SlideShare a Scribd company logo
1 of 11
Cyber Vulnerabilities of
Biometrics
Bojan Simic
CTO @ Hypr Corp.
@bojansimic
hypr.com
What’s this talk about?
Current methods of proving
Am I who I say I am?
have failed miserably.
Our Authentication Failures
1. 123456
2. Password
3. 12345
4. 12345678
5. Qwerty
6. 123456789
7. 1234
8. baseball
9. dragon
10. football
11. 1234567
12. monkey
13. letmein
14. abc123
15. 111111
Top 15 Passwords of 2014
“2FA Systems Used by Banks Bypassed
with Malware, Rogue Mobile Apps”
Biometrics to the Rescue
Not so fast...
• Man in the Middle Attacks (MITM)
• Malware
• Biometric Storage (Digital Lockers)
• BYOD/Internet of Things
Biometrics the Wrong Way – Example 1
Malware Bypasses Client Side Verification
Biometrics the Wrong Way – Part 2
Man in the Middle Attacks – Biometric Storage
Do’s and Dont’s of Biometric Security
Do encrypt everything
Do device tracking
Do behavioral analysis
Do require 3-factor
security
Don’t do Client Side Verification
Don’t store biometric data in a
centralized repository
Don’t rely on passwords
Don’t do verification of template
data remotely
Do
Don’t
Free tools for your consideration
 Fast Identity Online (FIDO) alliance
 Read it
 Learn it
 Love it
 Open Web Application Security Project (OWASP)
 Read the top 10 – Especially authentication
 Join and participate
 Dozens of free tools and documentation
 Join pilot programs for new biometric tech
Thank You!
Email - bojan@hypr.com
Twitter - @bojansimic
https://hypr.com

More Related Content

Viewers also liked

Agilité Management & Sponsorship
Agilité Management & SponsorshipAgilité Management & Sponsorship
Agilité Management & SponsorshipBluewaves
 
Какви са методиките и практиките, които се препоръчват в сегашния момент.
Какви са методиките и практиките, които се препоръчват в сегашния момент.Какви са методиките и практиките, които се препоръчват в сегашния момент.
Какви са методиките и практиките, които се препоръчват в сегашния момент.Ferdinand131
 
Impact assessment-study-dit
Impact assessment-study-ditImpact assessment-study-dit
Impact assessment-study-ditGirma Biresaw
 
Computer Science Education From Startup perspective
Computer Science Education From Startup perspectiveComputer Science Education From Startup perspective
Computer Science Education From Startup perspectiveArvind Jha
 
PRIME BIRDの開発バナシ
PRIME BIRDの開発バナシPRIME BIRDの開発バナシ
PRIME BIRDの開発バナシkazuya noshiro
 
ユニティチャンホイホイが生まれてしまった理由
ユニティチャンホイホイが生まれてしまった理由ユニティチャンホイホイが生まれてしまった理由
ユニティチャンホイホイが生まれてしまった理由kazuya noshiro
 
THETAでモバイルVRコンテンツ開発
THETAでモバイルVRコンテンツ開発THETAでモバイルVRコンテンツ開発
THETAでモバイルVRコンテンツ開発kazuya noshiro
 
Watson x Unityで広がる可能性
Watson x Unityで広がる可能性Watson x Unityで広がる可能性
Watson x Unityで広がる可能性kazuya noshiro
 
production,planning and control
production,planning and controlproduction,planning and control
production,planning and controlAnil Kollur
 
upstream & downstream process of antibiotics
upstream & downstream process of antibioticsupstream & downstream process of antibiotics
upstream & downstream process of antibioticsAnil Kollur
 
ポケットの中のVR
ポケットの中のVRポケットの中のVR
ポケットの中のVRkazuya noshiro
 

Viewers also liked (13)

Agilité Management & Sponsorship
Agilité Management & SponsorshipAgilité Management & Sponsorship
Agilité Management & Sponsorship
 
JAPUZZLE
JAPUZZLEJAPUZZLE
JAPUZZLE
 
Какви са методиките и практиките, които се препоръчват в сегашния момент.
Какви са методиките и практиките, които се препоръчват в сегашния момент.Какви са методиките и практиките, които се препоръчват в сегашния момент.
Какви са методиките и практиките, които се препоръчват в сегашния момент.
 
Impact assessment-study-dit
Impact assessment-study-ditImpact assessment-study-dit
Impact assessment-study-dit
 
Computer Science Education From Startup perspective
Computer Science Education From Startup perspectiveComputer Science Education From Startup perspective
Computer Science Education From Startup perspective
 
PRIME BIRDの開発バナシ
PRIME BIRDの開発バナシPRIME BIRDの開発バナシ
PRIME BIRDの開発バナシ
 
ユニティチャンホイホイが生まれてしまった理由
ユニティチャンホイホイが生まれてしまった理由ユニティチャンホイホイが生まれてしまった理由
ユニティチャンホイホイが生まれてしまった理由
 
Chap009
Chap009Chap009
Chap009
 
THETAでモバイルVRコンテンツ開発
THETAでモバイルVRコンテンツ開発THETAでモバイルVRコンテンツ開発
THETAでモバイルVRコンテンツ開発
 
Watson x Unityで広がる可能性
Watson x Unityで広がる可能性Watson x Unityで広がる可能性
Watson x Unityで広がる可能性
 
production,planning and control
production,planning and controlproduction,planning and control
production,planning and control
 
upstream & downstream process of antibiotics
upstream & downstream process of antibioticsupstream & downstream process of antibiotics
upstream & downstream process of antibiotics
 
ポケットの中のVR
ポケットの中のVRポケットの中のVR
ポケットの中のVR
 

Similar to ConnectIdTalk

Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual BranchJay McLaughlin
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your JobEvolver Inc.
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsDaveEdwards12
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseStephen Cobb
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...Eoin Keary
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper ExampleKayla Perry
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
How can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docxHow can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docxtpaula2
 
[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information Disclosure[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information DisclosureOWASP EEE
 
Bio catch
Bio catchBio catch
Bio catchYanivt
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 

Similar to ConnectIdTalk (20)

Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job5 Myths of Cybersecurity That are Important to You and Your Job
5 Myths of Cybersecurity That are Important to You and Your Job
 
Cyber Safety 101
Cyber Safety 101Cyber Safety 101
Cyber Safety 101
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
How can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docxHow can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docx
 
[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information Disclosure[Hungary] I play Jack of Information Disclosure
[Hungary] I play Jack of Information Disclosure
 
Bio catch
Bio catchBio catch
Bio catch
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 

ConnectIdTalk

  • 1. Cyber Vulnerabilities of Biometrics Bojan Simic CTO @ Hypr Corp. @bojansimic hypr.com
  • 3. Current methods of proving Am I who I say I am? have failed miserably.
  • 4. Our Authentication Failures 1. 123456 2. Password 3. 12345 4. 12345678 5. Qwerty 6. 123456789 7. 1234 8. baseball 9. dragon 10. football 11. 1234567 12. monkey 13. letmein 14. abc123 15. 111111 Top 15 Passwords of 2014 “2FA Systems Used by Banks Bypassed with Malware, Rogue Mobile Apps”
  • 6. Not so fast... • Man in the Middle Attacks (MITM) • Malware • Biometric Storage (Digital Lockers) • BYOD/Internet of Things
  • 7. Biometrics the Wrong Way – Example 1 Malware Bypasses Client Side Verification
  • 8. Biometrics the Wrong Way – Part 2 Man in the Middle Attacks – Biometric Storage
  • 9. Do’s and Dont’s of Biometric Security Do encrypt everything Do device tracking Do behavioral analysis Do require 3-factor security Don’t do Client Side Verification Don’t store biometric data in a centralized repository Don’t rely on passwords Don’t do verification of template data remotely Do Don’t
  • 10. Free tools for your consideration  Fast Identity Online (FIDO) alliance  Read it  Learn it  Love it  Open Web Application Security Project (OWASP)  Read the top 10 – Especially authentication  Join and participate  Dozens of free tools and documentation  Join pilot programs for new biometric tech
  • 11. Thank You! Email - bojan@hypr.com Twitter - @bojansimic https://hypr.com

Editor's Notes

  1. Notes: Introduction to myself I’m the CTO of Hypr Corp I worked as a cyber security consultant at governments, financials services, and healthcare sectors. I have an interest in biometrics and a vendetta against weak security
  2. Notes: What’s this talk about? The talk is about the fact that we are very very terrible at doing information security. We have been doing physical security using things like tall walls, bank vaults, and weapons for a very long time. We’ve only been doing information security for 60 years and we’re terrible at it. And why is that?
  3. Notes: It’s because our existing methods of proving “Am I who I say I am” have failed us time and time again. Every time you turn on the news you hear about some new security breach about how millions or billions of passwords, SSNs, or credit cards have been stolen.
  4. We have had nothing but catastrophic security failures day in and day out for as long as I can remember. And in a world where everything is becoming digital, we need a solution. For God’s sake, the top 15 passwords used in 2015 are embarrassing. And over 90% of us have a password that’s in the list of top 1000. We have made certain steps to reduce our dependency on passwords with 2-factor authentication. This includes SMS messages or security tokens that many of you have where you need to punch in some digits to gain access to things. But recently even those have proven to be compromised more and more. So what do we do?
  5. Notes: Cue the emerging technologies that are biometrics. Retinal Scanners, Fingerprint readers, voice analyzers, facial recognition. All new ways of answering “am I who I say I am?”. In previous decades, such methods of authentication were extremely expensive and an engineering nightmare. However, recent advances in technology have enabled us to put biometrics in things like our phones, on our laptops, and even our door locks. We are finally at a point where it’s technologically and financially feasible to secure our data with biometrics. Awesome, right?
  6. Notes: Not so fast! There are countless sophisticated attacks that have bypassed every type of security control we have ever put in place. What makes us so sure that it won’t happen with biometrics. One thing that I really hope you all take away from this talk is that biometrics are NOT a silver bullet! They are merely another cog in a great big machine that we need to place properly in order for it to be successful. Existing cyber attacks such as Man in the Middle, Malware (Trojans), and several others can bypass biometrics just as easily as passwords or 2-factor tokens. Furthermore, unlike a password that I can change whenever I want, my biometric never changes. So storage and management of biometric data is critical. With our dependence on personal devices and with 75% of employers allowing employees to use these personal devices at their jobs, it can be difficult to put proper security controls in such a fragmented environment.
  7. So let’s look at some ways not to do biometric Authentication. In this scenario we have to take into account malware. Why do we have to do this? Because almost 40% of the devices in this country have some sort of malware on them. If it’s not your laptop, it could be your child’s or spouses that runs on the same network as yours. This image depicts a common biometric implementation such as the iPhone or Android phone you have in your hands. There is a biometric sensor such as a fingerprint and when you touch your finger to the sensor, your phone determines whether or not that fingerprint is valid. ---- AFTER Transition ---- Where is the problem here? Well, take into account the scenario where your phone is compromised and gets a malware Trojan. That malware simply says the fingerprint is “valid” every time an application requires a fingerprint. This renders the biometric sensor worthless. In this case, the fingerprint reader on your phone is purely a convenience feature instead of a security feature. And that’s not good enough.
  8. Another way of doing biometrics the wrong way. Scenario where a biometric device takes a template and stores it on a remote server and then verifies the template on there. ---- AFTER Transition ---- This is susceptible to replay attacks from man in the middle vectors. If the validation server is compromised, biometric data is compromised and that’s a problem because biometrics cannot be changed.
  9. Do’s and don’t’s - You should encrypt everything. It’s critical that this is done in transmission AND at rest. Do device tracking so that if a authentication request comes from a device for a user that it usually doesn’t come from, that’s a red flag. Analyze the behavior of your users. If Bob always accesses his bank account between the hours of 8 AM and 9 PM, and suddenly he’s trying to access it at 4 AM from Nigeria, that’s an issue. Require 3 factors of security – If you have a biometric available, don’t think passwords are unnecessary.
  10. Free Tools Here are some free tools for you to use for reducing the likelihood of falling victim to cyber attacks. FIDO – Fast Identity Online – I hope that most of you are familiar with it. If not, be here tomorrow morning for the Keynote. Read it, learn it, love it. It will make your life a lot easier. OWASP – The open web application security project – The worlds of hardware and software are being merged like never before. Now we have biometric devices interacting with the web. Familiarize yourselves with common attacks that can come from the web. Join pilot programs for new biometric tech. There are many new biometric technologies coming out all the time. Try them out!
  11. Questions and thank you..