Upload
anivararavind
View
223
Download
0
Embed Size (px)
Citation preview
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 1/29
Biometrics
Vulnerabilities & Exploits
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 2/29
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 3/29
Authentication by Technology
• Requires the exchange of certain
FACTORS• Requires an authority who can verify these
factors
• Requires an authority who can providepermission to build a relationship andtransact
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 4/29
...Authentication by Technology
Factors are classified into 3 types
• Ownership factor like cards, badges or keys• Knowledge factor like user id, password
and pins
• Inheritance factor like weight, height, faceshape, color of eyes/hair, birth marks etc.all nicely encoded in a photo
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 5/29
Properties of different FactorsTable 1. Properties of different Factors
Factors Examples Desired Properties Available properties
Ownership factorWhat you have
Cards Unique and ShareableNo DuplicationRevocable
YesUsually can be duplicatedYes
Badges
Keys
Knowledge factorWhat you know
User ID Unique and Shareable Yes (within a particularcontext)
Password Hard to guess, easy toremember.Must be a secret
Usually the reverse
PIN
Inheritance factorWhat you are(Something Uniqueabout you)
FingerprintFaceIrisVoiceRetina
Easily DigitizedEasily VerifiableNon SpoofableTime InvariantEnvironment Invariant
Discussed below
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 6/29
The Inheritance Factor - Biometrics
The Subject of discussion for today is the
Inheritance Factor – Biometrics• Implementation difficulties
• Vulnerabilities
• The authentication process and it'svulnerabilities, in brief
• Since the UIDAI has choosen the use of
finger prints and iris as a means of authentication, we will be discussing onlythese factors
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 7/29
Finger Print ScannersMost commonly used Finger Print scanners
Sensor Technology Scanner types Live finger
detection
Number of
fingers
Optical
Capacitive
Thermal
RF Resistive Capacitive
Swipe
Static contact
Static non contact
Conductivity
Thermal
Both
Single
Paired
All
• Many variations on these basic techniques• Variations are primarily to reduce cost, size and
probably to overcome existing patents
• Some claims exist about the ability to sense below
the “dead skin” surface. However for our vulnerability assements, these claims are triviallyovercome
• Sensor technologies are not relevant to the scopeof vulnerabilites and exploits
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 8/29
Fingerprint Readers
Fig 1: Optical Sensing Fig 2: Capacitive Sensing
Fig 3: Optical Reader Fig 4: Opticalmodule
Fig 5: Multi-Slap
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 9/29
Iris Scanners
• Iris scanners use a Near Infra Red light
• Camera coupled with some autofocusingtechniques (commonly used in autofocus
cameras)
IRIS Scanners
Fig 6: Hand-Held Iris Scanner Fig 7: Iris scanner in field use
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 10/29
Iris scan - Base Technique
John Daugman (1994)
Pupil detection:
circular edge detector
Segmenting sclera
Fi 8: An Iris with circular se mentation and the maths involved in derivin the 2048 bit val
rr0 1
θ
θ
∫ ∂∂
00
00,,
,, 2),()(max
y xr y xr
dsr y x I
r r G
π σ
∫ ∫ +
−=
+
−=∈ ∂
∂8/
8/]10,5.1[
),(2
m ax00
π φ
π φ θ
δ
δ ρ
θ ρ ρ θ ρ π δ
d d I r r
r
r r r r
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 11/29
Fig 9: Biometric Enrollment and Verification process
The Process
• All id systems involve an enrollment process andan authentication process, followed by anauthorization process, to enter / exit / recieve /depoist etc
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 12/29
The Enrollement Process
• Capture image
• Process image• Extract Features
• Create Template
• Save raw data inthe case of criminal records
• Encryption• Transmission
• De duplicationand storage
Fig 10: Finger Print Capture
Fig 11: Index values extracted from fingerprint images
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 13/29
The Authentication process
• Capture image
• Process image
• Extract Features
• Create Template
• Encryption
• Transmission
• Receive result
• UIDAI has notspecified iris for authentication*
Fig 13: Comparison of minutae with stored template
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 14/29
Threats faced by biometric systems
• Threat agents
– Only simple impostor, without muchsophistication or resources. We shallleave out crossborder attack vectors, aspilfering state subsidies may not be their highest priority
• Threat Vectors
– Fake credentials and replay attacks• System Weaknesses
– Extraction of digital keys, use of internal
facilities of sensors
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 15/29
Desired Characteristics And
Limitations
• Easy and accurate Digitization of thepresented bio characteristic
• Time Invariant
• Environment Invariant
• Spoof proof
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 16/29
Fig 14: How not to place your finger on the sensor
... Limitations in enrollment / auth
• Easy and accurate Digitization – neither
easy nor accurate• Too many wrong
methods, resultsin
unreproduceabletemplate
• Guidedenrollment
useless for auth• Very difficult for
occasional users
• Manual overides= more holes
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 17/29
... Limitations in enrollment / auth• Time invariance – a myth
– Ageing changes fingerprints (1)
– Skin ailments makes auth difficult if not impossible
– No large scale studies on heterogenous
populations – Will require frequent re-enrollment – aka more
holes
– No (available?) studies on iris variations due toageing
– Errors due to unknown causes (2)
1) https://www.cerias.purdue.edu/apps/reports_and_papers/view/3155/
2)http://biometrics.nist.gov/cs_links/quality/workshopII/proc/Kim_Analysis_of_Effect_ofingerprint_Sample_Quality_in_Template_Ageing.pdf
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 18/29
... Limitations in enrollment / auth• Environment invariance – a myth
– Water logged hands changes fingerprintsmachine readbility
– Dry skin changes fingerprints machine
readbility – Will require frequent re-enrollment – aka more
holes
– No (available?) studies on iris variations dueto harsh environments
– Inter device variationshttp://www.slideshare.net/bspalabs/2008-investigating-the-
relationship-between-fingerprint-image-quality-and-skin-characteristics.
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 19/29
... Limitations in enrollment / auth
• Non- Spoofability
– Biometrics are the worst
– Fingeprints are spoofed by gummy finger techniqe
– Iris are spoofed by photographs
– Iris are spoofed by patterned contacts
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 20/29
Spoofing made easy - Fingerprints
http://cryptome.org/gummy.htm
• Uses common
ingredients
• Fools allsystems withgreater than60%repeatability
• Newer
mateials andtechniqueseven moreeffective
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 21/29
Spoofing made easy - Iris
http://www.visiondirect.com/lens/default.asp?
catid=10774&trx=LeftNav&trxp1=27087&trxp2=10774&trxp3=2
• Buy from the net to
create fake ids for sale
• PCB etching
techniues for masqureading
• Older techniqueusing high resphotograph withpupil holes
Fig A.3-1: Spiderman returns
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 22/29
Attack Vectors requiring skill
• Template reconstruction
– Biometric id systems store data as atemplates, usually a few kilobytes insize. It has been shown that a biometric
fingerprint system can be compromisedby recreating the biometric using thestored template
– Template extraction and storage afeature of systems
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 23/29
... Attack Vectors requiring skill
• Key duplication – Trivial to break into the device and
extract keys
– Addition deletion of keys a feature – Even in locked down devices, the key
can be recovered by simply copying the
onboard flash to a pc and reusing thebackup in a device purchased from themarket
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 24/29
... Attack Vectors requiring skill
• Replay attack at sensor pins – The sensor interfaces are relatively
simple
– Produce raw data (Fig 4). It is possibleto record all data, and then replay thatdata
– This attack requires some technical skill – However once developed it can be
mass produced and will be
undetectable
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 25/29
Biometrics WORST CHARACTERISTIC
• Cannot bewithdrawn
• Cannot be changed
• This violates thebasic requirementof any id system
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 26/29
Inherent problems with Biometric
Systems• FAR - False Acceptance Rate indicates the
number of wrong matches of a presentedbiometric – mistakenly identyfying one personas another
• FRR - False Rejection Rate (also called FalseNon Match Rate) indicates the number of wrong rejects of a presented biometric.
• Best FAR of .00060 for fingerprints• Best FAR of .000120 for Iris
• Best FRR of .0060 for fingerprints
• Best FRR of .0012 for Iris
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 27/29
... Inherent problems with Biometric
Systems
F A R ( % ) F R R ( % ) A d u l tP o p u l a t i o n
( M i l l i o n )
F a l s ea c c e p t a n c e
( M i l l i o n )
F a l s e R e j e c( M i l l i o n )
F i n g e r p r i n t 0 . 0 0 0 6 0 0 0 . 0 0 6 0 8 5 0 0 . 5 1 5 . 1I r i s 0 . 0 0 0 1 2 0 0 . 0 0 1 2 8 5 0 0 . 1 1 . 0 2
• FAR and FRR closely linked to template size
• Reducing FAR increase FRR
• Reducing FRR increases FAR
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 28/29
... Inherent problems with Biometric
Systems
• Requires very good power • Requires very good telecommunications
infrastructure
• Both of very poor quality in many areas• Even in Maharshtra in the Konkan region,
such infratructure is poor due to natural
causes – Hilly terrain
– RF shadow regions
– Heavy rains and lightning
S mma
8/9/2019 India's Unique ID project: Biometrics Vulnerabilities & Exploits
http://slidepdf.com/reader/full/indias-unique-id-project-biometrics-vulnerabilities-exploits 29/29
Summary• Biometrics as a unique id in an automated system
has never been tested on a large scale
• The inherent characteristic of biometrics is it'sirrevocability. This is in direct contradiction of anyid / security system, where keys must berevocable and reissueable
• Fingerprints are easily spoofable
• Iris patterns are easily spoofable
• Biometrics are very susceptible to the naturalbiological processes of growth, ageing andenvironment
• Numerous technical vulnerabilities are availble for
exploitation at the sensor system interface