NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
None
<p>Session 8B: Electromagnetic Attacks </p><p></p><center data-preserve-html-node="true"><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen="" src="https://www.youtube-nocookie.com/embed/PUyDUmuvg0o?si=BP2Zih40qOqGq8sv" width="560" frameborder="0" data-preserve-html-node="true" title="YouTube video player" height="315"></iframe> <p></p><center data-preserve-html-node="true">Authors, Creators & Presenters: Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang (Shandong University), Riccardo Spolaor (Shandong University), Xiuzhen Cheng (Shandong University), Pengfei Hu (Shandong University) <p></p><center data-preserve-html-node="true">PAPER<br> <center data-preserve-html-node="true">EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel <p></p><center data-preserve-html-node="true">Iris recognition is one of the most secure biometric methods due to the uniqueness and stability of iris patterns, as well as their resistance to forgery. Consequently, it is frequently used in high-security authentication scenarios. However, systems using Near-Infrared (NIR) sensors may expose the iris information of users, leading to significant privacy risks. Our research found that the electromagnetic (EM) emissions generated during data transmission of NIR sensors are closely related to iris data. Based on this observation, we propose EMIRIS, a method for reconstructing the iris information using EM side channels. By deconstructing the digital signal transmission format of the NIR sensors and the mapping mechanism of the iris data matrix, we can reconstruct iris information from EM signals and convert it into iris images. To improve the quality of the reconstructed iris, we model the denoising and restoration of iris texture details as a linear inverse problem and tailor a diffusion model to solve it. Extensive experimental evaluations show that EMIRIS can effectively reconstruct iris information from commercial iris recognition devices, achieving an average SSIM of 0.511 and an average FID of 7.25. Even more concerning, these reconstructed irises can effectively spoof the classical iris recognition model with an average success rate of 53.47% on more than 3,000 iris samples from 50 different users. <p></p><center data-preserve-html-node="true">ABOUT NDSS<br> <center data-preserve-html-node="true">The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. <p></p><center data-preserve-html-node="true">Our thanks to the **[Network and Distributed System Security (NDSS) Symposium][1]** for publishing their Creators, Authors and Presenter’s superb **[NDSS Symposium 2025 Conference][2]** content on the **[organization’s’][1]** **[YouTube][3]** channel. <p></p></center></center></center></center></center></center></center></center><p><a href="https://www.infosecurity.us/blog/2026/1/10/ndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/ndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel/" data-a2a-title="NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel%2F&linkname=NDSS%202025%20%E2%80%93%20EMIRIS%3A%20Eavesdropping%20On%20Iris%20Information%20Via%20Electromagnetic%20Side%20Channel" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel%2F&linkname=NDSS%202025%20%E2%80%93%20EMIRIS%3A%20Eavesdropping%20On%20Iris%20Information%20Via%20Electromagnetic%20Side%20Channel" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel%2F&linkname=NDSS%202025%20%E2%80%93%20EMIRIS%3A%20Eavesdropping%20On%20Iris%20Information%20Via%20Electromagnetic%20Side%20Channel" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel%2F&linkname=NDSS%202025%20%E2%80%93%20EMIRIS%3A%20Eavesdropping%20On%20Iris%20Information%20Via%20Electromagnetic%20Side%20Channel" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fndss-2025-emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel%2F&linkname=NDSS%202025%20%E2%80%93%20EMIRIS%3A%20Eavesdropping%20On%20Iris%20Information%20Via%20Electromagnetic%20Side%20Channel" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.youtube-nocookie.com/embed/PUyDUmuvg0o?si=BP2Zih40qOqGq8sv">https://www.youtube-nocookie.com/embed/PUyDUmuvg0o?si=BP2Zih40qOqGq8sv</a> </p>