29
 Biometrics Vulnerabilities & Exploits  [email protected]

India's Unique ID project: Biometrics Vulnerabilities & Exploits

Embed Size (px)

Citation preview

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 1/29

 

Biometrics

Vulnerabilities & Exploits

 [email protected]

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 2/29

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 3/29

 

Authentication by Technology

• Requires the exchange of certain

FACTORS• Requires an authority who can verify these

factors

• Requires an authority who can providepermission to build a relationship andtransact

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 4/29

 

...Authentication by Technology

Factors are classified into 3 types

• Ownership factor like cards, badges or keys• Knowledge factor like user id, password

and pins

• Inheritance factor like weight, height, faceshape, color of eyes/hair, birth marks etc.all nicely encoded in a photo

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 5/29

 

Properties of different FactorsTable 1. Properties of different Factors

Factors Examples Desired Properties Available properties

Ownership factorWhat you have

Cards Unique and ShareableNo DuplicationRevocable

YesUsually can be duplicatedYes

Badges

Keys

Knowledge factorWhat you know

User ID Unique and Shareable Yes (within a particularcontext)

Password Hard to guess, easy toremember.Must be a secret

Usually the reverse

PIN

Inheritance factorWhat you are(Something Uniqueabout you)

FingerprintFaceIrisVoiceRetina

Easily DigitizedEasily VerifiableNon SpoofableTime InvariantEnvironment Invariant

Discussed below

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 6/29

 

The Inheritance Factor - Biometrics

The Subject of discussion for today is the

Inheritance Factor – Biometrics• Implementation difficulties

• Vulnerabilities

• The authentication process and it'svulnerabilities, in brief 

• Since the UIDAI has choosen the use of 

finger prints and iris as a means of authentication, we will be discussing onlythese factors

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 7/29

 

Finger Print ScannersMost commonly used Finger Print scanners

Sensor Technology Scanner types Live finger

detection

Number of

fingers

Optical

Capacitive

Thermal

RF Resistive Capacitive

Swipe

Static contact

Static non contact

Conductivity

Thermal

Both

Single

Paired

All

• Many variations on these basic techniques• Variations are primarily to reduce cost, size and

probably to overcome existing patents

• Some claims exist about the ability to sense below

the “dead skin” surface. However for our vulnerability assements, these claims are triviallyovercome

• Sensor technologies are not relevant to the scopeof vulnerabilites and exploits

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 8/29

 

Fingerprint Readers

 Fig 1: Optical Sensing Fig 2: Capacitive Sensing

 Fig 3: Optical Reader Fig 4: Opticalmodule

 Fig 5: Multi-Slap

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 9/29

 

Iris Scanners

• Iris scanners use a Near Infra Red light

• Camera coupled with some autofocusingtechniques (commonly used in autofocus

cameras)

IRIS Scanners

 Fig 6: Hand-Held Iris Scanner Fig 7: Iris scanner in field use

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 10/29

 

Iris scan - Base Technique 

John Daugman (1994)

Pupil detection:

circular edge detector

 

Segmenting sclera

 Fi 8:  An Iris with circular se mentation and the maths involved in derivin the 2048 bit val

rr0 1

θ

θ

∫ ∂∂

00

00,,

,, 2),()(max

 y xr  y xr 

dsr  y x I 

r r G

π σ 

∫ ∫ +

−=

+

−=∈ ∂

∂8/

8/]10,5.1[

),(2

m ax00

π φ 

π φ θ 

δ 

δ  ρ 

θ  ρ  ρ θ  ρ π δ 

d d  I r r 

r r r r 

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 11/29

 

 Fig 9: Biometric Enrollment and Verification process

The Process

• All id systems involve an enrollment process andan authentication process, followed by anauthorization process, to enter / exit / recieve /depoist etc

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 12/29

 

The Enrollement Process

• Capture image

• Process image• Extract Features

• Create Template

• Save raw data inthe case of criminal records

• Encryption• Transmission

• De duplicationand storage

 Fig 10: Finger Print Capture

 Fig 11: Index values extracted from fingerprint images

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 13/29

 

The Authentication process

• Capture image

• Process image

• Extract Features

• Create Template

• Encryption

• Transmission

• Receive result

• UIDAI has notspecified iris for authentication*

 Fig 13: Comparison of minutae with stored template

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 14/29

 

Threats faced by biometric systems

• Threat agents

 – Only simple impostor, without muchsophistication or resources. We shallleave out crossborder attack vectors, aspilfering state subsidies may not be their highest priority

• Threat Vectors 

 – Fake credentials and replay attacks• System Weaknesses

 – Extraction of digital keys, use of internal

facilities of sensors

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 15/29

 

Desired Characteristics And

Limitations

• Easy and accurate Digitization of thepresented bio characteristic

• Time Invariant

• Environment Invariant

• Spoof proof 

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 16/29

 

 Fig 14: How not to place your finger on the sensor

... Limitations in enrollment / auth

• Easy and accurate Digitization – neither 

easy nor accurate• Too many wrong

methods, resultsin

unreproduceabletemplate

• Guidedenrollment

useless for auth• Very difficult for 

occasional users

• Manual overides= more holes

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 17/29

 

... Limitations in enrollment / auth• Time invariance – a myth

 – Ageing changes fingerprints (1)

 – Skin ailments makes auth difficult if not impossible

 – No large scale studies on heterogenous

populations – Will require frequent re-enrollment – aka more

holes

 – No (available?) studies on iris variations due toageing

 – Errors due to unknown causes (2)

1) https://www.cerias.purdue.edu/apps/reports_and_papers/view/3155/

2)http://biometrics.nist.gov/cs_links/quality/workshopII/proc/Kim_Analysis_of_Effect_ofingerprint_Sample_Quality_in_Template_Ageing.pdf

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 18/29

 

... Limitations in enrollment / auth• Environment invariance – a myth

 – Water logged hands changes fingerprintsmachine readbility

 – Dry skin changes fingerprints machine

readbility – Will require frequent re-enrollment – aka more

holes

 – No (available?) studies on iris variations dueto harsh environments

 – Inter device variationshttp://www.slideshare.net/bspalabs/2008-investigating-the-

relationship-between-fingerprint-image-quality-and-skin-characteristics.

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 19/29

 

... Limitations in enrollment / auth

• Non- Spoofability

 – Biometrics are the worst

 – Fingeprints are spoofed by gummy finger techniqe

 – Iris are spoofed by photographs

 – Iris are spoofed by patterned contacts

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 20/29

 

Spoofing made easy - Fingerprints

http://cryptome.org/gummy.htm

• Uses common

ingredients

• Fools allsystems withgreater than60%repeatability

• Newer 

mateials andtechniqueseven moreeffective

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 21/29

 

Spoofing made easy - Iris

http://www.visiondirect.com/lens/default.asp?

catid=10774&trx=LeftNav&trxp1=27087&trxp2=10774&trxp3=2

• Buy from the net to

create fake ids for sale

• PCB etching

techniues for masqureading

• Older techniqueusing high resphotograph withpupil holes

 Fig A.3-1: Spiderman returns

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 22/29

 

Attack Vectors requiring skill

• Template reconstruction

 – Biometric id systems store data as atemplates, usually a few kilobytes insize. It has been shown that a biometric

fingerprint system can be compromisedby recreating the biometric using thestored template

 – Template extraction and storage afeature of systems

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 23/29

 

... Attack Vectors requiring skill

• Key duplication – Trivial to break into the device and

extract keys

 – Addition deletion of keys a feature – Even in locked down devices, the key

can be recovered by simply copying the

onboard flash to a pc and reusing thebackup in a device purchased from themarket

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 24/29

 

... Attack Vectors requiring skill

• Replay attack at sensor pins – The sensor interfaces are relatively

simple

 – Produce raw data (Fig 4). It is possibleto record all data, and then replay thatdata

 – This attack requires some technical skill – However once developed it can be

mass produced and will be

undetectable

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 25/29

 

Biometrics WORST CHARACTERISTIC

• Cannot bewithdrawn

• Cannot be changed

• This violates thebasic requirementof any id system

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 26/29

 

Inherent problems with Biometric

Systems• FAR - False Acceptance Rate indicates the

number of wrong matches of a presentedbiometric – mistakenly identyfying one personas another 

• FRR - False Rejection Rate (also called FalseNon Match Rate) indicates the number of wrong rejects of a presented biometric.

• Best FAR of .00060 for fingerprints• Best FAR of .000120 for Iris

• Best FRR of .0060 for fingerprints

• Best FRR of .0012 for Iris

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 27/29

 

... Inherent problems with Biometric

Systems

F A R ( % ) F R R ( % ) A d u l tP o p u l a t i o n

( M i l l i o n )

F a l s ea c c e p t a n c e

( M i l l i o n )

F a l s e R e j e c( M i l l i o n )

F i n g e r p r i n t 0 . 0 0 0 6 0 0 0 . 0 0 6 0 8 5 0 0 . 5 1 5 . 1I r i s 0 . 0 0 0 1 2 0 0 . 0 0 1 2 8 5 0 0 . 1 1 . 0 2

• FAR and FRR closely linked to template size

• Reducing FAR increase FRR

• Reducing FRR increases FAR

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 28/29

 

... Inherent problems with Biometric

Systems

• Requires very good power • Requires very good telecommunications

infrastructure

• Both of very poor quality in many areas• Even in Maharshtra in the Konkan region,

such infratructure is poor due to natural

causes – Hilly terrain

 – RF shadow regions

 – Heavy rains and lightning

S mma

8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits

http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 29/29

 

Summary• Biometrics as a unique id in an automated system

has never been tested on a large scale

• The inherent characteristic of biometrics is it'sirrevocability. This is in direct contradiction of anyid / security system, where keys must berevocable and reissueable

• Fingerprints are easily spoofable

• Iris patterns are easily spoofable

• Biometrics are very susceptible to the naturalbiological processes of growth, ageing andenvironment

• Numerous technical vulnerabilities are availble for 

exploitation at the sensor system interface