Researchers Hack Biometric Faces 244
yahoi sends in news from a week or so back: "Vietnamese researchers have cracked the facial recognition technology used for authentication in Lenovo, Asus, and Toshiba laptops in lieu of the standard logon/password. The researchers were able to easily bypass the biometric authentication system built into the laptops by using photos of an authorized user, as well as by presenting multiple phony facial images in brute-force attacks. One of the researchers will demonstrate the hack at Black Hat DC this week. He says the laptop makers should remove the facial biometrics feature from their products because the vulnerability of this technology can't be fixed."
hacking? (Score:5, Funny)
Re:hacking? Huh? (Score:2, Interesting)
Not for that. But they should be careful because they probably just pissed off a load of laptop and biometrics software manufacturers who will likely lobby for their being arrested if they land in the US, or if they commence their presentation.
Haven't they heard of Russian and other national's programmers being arrested or threatened with arrest if they land here?
But, if they are REALLY good, they've come up with a solution (for however long decent solutions can be expected to last...), and boost Vietnam's
Re: (Score:3, Informative)
Re: (Score:2)
That's about it, hell I did this to my own laptop a few months ago. I took a shitty photo of my face with my shitty cameraphone and held the image up too the camera and it accepted it. The first thing I did after that was disable the facial recognition.
Re:hacking? Huh? (Score:5, Insightful)
What planet have you been on for the last couple of years? Seriously.. which one?
This has nothing to do with tin-foil-hat paranoid delusions. The GP may have been referring to Dmitry Sklyarov, which another poster just mentioned to you. That was about Adobe. Adobe did/does have huge flaws in it's software and Mr. Sklyarov came to the U.S to demonstrate that Adobe's representations of security were basically just fluff. He was arrested, and it was a HUGE deal.
This is not the only instance either. Anytime somebody dares to demonstrate how a security technology may be flawed those affected companies are using the DMCA and the corrupt/broken legisilative/judicial system to quash any dissemination of data that would reveal their products are snake oil.
Just awhile back there was a posting here on /. where a group of university kids (MIT) were involved in a lawsuit to suppress information they uncovered involving vulnerabilities in another security system.
There are plenty of examples where security is proven to be worthless and those affected financially have resorted to corrupt influences in the government to suppress the information and punish those involved with arrest.
These things I have mentioned to you are not delusional. I would suggest you educate yourself with the facts before accusing somebody of just being paranoid. Especially, since the GP was referring to something factual.
Re: (Score:3, Informative)
You want me to get my facts straight? Ummm, OK.
What situation are you referring to in the first place? I also don't understand the difference between reverse engineering code and demonstrating the function of intact code. Both would seem to me to have the same goal, which is to demonstrate that the intended goal of the software is f
Re:hacking? Huh? (Score:5, Informative)
Here's an up-to-date partial list of security researchers who have been threatened with legal action for releasing research on security vulnerabilities:
http://attrition.org/errata/legal_threats/ [attrition.org]
It should give you an idea of why people are concerned.
Re:hacking? Huh? (Score:5, Insightful)
Re:hacking? (Score:5, Funny)
Re: (Score:2)
Shouldn't they get charged with hacking the researchers faces off? That is kind of brutal no?
Hey, hacking off someone's face and wearing it as a grotesque mask to access their laptop is ghoulish, but it works! :-\
You gotta do watcha gotta do
Re:Terrible News! Please read! (Score:4, Insightful)
I can't understand the mindset that people must have to actually post trollish crap like this under their username.
It boggles the mind that we as a society are producing a generation of kids that actually takes pride in being anti-social and disruptive. Yet we have the arrogance to wage wars in an effort to make other nations emulate our social paradigm.
Perhaps it's not them that needs liberating from dictatorial governments, it's us that needs liberating from a downward spiral into social implosion.
Yes, yes I'm ready for the off topic mods now.
Ok then... (Score:5, Interesting)
If that's the standard, all security features should be removed. Everything is somewhat vulnerable, and a determined intruder with infinite resource will almost always find a way in. The object is to make this unreasonably hard for most applications.
If you get your laptop lifted at the coffee shop, they better lift your wallet too I guess.
Re:Ok then... (Score:5, Funny)
Everything is somewhat vulnerable, and a determined intruder with infinite resource will almost always find a way in.
The point is facial recognition alone is so vulnerable! All you need is a cameraphone and a photo printer - and you can't revoke your face as your password either. At least with fingerprints you can get hacked nearly 10 times (on average) before it becomes a problem.
Re: (Score:3, Funny)
Ummm... balaclava the headwear, not baklava the tasty Greek pastry! I guess you can still wear bakclava for your wife, if that will help, but maybe not in public.
Re: (Score:2, Funny)
No, no, no. I'm pretty sure the parent was talking about wearing baklava! It's really, really sticky, see, so if someone tries to take a picture of you, they'll probably end up stuck to your face!
Re: (Score:3, Funny)
Assuming that's the ONLY place you're wearing it, that is.
Re: (Score:2, Informative)
Re: (Score:2, Insightful)
Exactly how is someone going to get photo of you of sufficient quality to fool the recognition system without you knowing about it? You'll see the person taking the photo, and thus be able to deal with the potential breach before it ever happens.
Apparently you've never seen a telephoto lens in action.
Re: (Score:2)
I dunno about you, but nobody has ever had a reason to turn that kinda telephoto lens on me. For anyone who has motivated that, I'd wager they've got bigger problems than somebody wanting to peek at their laptop....
Re: (Score:2)
Re: (Score:2)
X-ray telephoto is it, then? Enjoy the view. Sorry I haven't managed to lose more weight and have that third nipple removed.
The Internet? (Score:5, Insightful)
Just sayin'.
Re: (Score:2)
I haven't. There's other things identity thieves might do with a high-quality digital image, so I don't take chances. Did I mention I predicted the Millenium Bug almost 20 years in advance?
Re: (Score:3, Funny)
If you've ever posted a photo of yourself on Twitter, Facebook, Myspace, a blog, or your website, people can easily get a high-quality photo of you without you knowing it.
You've seen a high quality photo on Facebook?
Re: (Score:3, Interesting)
http://profile.ak.facebook.com/v224/628/60/s501905303_4113.jpg [facebook.com]
I imagine macraig.homedns.org and vulcan tourist.info had pics too but you can't seem to keep them up. I like the cartoon image of you that you usually use though.
Re: (Score:2)
We just all need to re-learn how to be camera-shy?
Hey, I wear baklava all the time. It's a great way to make friends.
Re: (Score:2)
Just don't ever let them take pictures of you, that's all. Your family photos will look a bit weird with you scissored out of all of them, but your wife will never be able to get you hauled up on charges for all that kiddie porn you've been hiding on yer laptop. You know, the one you don't use a laptop cooler with because you actually LIKE the warm and fuzzy feeling it gives you down there when you're ogling.
Re: (Score:2)
If the locker door just looks like it's locked but it's actually open, then somebody else with your morals but enough brains to test the door surreptitiously will take it. If the top selling door lock is made of cardboard, some crook's going to figure out that it's worth their time to test locks with a pair of scissors. If a
Re:Ok then... (Score:5, Insightful)
I definitely disagree here. While passwords can be brute forced given enough time, your face is almost certainly available to someone who has access to get at your computer.
There is a difference between identification and authentication (your claim of who you are, and your proof of that claim). What you look like is identification.
Re:Ok then... (Score:4, Insightful)
While passwords can be brute forced given enough time, your face is almost certainly available to someone who has access to get at your computer.
Also, you could say that face recognition is just as secure as writing a reasonably long password on your forehead. Someone takes a picture and boom. Access.
Personally, I refrain from writing my passwords on my forehead - regardless if I can see a suspicious-looking character taking a picture of me square-enough in the face to capture all the digits. And, I also refrain of using or buying face recognition devices...
Re: (Score:2)
There is no need to take your wallet, most mobile phones have cameras in them that could be used to get a photo of your face.
1. Walk into cafe looking for a target
2. Photograph the target's face
3. Steal the targets laptop
4. Profit
Re: (Score:2)
More to the point, you could use something like an Iphone with a DB of randomly generated photos until it cracked. This is what the researchers here did. This is the real vulnerability. But it's brute force attack, and on any proper 'secured' system it would have to be one of several.
Re:Ok then... (Score:5, Insightful)
Re: (Score:2)
Everything is somewhat vulnerable, and a determined intruder with infinite resource will almost always find a way in. The object is to make this unreasonably hard for most applications.
With the ubiquity of digital cameras, "determined intruder with infinite resource" no longer includes "scumbag with camera".
As such, this security feature seems particularly useless.
Re:Ok then... (Score:5, Insightful)
If that's the standard, all security features should be removed. Everything is somewhat vulnerable, and a determined intruder with infinite resource will almost always find a way in. The object is to make this unreasonably hard for most applications.
Not quite. Biometrics are horrible for security, because 1. they're not secret, 2. they're not easily replaceable. Once they have a picture of you, facial recognition is broken. Once they have your fingerprint, that's broken as well.
Once they have your password, you choose another one and that's it. I'd like to see you do that with your face.
Re: (Score:2)
I take your point, but I don't understand the either/or philosophy of security. Besides, in most cases that matter, once they have your 'password', they have you. Period.
To me, security is all about layering anyways. Adding a biometric layer that works well for the user (i.e. effortless) and typically involves a brute force attack to defeat? Why not?
Re:Ok then... (Score:5, Insightful)
Re: (Score:2)
If a password is broken, and your email account or whatever is compromised, that sucks; but you can generate a new one for future rounds. If a biometric ID is cracked, you can't generate a new one, so any and all systems, for the rest of your life, that are "secured" by biometrics aren't secure.
Which reminds me. What do you do with an iris scan if you lose your eyes? Fingerprint if you lose that finger? Facial recognition after a fight with the neighbor...
Re: (Score:2)
Re: (Score:2)
A Responsible Citizen would have safeguarded his identity, and would never have engaged in physical conflict. I'm afraid that, in addition to your re-authentication penalty charge, that will be going on your permanent record...
Heh. Now it's even illegal if you didn't cause that car crash :)
Re: (Score:2)
...Facial recognition after a fight with the neighbor...
I had been thinking about this aspect - and although I believe the facial recognition systems aren't yet ready for prime-time, at least if you're subjected to this hack, [xkcd.com] it could save your face!
Re: (Score:2)
That is where biometrics really falls flat.
Are you saying that we should remove the photos from our IDs?
Card + Code + fingerprint = a very hard nut to crack. Biometrics can be faked, but so can every other singular security precaution. That's why you couple them with other security features and never rely on one aspect alone.
Besides, which fingerprint did you plan on using?
Re: (Score:2)
> Are you saying that we should remove the photos from our IDs?
You probably can't convince a security guard that you are me by pasting a photo of me to your forhead.
Re: (Score:3, Insightful)
So based on this argument, card + code is just as secure as card + code + fingerprint. The fingerprint step is there to make you feel safe rather than really make you safe.
Re: (Score:3, Insightful)
Biometrics are one part of a good authentication system. But there are always trade-offs: to lower FRR (False Reject Rate, or rate of false negatives) you have to raise FAR (False Accept Rate, or rate of false positives). Iris and fingerprint recognition are mature technologies; they can deliver low false negatives with virtually no false positives. There are well-defined and effective ways of preventing spoofing. But yes, they are only a single component, and should be combined with password and/or phys
Re:Ok then... (Score:5, Insightful)
Iris and fingerprint recognition are mature technologies; they can deliver low false negatives with virtually no false positives.
Passwords deliver 0% false negatives and 0% false positives. If it rejects you, just type it again.
There are well-defined and effective ways of preventing spoofing.
Like what? A hash of my whole eyeball?
Anyway, nice job twisting my point. Let me repeat:
1. Not secret. Unique, but not secret. Which means, if someone gets the technology to spoof one, they can spoof all. What, fingerprints? They use them to catch criminals because we leave them all over the place.
2. Not replaceable. If you find out someone can spoof your iris, what do you do? Grow new ones?
Just because the technology isn't available yet, don't assume it never will be.
There is only one thing that biometrics add to security: noone has to tell the Big Boss he can't juse his initials as password anymore. Apparently it's worth it.
Re: (Score:2)
I'd like to change my biometric everything. (Score:2)
Once they have your password, you choose another one and that's it. I'd like to see you do that with your face
Hell, I would too, just for the heck of it...
Re:Ok then... (Score:4, Funny)
Maybe its time I got in touch with that bully I knew in kindergarten. He seemed to have a natural gift in that area.
He had two faces?
Re: (Score:2)
Worse than that, passwords are considered THE worst for security. But they are the cheapest and most easily implemented, which is why everybody uses them.
Compared to what, exactly? I can't stress enough the importance of being able to replace security keys at will.
Also, there is absolutely nothing more secure than a used-up one-time password. Kinda hard to do with iris scans, don't you think?
Re: (Score:2)
Now do you see how this could be a real problem? And yes, C-level's love biometric stuff because they don't have to remember passwords.
Re: (Score:2)
Instead of thinking about this in the sense of some random hacker trying to get into your computer, think about the more probable situation of your office. Do you have, or could you easily get a good face shot of the CEO of your organization?
A picture of the CEO? Like the picture of the CEO that's on just about any company's website?
Nearly impossible to get at is my guess.
Re: (Score:2)
Do you have, or could you easily get a good face shot of the CEO of your organization?
Of course. Its right there on page one of the newsletter.
Re: (Score:3, Funny)
And yes, C-level's love biometric stuff because they don't have to remember passwords.
They should just all get Ident-i-Eeze cards.
Re:Ok then... (Score:5, Interesting)
Re: (Score:2)
However it may not be a huge hurdle, it just means that an attacker would need to get two photos of you instead of one. I'd guess that the angles wouldn't even need to be perfect, as different angles would just approximate different distances from the computer.
What else... i guess identical lighting would be necessary...
Re: (Score:2)
You see kids, this is just another reason why you need *layered* security. Biometrics, PKI, keyfobs, enryption, uids/passwords, alone they all suck. When you start using them in combination, *then* you start putting up reasonable barriers to would be adversaries.
Re: (Score:2)
Re: (Score:2)
For example the BBC series "the face" has John Cleese showing very clearly the difference between machines trying to identify people by the best algorithms of the time (probably better than in the commercial products even now) and human beings doing the same thing. We have a situation where the best researchers in the world are still getting poor results since it isn't known yet how to
Ummm... (Score:4, Insightful)
Re:Ummm... (Score:4, Funny)
Heh, if you have physical access the game is over. "Lock your terminal" is merely a poor defense against bored pranksters (beating their head in if they touch your machine is the only effective deterrent).
Re: (Score:2)
Heh, if you have physical access the game is over. "Lock your terminal" is merely a poor defense against bored pranksters (beating their head in if they touch your machine is the only effective deterrent).
Lets say that the terminal only gives you a remote desktop on a secure remote system, and your credentials are required to authenticate.
Re: (Score:3, Insightful)
Re: (Score:2)
Lets say that the terminal only gives you a remote desktop on a secure remote system
For one thing, the cost of access to the secure remote system would then include $40[1] per month for mobile Internet access, which is $40 more than a system running on a laptop or other computer without a continuous Internet connection would require. Take this into account in your cost/benefit analysis. For another, the attacker could still install a keylogger on the terminal to capture your credentials.
[1] Price of T-Mobile's cheapest plan for a USB mobile broadband dongle. AT&T charges even more.
Re: (Score:2)
Heh, if you have physical access the game is over. "Lock your terminal" is merely a poor defense against bored pranksters (beating their head in if they touch your machine is the only effective deterrent).
Lets say that the terminal only gives you a remote desktop on a secure remote system, and your credentials are required to authenticate.
Let's say I steal your terminal and sell it.
Re: (Score:2, Interesting)
My iPhone locks itself after a minute and demands a four digit passcode.
It's not the perfect solution, I know, but I don't mind tapping a four digit key out on my keypad after a minute's inactivity on my Mac. Maybe 5. Maybe 10.
That's enough - once you've stolen my Mac, you need to be with it every ten minutes... forever.
Changing the password (Score:2)
I don't mind tapping a four digit key out on my keypad after a minute's inactivity on my Mac. Maybe 5. Maybe 10.
That's enough - once you've stolen my Mac, you need to be with it every ten minutes... forever.
Or the thief can just change the PIN to 1337 and have access whenever he wants.
Re: (Score:2)
Doesn't he have to know the original pin for this?
Re: (Score:2)
Doesn't he have to know the original pin for this?
Not if he steals the laptop while it is already logged in. And not if he just backs up the home folder and any already-mounted TrueCrypt volume to external USB storage, unplugs it, and then reformats.
... Wow. (Score:4, Interesting)
The researchers were able to easily bypass the biometric authentication system built into the laptops by using photos of an authorized user [...]
Tragically, sadly obvious. Not even a hack, really.
one small problem (Score:2, Interesting)
if it is not an inside job - how does the thief get his photograph of the "authorized user?"
when the sensor is a webcam - why not include motion or depth perception in the authentication process?
if the camera is sensitive to infrared why not confirm that the heat signature of a live body is present as well?
Last season in Burn Notice (Score:4, Interesting)
Even made a point of saying "facial recognition systems aren't all that secure. They can't tell the difference between a person and a photo of the person". Then he proceeded to break into the room by holding up a picture of someone that had access.
Re:Last season in Burn Notice (Score:4, Insightful)
Re: (Score:2, Informative)
Re: (Score:2)
I'm against facial recognition because... (Score:3, Insightful)
Gesture + facial recognition (Score:4, Interesting)
Wonder if, when you 'enrolled' your face in the recognition software, you held your hand(s) up in the image forming a symbol -- peace sign, one finger salute, whatever. Then someone would have to capture your image at the instant you authenticated.
It would be customizeable and and changeable, unlike your face, and hard to duplicate blindly.
Re: (Score:2)
Still pretty easy to spoof.
Re:Gesture + facial recognition (Score:5, Insightful)
...and carries the same level of security as speaking your password every time you type it.
Seriously, biometrics are a bad idea, unless also combined with other methods of authentication.
Re: (Score:2)
From what little I know of facial recognition software, it takes measurements of facial features and uses those as the "key". They almost certainly won't accept something that doesn't that doesn't resemble a face. I'll bet it never occurred to the developers that ripping out all those fancy algorithms would actually make the system somewhat more secure.
Stereo cameras and multiple pictures (Score:2)
Re: (Score:2)
for two cameras, just use two photos (taken with a stereo camera). Depth perception is already reliant on this, so adds nothing. But it seems unlikely laptop manufacturers would add a second camera just for this purpose. Unless they also do cool 3D video stuff. But if that's the case then you could just plonk a similar laptop (which has previously recorded a 3d video grab of the subject) in front of the stereo cameras. It's the same thing, just a little more complex
You expect us to be surprised? (Score:3, Interesting)
Of course they broke it. "Biometric Authentication" is an oxymoron. The correct phrase is "Biometric Identification". A face or a finger are a claim of identity that still needs authentication with some form of secure credential, e.g. a password.
No Id and no authentication is "public". Id but no authentication is "public, but stupid about it".
Re: (Score:2)
A face or a finger are a claim of identity that still needs authentication with some form of secure credential, e.g. a password.
Yup, it's Lenovo et al.'s mistake, for using face recognition for both identification and authentication, The two functions are different, and should remain separate. Via Schneier's Cryptogram, here [microsoft.com]'s a good article explaining why merging them is a bad idea
Mythbusters & fingerprint recognition (Score:3, Insightful)
Well, Mythbusters got past fingerprint recognition systems with a Xerox and a Sharpie (after getting the fingerprint off of a can or glass, IIRC). My comment at the time to the group I was watching it with was approximately "I hope their stocks drop hugely tomorrow".
Re: (Score:2, Informative)
Re: (Score:2)
"I still think that facial recognition and/or a fingerprint scanner is a great addition to a strong password, but it should never be used by itself to begin with."
Yeah, rather than the bad guys just beating your password out of you, now they get to cut off your fingers and your face too.
Re: (Score:2)
..or at least your eyeball (Demolition Man).
well sure (Score:3, Insightful)
So much for "biological signatures". (Score:2)
In a recent posting [slashdot.org] I pointed out how fingerprint and retinal scanners could be fooled.
An AC followed up claiming that "devices designed for actual security" also checked "biological signatures" to avoid being fooled by static images, fake fingerprints, and the like.
I responded that security vendors have a long history of claiming their stuff is testing for much more than it actually is, counting on this to deter attempts to actually break it. I expected that, as past behavior is a good predictor of future
Prior "art"? (Score:2)
I'm pretty sure we demonstrated this technique back in Space Quest III...
Oh come on, I'm not the only one who remembers that game!
Re: (Score:2)
place portrait on photocopier
press button
take copy
take portrait
replace portrait
Dance recognition (Score:2, Funny)
If you're in a coffee shop, then the best type of authentication is dance recognition. You place the laptop on a table, push the chair to one side and dance like you're selling nails. As most people are terrible dancers it should be a fairly unique identifier. Especially for Apple owners, who will have to dance like Leonard Cohen because they all wear polo neck sweaters.
A laser might help (Score:2)
If it can be defeated with a 2D picture, why not up the ante and ensure that the target is 3d by scanning it with a cheap laser? Sure this could be defeated too, by people fabricating mannequins. If this is within your threat model, then you could require the subject to speak a phrase, then scan the series of facial movements for recognition. The black hats would then have to build an android replicant, requiring the white hats to counter with.... um... typed passwords?
Re: (Score:3, Insightful)
> If it can be defeated with a 2D picture, why not up the ante and ensure that the target
> is 3d by scanning it with a cheap laser?
Because the whole point was to offer biometric identification without spending any money on hardware. The camera was already there.
I call biometrics "Toy security" (Score:2)
Re: (Score:2)
I have had the same password for over 15 years and never had any trouble because ... I don't tell it to anyone. The problem with passwords is when people do dumb things like share them with someone else, or worse, write them down.
Or when a server you used it on 12 years ago got its HDDs stolen/dumped w/o being wiped. Or if an unscrupulous sysadmin has modified ssh to store unencrypted username-password pairs (and you're not using keys). Changing every now and then makes sense, but you're completely correct about the "every 60 days, never any repeats, must use all 255 characters in the ASCII table, and be a minimum of 4096 characters". Security policy by committee is what that is.
facial CAPTCHA (Score:2)
We need facial recognition CAPTCHA's. Something like three physical tasks you need to perform to gain access, eg 'Please place your left index finger on your nose. Accepted. Now please poke out your tongue. Accepted.' etc.
But even that wouldn't be impossible to defeat.
Still... I wonder how a 'Now show us your boobs' instruction would go down :)
I really have a hard time (Score:2)
They blew it, big time. They should be held liable.
Re: (Score:2)
your password is short and not too hard?