为虹膜图案独特且稳定,难以伪造。然而,使用近红外传感器的系统可能会暴露用户的虹膜信息,带来隐私风险。 研究发现,近红外传感器在传输数据时会发出电磁信号,这些信号与虹膜数据密切相关。作者们提出了EMIRIS方法,通过分析这些电磁信号来重构虹膜信息,并将其转换为虹膜图像。为了提高重构质量,他们建立了一个去噪和恢复虹膜纹理细节的线性逆问题模型,并定制了一个扩散模型来解决这个问题。 实验结果表明,EMIRIS能够有效地从商用虹膜识别设备中重构虹膜信息,平均SSIM为0.511,平均FID为7.25。更令人担忧的是,这些重构出的虹膜可以成功欺骗经典的虹膜识别模型,在50个不同用户的3000多个虹膜样本中平均成功率达到了53.47%。 所以总结起来就是:研究揭示了近红外传感器的电磁泄露风险,并提出了一种利用电磁侧信道窃取和重构虹膜信息的方法EMIRIS。该方法不仅能够有效提取隐私数据,还能用于欺骗现有的虹膜识别系统。 接下来我要确保总结在100字以内,并且直接描述内容。可能需要简化一些技术细节,比如提到SSIM和FID的具体数值可能可以省略。重点放在方法、结果和潜在风险上。 最终总结应该是:研究揭示了近红外传感器的电磁泄露风险,并提出了一种利用电磁侧信道窃取和重构虹膜信息的方法EMIRIS。该方法不仅能够有效提取隐私数据,还能用于欺骗现有的虹膜识别系统。 </think> 研究揭示了近红外传感器的电磁泄露风险,并提出了一种利用电磁侧信道窃取和重构虹膜信息的方法EMIRIS。该方法不仅能够有效提取隐私数据,还能用于欺骗现有的虹膜识别系统。 2026-1-10 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

Session 8B: Electromagnetic Attacks

Authors, Creators & Presenters: Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang (Shandong University), Riccardo Spolaor (Shandong University), Xiuzhen Cheng (Shandong University), Pengfei Hu (Shandong University)
PAPER
EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
Iris recognition is one of the most secure biometric methods due to the uniqueness and stability of iris patterns, as well as their resistance to forgery. Consequently, it is frequently used in high-security authentication scenarios. However, systems using Near-Infrared (NIR) sensors may expose the iris information of users, leading to significant privacy risks. Our research found that the electromagnetic (EM) emissions generated during data transmission of NIR sensors are closely related to iris data. Based on this observation, we propose EMIRIS, a method for reconstructing the iris information using EM side channels. By deconstructing the digital signal transmission format of the NIR sensors and the mapping mechanism of the iris data matrix, we can reconstruct iris information from EM signals and convert it into iris images. To improve the quality of the reconstructed iris, we model the denoising and restoration of iris texture details as a linear inverse problem and tailor a diffusion model to solve it. Extensive experimental evaluations show that EMIRIS can effectively reconstruct iris information from commercial iris recognition devices, achieving an average SSIM of 0.511 and an average FID of 7.25. Even more concerning, these reconstructed irises can effectively spoof the classical iris recognition model with an average success rate of 53.47% on more than 3,000 iris samples from 50 different users.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the **[Network and Distributed System Security (NDSS) Symposium][1]** for publishing their Creators, Authors and Presenter’s superb **[NDSS Symposium 2025 Conference][2]** content on the **[organization’s’][1]** **[YouTube][3]** channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/PUyDUmuvg0o?si=BP2Zih40qOqGq8sv


文章来源: https://securityboulevard.com/2026/01/ndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel/
如有侵权请联系:admin#unsafe.sh