BixeLab / Biometix — Injection Testing Overview
|
Workflow A: Virtual Sensor
|
Workflow B:
|
Standard run-size = 300 attack transactions per IAM
Formula: 5 transactions × number of IAI species × number of subjects
Example: 5 × 4 IAI × 15 subjects = 300 transactions
Rationale: repeatability, statistical confidence and coverage across IAI species & subjects.
API Replay: capture HTTPS in browser dev tools → recreate request structure → replay to endpoint (respect auth/headers and crypto where possible).
Implication: use hybrid approach (emulator + rooted devices), document unavoidable gaps and residual risk.
Reporting & Metrics
Risk Insights & Mitigations
Deliverables
Running the attacks
CEN/TS 18099 — Biometric data injection attack detection (European technical specification).
https://standards.iteh.ai/catalog/standards/cen/43336798-87a4-49d1-9a0b-4e74c73345a7/cen-ts-18099-2024
ENISA — Remote Identity Proofing: Good Practices (covers injection / video injection threats and countermeasures). https://www.enisa.europa.eu/sites/default/files/2024-11/Remote%20ID%20Proofing%20Good%20Practices_en_0.pdf
ISO/IEC work on biometric injection attack detection (drafts / work items) — watch ISO CEN collaborations for international alignment. oai_citation
Text