{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:01Z","timestamp":1750308781341,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T00:00:00Z","timestamp":1291593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,6]]},"DOI":"10.1145\/1920261.1920275","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"89-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security analysis of a fingerprint-protected USB drive"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Rodes","sequence":"first","affiliation":[{"name":"James Madison University, Harrisonburg, VA"}]},{"given":"Xunhua","family":"Wang","sequence":"additional","affiliation":[{"name":"James Madison University, Harrisonburg, VA"}]}],"member":"320","published-online":{"date-parts":[[2010,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{ANSI\/INCITS(2002)} ANSI\/INCITS. Information technologoy - BioAPI specification. ANSI\/INCITS 358--2002 February 2002. Version 1.1.  {ANSI\/INCITS(2002)} ANSI\/INCITS. Information technologoy - BioAPI specification. ANSI\/INCITS 358--2002 February 2002. Version 1.1."},{"key":"e_1_3_2_1_2_1","unstructured":"{ANSI\/INCITS(2004)} ANSI\/INCITS. Finger minutiae fomat for data interchange. ANSI\/INCITS 378--2004 2004.  {ANSI\/INCITS(2004)} ANSI\/INCITS. Finger minutiae fomat for data interchange. ANSI\/INCITS 378--2004 2004."},{"volume-title":"Link\u00f6ping University","year":"2003","author":"Blomme J.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2006.345478"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1087"},{"key":"e_1_3_2_1_6_1","first-page":"42580","volume-title":"Springer-Verlag","author":"Daemen J.","year":"2002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"{Dodis \n      \n  \n  (\n  2004\n  )\n  Dodis Reyzin and Smith} Y. Dodis L. Reyzin and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch editors Advance in Cryptology --- EUROCRYPT\n   2004 volume \n  3027\n   of \n  Lecture Notes in Computer Science pages \n  523\n  --\n  540 2004.  {Dodis et al.(2004)Dodis Reyzin and Smith} Y. Dodis L. Reyzin and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch editors Advance in Cryptology --- EUROCRYPT 2004 volume 3027 of Lecture Notes in Computer Science pages 523--540 2004.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_9_1","unstructured":"{Electronic Privacy Information Center(2006)} Electronic Privacy Information Center. Veterans affairs data theft July 2006. URL http:\/\/epic.org\/privacy\/vatheft\/.  {Electronic Privacy Information Center(2006)} Electronic Privacy Information Center. Veterans affairs data theft July 2006. URL http:\/\/epic.org\/privacy\/vatheft\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761456"},{"key":"e_1_3_2_1_11_1","unstructured":"{Hex-Rays(2007)} Hex-Rays. IDA Pro 4.9 freeware February 11 2007. URL http:\/\/www.hex-rays.com\/idapro\/idadownfreeware.htm.  {Hex-Rays(2007)} Hex-Rays. IDA Pro 4.9 freeware February 11 2007. URL http:\/\/www.hex-rays.com\/idapro\/idadownfreeware.htm."},{"volume-title":"Australian National University","year":"2001","author":"Hill C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"{ISO\/IEC(2005)} ISO\/IEC. Information technology - biometric data interchange format - part 2: Finger minutiae data. ISO\/IEC 19794--2 2005.  {ISO\/IEC(2005)} ISO\/IEC. Information technology - biometric data interchange format - part 2: Finger minutiae data. ISO\/IEC 19794--2 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.566808"},{"key":"e_1_3_2_1_17_1","unstructured":"{Maltoni etal(2009)Maltoni Maio Jain and Prabhakar} D. Maltoni D. Maio A. K. Jain and S. Prabhakar. Handbook of Fingerprint Recognition. Springer 2nd edition 2009. ISBN 978-1-84882-253-5.   {Maltoni et al.(2009)Maltoni Maio Jain and Prabhakar} D. Maltoni D. Maio A. K. Jain and S. Prabhakar. Handbook of Fingerprint Recognition. Springer 2nd edition 2009. ISBN 978-1-84882-253-5."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"e_1_3_2_1_19_1","first-page":"2001","article-title":"} National Institute of Standards and Technology. Specification for the Advanced Encryption Standard (AES)","volume":"197","author":"{National Institute of Standards and Technology","year":"2001","journal-title":"Federal Information Processing Standards Publication"},{"key":"#cr-split#-e_1_3_2_1_20_1.1","unstructured":"{NIST(2007)} NIST. Data format for the interchange of fingerprint facial &amp"},{"key":"#cr-split#-e_1_3_2_1_20_1.2","unstructured":"other biometric information - part 1. NIST Special Public Report: 500--271 May 2007. URL http:\/\/fingerprint.nist.gov\/standard\/Approved-Std-20070427.pdf. {NIST(2007)} NIST. Data format for the interchange of fingerprint facial &amp"},{"key":"#cr-split#-e_1_3_2_1_20_1.3","unstructured":"other biometric information - part 1. NIST Special Public Report: 500--271 May 2007. URL http:\/\/fingerprint.nist.gov\/standard\/Approved-Std-20070427.pdf."},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"2009","article-title":"} NIST. Data format for the interchange of extended friction ridge features. Proposed Addendum\/Revision to ANSI\/NIST-ITL 1--2007","volume":"0","year":"2009","journal-title":"WORKING DRAFT Version"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819605"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"{Podio etal(2004)Podio Dunn Reinert Tilton Struif Herr et al.} F. L. Podio J. S. Dunn L. Reinert C. J. Tilton B. Struif F. Herr J. Russell M. P. Collier M. Jerde L. O'Gorman and B. Wirtz. CBEFF common biometric exchange formats framework. NISTIR 6529-A April 5th 2004. URL http:\/\/csrc.nist.gov\/publications\/nistir\/NISTIR6529A.pdf.  {Podio et al.(2004)Podio Dunn Reinert Tilton Struif Herr et al.} F. L. Podio J. S. Dunn L. Reinert C. J. Tilton B. Struif F. Herr J. Russell M. P. Collier M. Jerde L. O'Gorman and B. Wirtz. CBEFF common biometric exchange formats framework. NISTIR 6529-A April 5th 2004. URL http:\/\/csrc.nist.gov\/publications\/nistir\/NISTIR6529A.pdf.","DOI":"10.6028\/NIST.IR.6529-a"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1018"},{"volume-title":"Proceedings of International Conference on Security and Cryptography (SECRYPT 2007","year":"2007","author":"Socek D.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.11"},{"key":"e_1_3_2_1_27_1","unstructured":"{Wison Technology Corp.(2009)} Wison Technology Corp. Programmer's guide for fingerprint's SDK April 2009. URL http:\/\/www.wison.com.tw\/cht\/document\/Wison2\/DOC\/OR2-00_ProgrammerGuide.pdf.  {Wison Technology Corp.(2009)} Wison Technology Corp. Programmer's guide for fingerprint's SDK April 2009. URL http:\/\/www.wison.com.tw\/cht\/document\/Wison2\/DOC\/OR2-00_ProgrammerGuide.pdf."},{"key":"e_1_3_2_1_28_1","unstructured":"{Yuschuk(2004)} O. Yuschuk. Ollydbg 1.10. Freeware 2004. URL http:\/\/www.ollydbg.de\/.  {Yuschuk(2004)} O. Yuschuk. Ollydbg 1.10. Freeware 2004. URL http:\/\/www.ollydbg.de\/."}],"event":{"name":"ACSAC '10: 2010 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Austin Texas USA","acronym":"ACSAC '10"},"container-title":["Proceedings of the 26th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1920261.1920275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:43Z","timestamp":1750278163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,6]]},"references-count":30,"alternative-id":["10.1145\/1920261.1920275","10.1145\/1920261"],"URL":"https:\/\/doi.org\/10.1145\/1920261.1920275","relation":{},"subject":[],"published":{"date-parts":[[2010,12,6]]},"assertion":[{"value":"2010-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}