13
Cyber Vulnerabilities of Biometrics Bojan Simic CTO @ Hypr Corp. @bojansimic hypr.com

"Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Embed Size (px)

Citation preview

Page 1: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Cyber Vulnerabilities of Biometrics Bojan Simic CTO @ Hypr Corp. @bojansimic hypr.com

Page 2: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

What’s this talk about?

Page 3: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Current methods of proving Am I who I say I am?

have failed miserably.

Page 4: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Our Authentication Failures

1. 123456 2. Password 3. 12345 4. 12345678 5. Qwerty

6. 123456789 7. 1234 8. baseball 9. dragon 10. football

11. 1234567 12. monkey 13. letmein 14. abc123 15. 111111

Top 15 Passwords of 2014

“2FA Systems Used by Banks Bypassed with Malware, Rogue Mobile Apps”

Page 5: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Biometrics to the Rescue

Page 6: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Not so fast...

•  Man in the Middle Attacks (MITM) •  Malware •  Biometric Storage (Digital Lockers) •  BYOD/Internet of Things

Page 7: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Biometrics the Wrong Way – Example 1

Malware Bypasses Client Side Verification

Page 8: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Biometrics the Wrong Way – Part 2

Man in the Middle Attacks – Biometric Storage

Page 9: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Do’s and Dont’s of Biometric Security

§ Do encrypt everything § Do device tracking § Do behavioral analysis § Do require 3-factor

security § Don’t do Client Side Verification § Don’t store biometric data in a

centralized repository § Don’t rely on passwords § Don’t do verification of template

data remotely

Do Don’t

Page 10: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Free tools for your consideration

§  Fast Identity Online (FIDO) alliance §  Read it §  Learn it §  Love it §  Open Web Application Security Project (OWASP) §  Read the top 10 – Especially authentication §  Join and participate §  Dozens of free tools and documentation

§  Join pilot programs for new biometric tech

Page 11: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)
Page 12: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)
Page 13: "Cyber Vulnerabilities of Biometrics" by Bojan Simic (@bojansimic)

Thank You! Email - [email protected] Twitter - @bojansimic https://hypr.com