Saturday, January 12, 2019

Cyber criminals defeat vein authentication by causing a fake hand. Safety researchers used 2, five-hundred pictures of a palm to produce an exact model out of wax


hackers

Cyber-terrorist defeat vein authentication by looking into making a fake hand. Safety researchers used 2, five-hundred pictures of a palm to create an exact model out of wax


Biometric security has moved beyond just fingerprints and face recognition to vein-based authentication. Unfortunately, hackers have already figured out a way to be able to crack that, too. In accordance to Motherboard, security researchers at the Chaos Connection Congress hacking conference within Leipzig, Germany showed a model wax hand of which they used to defeat a vein authentication method utilizing a wax model hand.

Vein authentication typically uses a computer system to scan the shape, size and location of a individual's veins in their hands. Those patterns have to be able to be discovered each time the system scans the person's hand. To be able to fool that will security check, the experts took 2, 500 images of a hand utilizing a modified SLR camera that had the infrared filtration removed to better emphasize veins under the skin. They then took those images and developed wax hand with the details of the person's veins sculpted right in. That wax mock-up was enough to bypass the vein authentication system.

To be very clear, the method utilized by the safety researchers isn't the one which an average joe could easily replicate. While the researchers said photos coming from as far away as five meters (about 16 feet) are good enough, snapping enough to create a reliable model might be a challenge without lots associated with access to the hand in question. From the more rigorous cracking process than, say, fingerprint ID that may potentially be hacked basically by lifting a individual's fingerprint from an object they have touched. It still presents a problem that security systems can be manipulated with cheap and readily available materials.

No comments:

Post a Comment