SlideShare a Scribd company logo
Unlocking any door in the 21st century
Immersion in biometric security
1
Timur Yunusov & Alexandra Murzina
Who we are
● ex A-Team Cyber R&D Lab
● Head of research
● Senior ML security expert
2
Outline
● Current state of AI/ML in biometrics
● ML attacks landscape
● Attacking devices
○ Device 1 - undisclosed
○ Device 2 - ZKTeco
○ Device 3 - Eufy
● Conclusions
● Security Checklist
3
United States:
State-specific biometric laws, e.g., BIPA in Illinois and CCPA in California.
FBI uses biometrics for law enforcement and border control.
China:
Extensive government use of biometrics for surveillance and security.
Requirement to store critical data, including biometrics, within the
country.
India:
Aadhaar Act regulates biometric data collected under Aadhaar
program.
Proposed Data Privacy Bill aims for comprehensive data protection.
European Union (EU):
GDPR regulates biometric data with explicit consent and stringent
protection.
United Arab Emirates (UAE):
DIFC's data protection law covers biometric data.
Government uses biometrics extensively for security and services.
Japan:
APPI regulates personal data, including biometrics, with consent and
protection.
Legislation
United Kingdom:
Data Protection Act regulates personal data processing, including
biometrics.
Independent oversight of law enforcement biometric use by Biometrics
Commissioner.
South Korea:
PIPA considers biometric data "sensitive," requiring consent and
protection.
Regulations allow biometric authentication in financial transactions.
Brazil:
LGPD regulates personal data processing, including biometrics, with
consent and protection.
Requires security measures and impact assessments.
South Africa:
POPIA regulates personal data processing, including biometrics, with
consent and protection.
Russia:
Personal Data Law mandates consent for biometric processing.
Federal Law regulates fingerprinting.
Unified Biometric System enables bank identification.
Government uses biometrics for security and law enforcement.
4
Practical aspects
5
Current state of
AI/ML in biometrics
6
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
7
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Early Methods, Eigenfaces
initially, manual analysis of facial features in photos measured distances and angles between
landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces,
using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces."
Local Feature Methods
techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and
local changes.
2D and 3D Face Models
2D and 3D face models accounted for pose and expression variations, with 3D models providing
depth information.
8
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Early Methods, Eigenfaces
initially, manual analysis of facial features in photos measured distances and angles between
landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces,
using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces."
Local Feature Methods
techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and
local changes.
2D and 3D Face Models
2D and 3D face models accounted for pose and expression variations, with 3D models providing
depth information.
Machine Learning and Deep Learning
machine learning and deep learning techniques, like SVMs and CNNs, automatically learned and
extracted facial features from large datasets, enhancing recognition accuracy and robustness.
9
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Early Methods, Eigenfaces
initially, manual analysis of facial features in photos measured distances and angles between
landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces,
using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces."
Local Feature Methods
techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and
local changes.
2D and 3D Face Models
2D and 3D face models accounted for pose and expression variations, with 3D models providing
depth information.
Machine Learning and Deep Learning
machine learning and deep learning techniques, like SVMs and CNNs, automatically learned and
extracted facial features from large datasets, enhancing recognition accuracy and robustness.
Depth Sensing and Infrared Cameras
Modern systems use depth sensing and infrared cameras to capture facial information in
challenging lighting or obscured faces, enabling accurate recognition and spoof detection.
Multi-modal and Fusion Methods
Combining multiple biometric modalities, such as face and voice or fusing 2D and 3D data, has
enhanced recognition performance.
Emotion Recognition and Liveness Detection
Recent advancements include emotion recognition from facial expressions and liveness detection
to verify the subject's presence.
10
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Face Detection
algorithms like Haar cascades or SSD locate and isolate faces in
images or video streams.
Face Alignment
detected faces are transformed into a standard format by
rotating, scaling, and translating them for uniformity.
Feature Extraction
machine learning models, such as CNNs, extract unique facial
features and create a face embedding or feature vector.
Face Matching
extracted features are compared with stored feature vectors
using distance metrics like Euclidean or cosine distance.
Systems identify the closest match or verify if the face matches
a specific representation.
Decision Making
the system determines whether to accept or reject
identification or verification based on matching results,
sometimes providing a confidence score or probability.
11
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Face Detection
algorithms like Haar cascades or SSD locate and isolate faces in
images or video streams.
Face Alignment
detected faces are transformed into a standard format by
rotating, scaling, and translating them for uniformity.
Feature Extraction
machine learning models, such as CNNs, extract unique facial
features and create a face embedding or feature vector.
Face Matching
extracted features are compared with stored feature vectors
using distance metrics like Euclidean or cosine distance.
Systems identify the closest match or verify if the face matches
a specific representation.
Decision Making
the system determines whether to accept or reject
identification or verification based on matching results,
sometimes providing a confidence score or probability.
12
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Face Detection
algorithms like Haar cascades or SSD locate and isolate faces in
images or video streams.
Face Alignment
detected faces are transformed into a standard format by
rotating, scaling, and translating them for uniformity.
Feature Extraction
machine learning models, such as CNNs, extract unique facial
features and create a face embedding or feature vector.
Face Matching
extracted features are compared with stored feature vectors
using distance metrics like Euclidean or cosine distance.
Systems identify the closest match or verify if the face matches
a specific representation.
Decision Making
the system determines whether to accept or reject
identification or verification based on matching results,
sometimes providing a confidence score or probability.
13
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Face Detection
algorithms like Haar cascades or SSD locate and isolate faces in
images or video streams.
Face Alignment
detected faces are transformed into a standard format by
rotating, scaling, and translating them for uniformity.
Feature Extraction
machine learning models, such as CNNs, extract unique facial
features and create a face embedding or feature vector.
Face Matching
extracted features are compared with stored feature vectors
using distance metrics like Euclidean or cosine distance.
Systems identify the closest match or verify if the face matches
a specific representation.
Decision Making
the system determines whether to accept or reject
identification or verification based on matching results,
sometimes providing a confidence score or probability.
14
Physical Biometric
Modalities
Fingerprint Recognition
Face Recognition
Iris Recognition
Retina Recognition
Hand Geometry
Vein Recognition
Ear Recognition
DNA Biometrics
Behavioral Biometric
Modalities
Voice Recognition
Signature Recognition
Keystroke Dynamics
Gait Recognition
Mouse Dynamics
Face Detection
algorithms like Haar cascades or SSD locate and isolate faces in
images or video streams.
Face Alignment
detected faces are transformed into a standard format by
rotating, scaling, and translating them for uniformity.
Feature Extraction
machine learning models, such as CNNs, extract unique facial
features and create a face embedding or feature vector.
Face Matching
extracted features are compared with stored feature vectors
using distance metrics like Euclidean or cosine distance.
Systems identify the closest match or verify if the face matches
a specific representation.
Decision Making
the system determines whether to accept or reject
identification or verification based on matching results,
sometimes providing a confidence score or probability.
15
ML attacks landscape
16
ML attacks landscape v1
AI App Security Risk
Model
Security
• Adversarial ML
• Model
Backdoor
• Model Theft
Implementation
Security
• Sensor Security
• Flaws in Framework
• Logical Flaws
Data Integrity
Security
• Data Poisoning
• Scaling Attack
• Risk over Network
https://tinyurl.com/4fh7j3ky
17
https://tinyurl.com/339uetbz
18
AI Attacks
Promt
injection
Training
attacks
AI Agents Tools Storage Models
# alter agent routing
# send commands to
undefined systems
# execute arbitrary
commands on backend
business systems
# pass through injection on
connected tool systems
# code execution on agent
system
# attack embedding
databases
# extract sensitive data
# modify embedding data
resulting in tampered model
results
# bypass model protections
# force model to exhibit bias
# extraction of other users' and/or
backend data
# force model to exhibit intolerant
behavior
# poison other users' results
# disrupt model trust/reliability
#access unpublished models
# introduce bias into
the model
# disrupt model
trust/reliability
ML attacks landscape v2
Biometric attacks landscape
19
Data
acquisition
Feature
Extraction
Face Matching Decision
Data Storage
Attack on the
sensor by biometric
presentation type
Sample
replacement
Attack
on the signal
processor
Pattern
replacement
Attack on the
comparison
algorithm
Value
replacement
Decision
replacement
Replacement of
sample (pattern)
Replacement of link
to sample
Biometrics
attack
Infrastructure attacks
Attacking devices
20
Devices overview
facial recognition
access control device
time control
device
smart doorbell
21
Device #1
1) The customer bought an expensive B2B device
which we audited in their work environment
2) Typically, multiple devices are ordered for the
project:
one — for physical hacking, the second — for
logical and testing, the third is a backup
3) The result of the physical audit. Categories of
cameras in systems and in our system. The reason
for using depth cameras
22
Overview depth camera 2 x visible
light camera
23
Assumption #1
How does it work?
1) Detecting a face in
the frame.
2) Checking Liveness
with the depth
camera.
3) Capture the face from
the visible range
camera.
4) Pre-processing.
5) DNN
6) Comparison with the
database using
threshold 2500
depth camera 2 x visible
light camera
24
Assumption #1
How does it work?
1) Detecting a face in
the frame.
2) Checking Liveness
with the depth
camera.
3) Capture the face
from the visible
range camera.
4) Pre-processing.
5) DNN
6) Comparison with the
database using
threshold 2500
25
What if there are multiple faces in the
frame?
The larger head is the one being analyzed.
Assumption #2 | Multiple faces
26
Assumption #3 | universal face?
You need to pass 2500 threshold to get access.
Hypothesis — It is possible to authenticate
without having a photo of the reference user.
Create a generated face and present it to the
system via a spoofed channel.
27
28
Assumption #3 | universal face?
Variational
Autoencoder
CelebA Dataset
Face Super-
Resolution
model
score > 2500 ?
digital physical
NO YES
Results #1
● The study unveils inadequate utilization of depth
camera data by the vendor.
● This deficiency may stem from hardware limitations,
potentially rendering the system more vulnerable to
attacks. Deep learning models do not interact with
depth maps in any way.
● Incorporating depth data in the training process
could enhance system reliability.
● However, it may also introduce complexities in the
preparation of training datasets.
29
Device #2 (ZKTeco)
1) Time tracking terminal
2) No CUDA
3) ML algorithms from 2010
30
Overview
It uses only infrared camera
31
How it works
32
Biometrical algorithms:
1) Gabor Filters https://t.co/CBFKums9TO
2) Local Binary Pattern https://t.co/OxYFkTZTP0
Gabor filter
Local binary pattern
As seen by the infrared
light camera
LED lamp inspiration
33
LED lamps emit a lot of their
energy in the form of
infrared light
LED lamp inspiration
34
printing a photo on transparent film
LED lamps emit a lot of their
energy in the form of
infrared light
LED lamp inspiration
35
LED lamps emit a lot of their
energy in the form of
infrared light
printing a photo on transparent film
shining an
incandescent light
through it
Results #2
● We discovered logical vulnerabilities in the terminal,
enabling a more detailed examination of its
functioning.
● One notable attempt involved creating a unique
single-frame screen displayed on transparent film
and illuminated with infrared light
● Unfortunately, the terminal exhibited high sensitivity
to specific changes. For instance, it identified the
same user differently when wearing or not wearing
glasses, treating them as distinct individuals.
● Nevertheless, the combination of technologies,
including Gabor filters, local binary patterns, and an
infrared camera, provides a solid defense against
potential attacks
36
Device #3 (Eufy)
Smart doorbells become the part of everyone’s life
Vendors add “AI” to the device
Now the product is more complex
Is it more secure now?
37
Overview ● The Smart Doorbell is a high-tech home security device.
It offers HD video, two-way audio, motion detection, and
local storage (c)
● It's privacy-focused with robust encryption and
integrates with other devices (c)
38
Issue #1: Man-in-the-middle attack
Device checks for firmware
updates every time it boots
There’s no SSL pinning
Firmware is “signed” with MD5
39
Issue #2: Military grade encryption
● All videos are stored on a 4GB “smart
hub”
● There’s AES-128 encryption
● Key is generate using srand() PRNG
● Seed is time()
● 30s to find the key and decrypt the
videos
40
Issue #3: Authorisation bypass
Every snapshot is
uploaded to AWS
Server generates AWS
signature for
uploading/downloading
41
Issue #3: Authorisation bypass
Every snapshot is uploaded to AWS
Server generates AWS signature for
uploading/downloading
Path traversal in link signature generation
Any snapshot of any eufy user is available
42
Issue #4: Unlocked USB-OTG
Direct physical access to shell
Access to firmware binaries
model.bin.tar
43
Overview
● The Smart Doorbell is a high-tech home security device.
It offers HD video, two-way audio, motion detection, and
local storage (c)
● It's privacy-focused with robust encryption and
integrates with other devices (c)
● You can choose between battery or wired installation,
and it's weather-resistant. Control it via a user-friendly
app for remote monitoring and alerts (c)
44
Overview
● The Smart Doorbell is a high-tech home security device.
It offers HD video, two-way audio, motion detection, and
local storage (c)
● It's privacy-focused with robust encryption and
integrates with other devices (c)
● You can choose between battery or wired installation,
and it's weather-resistant. Control it via a user-friendly
app for remote monitoring and alerts (c)
45
Is it still vulnerable?
46
https://github.com/kripthor/talks_and_slides/blob
/main/IoT-Landscape.pdf
47
More evidence that Eufy can’t be
hacked
48
Lessons learned
Newer, better, more secure - False
More advanced ML - more resilient algorithms - False
Cheaper devices - less security - False
49
Checklist
50
Hardware/Software
- Enumerate interfaces
- ethernet
- USB, serial and debugging ports
- mics and cameras
- Investigate available cameras
- infra-red, depth camera, etc
- Firmware
- Download the FW from public or using MiTM
- Open a device and extract the FW from a chip
- Get information about the vendor
- Can the models and algorithms be extracted
- Where and how images/videos are stored and processed (cloud or on-prem)
- Assess the infrastructure and public libs
Data privacy & Model robustness (Grey Box)
- Errors in the recognition pipeline
- Adversarial attacks
- deepfakes
- universal faces
- similar faces
- Liveness checks
Data integrity & Model confidentiality tests (Black Box)
- Interfering with sensors
- With light
- By the channel interference
- Spoofing
- Determine crucial elements on a face by overlapping parts
- Can we use a digital face instead, e.g., a large LCD
- DDoS by presenting a large number of faces
- Applying patches and masks
- Data stealing
- Targeted and untargeted attacks
Kudos
51
Alexander Migutsky
Denis Goryushev
Egor Zaitsev
Dmitry Sklyarov
Pedro Umbelino
Cyber R&D Lab (RIP)

More Related Content

What's hot

Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
Suyash Srijan
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Dirk Nicol
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Edureka!
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Publish Android Application on Google Play Store
Publish Android Application on Google Play Store Publish Android Application on Google Play Store
Publish Android Application on Google Play Store
Sandip Kalola
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Mobile operating system
Mobile operating systemMobile operating system
Mobile operating system
SUDARSHAN TIWARI
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
KAMALI PRIYA P
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
Tech Stack Ideas
Tech Stack IdeasTech Stack Ideas
Tech Stack Ideas
nsclark
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Initial Response and Forensic Duplication
Initial Response and Forensic Duplication Initial Response and Forensic Duplication
Initial Response and Forensic Duplication
Jyothishmathi Institute of Technology and Science Karimnagar
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Taha Malampatti
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Hacking Android OS
Hacking Android OSHacking Android OS
Hacking Android OS
Jimmy Software
 

What's hot (20)

Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
 
Cia security model
Cia security modelCia security model
Cia security model
 
Publish Android Application on Google Play Store
Publish Android Application on Google Play Store Publish Android Application on Google Play Store
Publish Android Application on Google Play Store
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Mobile operating system
Mobile operating systemMobile operating system
Mobile operating system
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Tech Stack Ideas
Tech Stack IdeasTech Stack Ideas
Tech Stack Ideas
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Initial Response and Forensic Duplication
Initial Response and Forensic Duplication Initial Response and Forensic Duplication
Initial Response and Forensic Duplication
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Doxygen
DoxygenDoxygen
Doxygen
 
Hacking Android OS
Hacking Android OSHacking Android OS
Hacking Android OS
 

Similar to Unlocking Any Door In The 21st Century. Immersion In Biometric Security.

biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Dhimankomal
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometrics
BiometricsBiometrics
76 s201920
76 s20192076 s201920
76 s201920
IJRAT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Pushkar Dutt
 

Similar to Unlocking Any Door In The 21st Century. Immersion In Biometric Security. (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition
Face recognitionFace recognition
Face recognition
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
G041041047
G041041047G041041047
G041041047
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
76 s201920
76 s20192076 s201920
76 s201920
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

More from Payment Village

How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
Payment Village
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
Payment Village
 
The white whales of fraud and where to find them
The white whales of fraud and where to find themThe white whales of fraud and where to find them
The white whales of fraud and where to find them
Payment Village
 
Breaking banks or saving them
Breaking banks or saving themBreaking banks or saving them
Breaking banks or saving them
Payment Village
 
Hack in Cash out OWASP London
Hack in Cash out OWASP LondonHack in Cash out OWASP London
Hack in Cash out OWASP London
Payment Village
 
Ради денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминаловРади денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминалов
Payment Village
 
Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.
Payment Village
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
Payment Village
 
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемыСМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
Payment Village
 

More from Payment Village (9)

How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
 
The white whales of fraud and where to find them
The white whales of fraud and where to find themThe white whales of fraud and where to find them
The white whales of fraud and where to find them
 
Breaking banks or saving them
Breaking banks or saving themBreaking banks or saving them
Breaking banks or saving them
 
Hack in Cash out OWASP London
Hack in Cash out OWASP LondonHack in Cash out OWASP London
Hack in Cash out OWASP London
 
Ради денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминаловРади денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминалов
 
Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
 
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемыСМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
 

Recently uploaded

一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 

Recently uploaded (9)

一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 

Unlocking Any Door In The 21st Century. Immersion In Biometric Security.

  • 1. Unlocking any door in the 21st century Immersion in biometric security 1 Timur Yunusov & Alexandra Murzina
  • 2. Who we are ● ex A-Team Cyber R&D Lab ● Head of research ● Senior ML security expert 2
  • 3. Outline ● Current state of AI/ML in biometrics ● ML attacks landscape ● Attacking devices ○ Device 1 - undisclosed ○ Device 2 - ZKTeco ○ Device 3 - Eufy ● Conclusions ● Security Checklist 3
  • 4. United States: State-specific biometric laws, e.g., BIPA in Illinois and CCPA in California. FBI uses biometrics for law enforcement and border control. China: Extensive government use of biometrics for surveillance and security. Requirement to store critical data, including biometrics, within the country. India: Aadhaar Act regulates biometric data collected under Aadhaar program. Proposed Data Privacy Bill aims for comprehensive data protection. European Union (EU): GDPR regulates biometric data with explicit consent and stringent protection. United Arab Emirates (UAE): DIFC's data protection law covers biometric data. Government uses biometrics extensively for security and services. Japan: APPI regulates personal data, including biometrics, with consent and protection. Legislation United Kingdom: Data Protection Act regulates personal data processing, including biometrics. Independent oversight of law enforcement biometric use by Biometrics Commissioner. South Korea: PIPA considers biometric data "sensitive," requiring consent and protection. Regulations allow biometric authentication in financial transactions. Brazil: LGPD regulates personal data processing, including biometrics, with consent and protection. Requires security measures and impact assessments. South Africa: POPIA regulates personal data processing, including biometrics, with consent and protection. Russia: Personal Data Law mandates consent for biometric processing. Federal Law regulates fingerprinting. Unified Biometric System enables bank identification. Government uses biometrics for security and law enforcement. 4
  • 6. Current state of AI/ML in biometrics 6
  • 7. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics 7
  • 8. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Early Methods, Eigenfaces initially, manual analysis of facial features in photos measured distances and angles between landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces, using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces." Local Feature Methods techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and local changes. 2D and 3D Face Models 2D and 3D face models accounted for pose and expression variations, with 3D models providing depth information. 8
  • 9. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Early Methods, Eigenfaces initially, manual analysis of facial features in photos measured distances and angles between landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces, using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces." Local Feature Methods techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and local changes. 2D and 3D Face Models 2D and 3D face models accounted for pose and expression variations, with 3D models providing depth information. Machine Learning and Deep Learning machine learning and deep learning techniques, like SVMs and CNNs, automatically learned and extracted facial features from large datasets, enhancing recognition accuracy and robustness. 9
  • 10. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Early Methods, Eigenfaces initially, manual analysis of facial features in photos measured distances and angles between landmarks like eyes and nose. Automated face recognition began in the late 1980s with Eigenfaces, using PCA to extract features from grayscale images, representing faces as weighted "eigenfaces." Local Feature Methods techniques like LBP and Gabor wavelets focused on specific face regions, capturing texture and local changes. 2D and 3D Face Models 2D and 3D face models accounted for pose and expression variations, with 3D models providing depth information. Machine Learning and Deep Learning machine learning and deep learning techniques, like SVMs and CNNs, automatically learned and extracted facial features from large datasets, enhancing recognition accuracy and robustness. Depth Sensing and Infrared Cameras Modern systems use depth sensing and infrared cameras to capture facial information in challenging lighting or obscured faces, enabling accurate recognition and spoof detection. Multi-modal and Fusion Methods Combining multiple biometric modalities, such as face and voice or fusing 2D and 3D data, has enhanced recognition performance. Emotion Recognition and Liveness Detection Recent advancements include emotion recognition from facial expressions and liveness detection to verify the subject's presence. 10
  • 11. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Face Detection algorithms like Haar cascades or SSD locate and isolate faces in images or video streams. Face Alignment detected faces are transformed into a standard format by rotating, scaling, and translating them for uniformity. Feature Extraction machine learning models, such as CNNs, extract unique facial features and create a face embedding or feature vector. Face Matching extracted features are compared with stored feature vectors using distance metrics like Euclidean or cosine distance. Systems identify the closest match or verify if the face matches a specific representation. Decision Making the system determines whether to accept or reject identification or verification based on matching results, sometimes providing a confidence score or probability. 11
  • 12. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Face Detection algorithms like Haar cascades or SSD locate and isolate faces in images or video streams. Face Alignment detected faces are transformed into a standard format by rotating, scaling, and translating them for uniformity. Feature Extraction machine learning models, such as CNNs, extract unique facial features and create a face embedding or feature vector. Face Matching extracted features are compared with stored feature vectors using distance metrics like Euclidean or cosine distance. Systems identify the closest match or verify if the face matches a specific representation. Decision Making the system determines whether to accept or reject identification or verification based on matching results, sometimes providing a confidence score or probability. 12
  • 13. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Face Detection algorithms like Haar cascades or SSD locate and isolate faces in images or video streams. Face Alignment detected faces are transformed into a standard format by rotating, scaling, and translating them for uniformity. Feature Extraction machine learning models, such as CNNs, extract unique facial features and create a face embedding or feature vector. Face Matching extracted features are compared with stored feature vectors using distance metrics like Euclidean or cosine distance. Systems identify the closest match or verify if the face matches a specific representation. Decision Making the system determines whether to accept or reject identification or verification based on matching results, sometimes providing a confidence score or probability. 13
  • 14. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Face Detection algorithms like Haar cascades or SSD locate and isolate faces in images or video streams. Face Alignment detected faces are transformed into a standard format by rotating, scaling, and translating them for uniformity. Feature Extraction machine learning models, such as CNNs, extract unique facial features and create a face embedding or feature vector. Face Matching extracted features are compared with stored feature vectors using distance metrics like Euclidean or cosine distance. Systems identify the closest match or verify if the face matches a specific representation. Decision Making the system determines whether to accept or reject identification or verification based on matching results, sometimes providing a confidence score or probability. 14
  • 15. Physical Biometric Modalities Fingerprint Recognition Face Recognition Iris Recognition Retina Recognition Hand Geometry Vein Recognition Ear Recognition DNA Biometrics Behavioral Biometric Modalities Voice Recognition Signature Recognition Keystroke Dynamics Gait Recognition Mouse Dynamics Face Detection algorithms like Haar cascades or SSD locate and isolate faces in images or video streams. Face Alignment detected faces are transformed into a standard format by rotating, scaling, and translating them for uniformity. Feature Extraction machine learning models, such as CNNs, extract unique facial features and create a face embedding or feature vector. Face Matching extracted features are compared with stored feature vectors using distance metrics like Euclidean or cosine distance. Systems identify the closest match or verify if the face matches a specific representation. Decision Making the system determines whether to accept or reject identification or verification based on matching results, sometimes providing a confidence score or probability. 15
  • 17. ML attacks landscape v1 AI App Security Risk Model Security • Adversarial ML • Model Backdoor • Model Theft Implementation Security • Sensor Security • Flaws in Framework • Logical Flaws Data Integrity Security • Data Poisoning • Scaling Attack • Risk over Network https://tinyurl.com/4fh7j3ky 17
  • 18. https://tinyurl.com/339uetbz 18 AI Attacks Promt injection Training attacks AI Agents Tools Storage Models # alter agent routing # send commands to undefined systems # execute arbitrary commands on backend business systems # pass through injection on connected tool systems # code execution on agent system # attack embedding databases # extract sensitive data # modify embedding data resulting in tampered model results # bypass model protections # force model to exhibit bias # extraction of other users' and/or backend data # force model to exhibit intolerant behavior # poison other users' results # disrupt model trust/reliability #access unpublished models # introduce bias into the model # disrupt model trust/reliability ML attacks landscape v2
  • 19. Biometric attacks landscape 19 Data acquisition Feature Extraction Face Matching Decision Data Storage Attack on the sensor by biometric presentation type Sample replacement Attack on the signal processor Pattern replacement Attack on the comparison algorithm Value replacement Decision replacement Replacement of sample (pattern) Replacement of link to sample Biometrics attack Infrastructure attacks
  • 21. Devices overview facial recognition access control device time control device smart doorbell 21
  • 22. Device #1 1) The customer bought an expensive B2B device which we audited in their work environment 2) Typically, multiple devices are ordered for the project: one — for physical hacking, the second — for logical and testing, the third is a backup 3) The result of the physical audit. Categories of cameras in systems and in our system. The reason for using depth cameras 22
  • 23. Overview depth camera 2 x visible light camera 23
  • 24. Assumption #1 How does it work? 1) Detecting a face in the frame. 2) Checking Liveness with the depth camera. 3) Capture the face from the visible range camera. 4) Pre-processing. 5) DNN 6) Comparison with the database using threshold 2500 depth camera 2 x visible light camera 24
  • 25. Assumption #1 How does it work? 1) Detecting a face in the frame. 2) Checking Liveness with the depth camera. 3) Capture the face from the visible range camera. 4) Pre-processing. 5) DNN 6) Comparison with the database using threshold 2500 25
  • 26. What if there are multiple faces in the frame? The larger head is the one being analyzed. Assumption #2 | Multiple faces 26
  • 27. Assumption #3 | universal face? You need to pass 2500 threshold to get access. Hypothesis — It is possible to authenticate without having a photo of the reference user. Create a generated face and present it to the system via a spoofed channel. 27
  • 28. 28 Assumption #3 | universal face? Variational Autoencoder CelebA Dataset Face Super- Resolution model score > 2500 ? digital physical NO YES
  • 29. Results #1 ● The study unveils inadequate utilization of depth camera data by the vendor. ● This deficiency may stem from hardware limitations, potentially rendering the system more vulnerable to attacks. Deep learning models do not interact with depth maps in any way. ● Incorporating depth data in the training process could enhance system reliability. ● However, it may also introduce complexities in the preparation of training datasets. 29
  • 30. Device #2 (ZKTeco) 1) Time tracking terminal 2) No CUDA 3) ML algorithms from 2010 30
  • 31. Overview It uses only infrared camera 31
  • 32. How it works 32 Biometrical algorithms: 1) Gabor Filters https://t.co/CBFKums9TO 2) Local Binary Pattern https://t.co/OxYFkTZTP0 Gabor filter Local binary pattern As seen by the infrared light camera
  • 33. LED lamp inspiration 33 LED lamps emit a lot of their energy in the form of infrared light
  • 34. LED lamp inspiration 34 printing a photo on transparent film LED lamps emit a lot of their energy in the form of infrared light
  • 35. LED lamp inspiration 35 LED lamps emit a lot of their energy in the form of infrared light printing a photo on transparent film shining an incandescent light through it
  • 36. Results #2 ● We discovered logical vulnerabilities in the terminal, enabling a more detailed examination of its functioning. ● One notable attempt involved creating a unique single-frame screen displayed on transparent film and illuminated with infrared light ● Unfortunately, the terminal exhibited high sensitivity to specific changes. For instance, it identified the same user differently when wearing or not wearing glasses, treating them as distinct individuals. ● Nevertheless, the combination of technologies, including Gabor filters, local binary patterns, and an infrared camera, provides a solid defense against potential attacks 36
  • 37. Device #3 (Eufy) Smart doorbells become the part of everyone’s life Vendors add “AI” to the device Now the product is more complex Is it more secure now? 37
  • 38. Overview ● The Smart Doorbell is a high-tech home security device. It offers HD video, two-way audio, motion detection, and local storage (c) ● It's privacy-focused with robust encryption and integrates with other devices (c) 38
  • 39. Issue #1: Man-in-the-middle attack Device checks for firmware updates every time it boots There’s no SSL pinning Firmware is “signed” with MD5 39
  • 40. Issue #2: Military grade encryption ● All videos are stored on a 4GB “smart hub” ● There’s AES-128 encryption ● Key is generate using srand() PRNG ● Seed is time() ● 30s to find the key and decrypt the videos 40
  • 41. Issue #3: Authorisation bypass Every snapshot is uploaded to AWS Server generates AWS signature for uploading/downloading 41
  • 42. Issue #3: Authorisation bypass Every snapshot is uploaded to AWS Server generates AWS signature for uploading/downloading Path traversal in link signature generation Any snapshot of any eufy user is available 42
  • 43. Issue #4: Unlocked USB-OTG Direct physical access to shell Access to firmware binaries model.bin.tar 43
  • 44. Overview ● The Smart Doorbell is a high-tech home security device. It offers HD video, two-way audio, motion detection, and local storage (c) ● It's privacy-focused with robust encryption and integrates with other devices (c) ● You can choose between battery or wired installation, and it's weather-resistant. Control it via a user-friendly app for remote monitoring and alerts (c) 44
  • 45. Overview ● The Smart Doorbell is a high-tech home security device. It offers HD video, two-way audio, motion detection, and local storage (c) ● It's privacy-focused with robust encryption and integrates with other devices (c) ● You can choose between battery or wired installation, and it's weather-resistant. Control it via a user-friendly app for remote monitoring and alerts (c) 45
  • 46. Is it still vulnerable? 46
  • 48. More evidence that Eufy can’t be hacked 48
  • 49. Lessons learned Newer, better, more secure - False More advanced ML - more resilient algorithms - False Cheaper devices - less security - False 49
  • 50. Checklist 50 Hardware/Software - Enumerate interfaces - ethernet - USB, serial and debugging ports - mics and cameras - Investigate available cameras - infra-red, depth camera, etc - Firmware - Download the FW from public or using MiTM - Open a device and extract the FW from a chip - Get information about the vendor - Can the models and algorithms be extracted - Where and how images/videos are stored and processed (cloud or on-prem) - Assess the infrastructure and public libs Data privacy & Model robustness (Grey Box) - Errors in the recognition pipeline - Adversarial attacks - deepfakes - universal faces - similar faces - Liveness checks Data integrity & Model confidentiality tests (Black Box) - Interfering with sensors - With light - By the channel interference - Spoofing - Determine crucial elements on a face by overlapping parts - Can we use a digital face instead, e.g., a large LCD - DDoS by presenting a large number of faces - Applying patches and masks - Data stealing - Targeted and untargeted attacks
  • 51. Kudos 51 Alexander Migutsky Denis Goryushev Egor Zaitsev Dmitry Sklyarov Pedro Umbelino Cyber R&D Lab (RIP)