Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Android

Brute-Force Test Attack Bypasses Android Biometric Defense (techxplore.com) 35

schwit1 shares a report from TechXplore: Chinese researchers say they successfully bypassed fingerprint authentication safeguards on smartphones by staging a brute force attack. Researchers at Zhejiang University and Tencent Labs capitalized on vulnerabilities of modern smartphone fingerprint scanners to stage their break-in operation, which they named BrutePrint. Their findings are published on the arXiv preprint server.

A flaw in the Match-After-Lock feature, which is supposed to bar authentication activity once a device is in lockout mode, was overridden to allow a researcher to continue submitting an unlimited number of fingerprint samples. Inadequate protection of biometric data stored on the Serial Peripheral Interface of fingerprint sensors enables attackers to steal fingerprint images. Samples also can be easily obtained from academic datasets or from biometric data leaks.

And a feature designed to limit the number of unsuccessful fingerprint matching attempts -- Cancel-After-Match-Fail (CAMF) -- has a flaw that allowed researchers to inject a checksum error disabling CAMF protection. In addition, BrutePrint altered illicitly obtained fingerprint images to appear as though they were scanned by the targeted device. This step improved the chances that images would be deemed valid by fingerprint scanners. To launch a successful break-in, an attacker requires physical access to a targeted phone for several hours, a printed circuit board easily obtainable for $15, and access to fingerprint images.

This discussion has been archived. No new comments can be posted.

Brute-Force Test Attack Bypasses Android Biometric Defense

Comments Filter:
  • So much for "only a hash is stored".

    But even if really only a hash was stored: Obtaining a hash means you can try and, if not outright reverse the image, then at least collide the hash on your own time. And since biometric hashes are necessarily lossy, that means obtaining a colliding image ought to be doable as well. Might even be able to speed up the process with a latent partial fingerprint on the device.

    These guys report an equipment cost of $15. I'm sure law enforcement or any other snooping outfit w

    • by AmiMoJo ( 196126 ) on Wednesday May 24, 2023 @07:25AM (#63547551) Homepage Journal

      Only storing the hash is designed to prevent your fingerprints being stolen by software. This doesn't affect that, they need to first obtain your fingerprints to execute the attack, and the secret nonce that is part of the hash isn't being recovered.

      They also need to take the phone apart and connect to its internal SPI bus. iPhones are vulnerable as well, although they do at least enforce a limit on the number of failed attempts (although it's 3x higher than it is supposed to be).

      It affects certain phones that use a particular sensor. Hopefully it can be fixed with a firmware update, as some are current models and still supported.

  • by Errol backfiring ( 1280012 ) on Wednesday May 24, 2023 @05:46AM (#63547449) Journal
    Couldn't you use tape or something to get the fingerprint from the case of the mobile itself? You hold it in your hand, so any phone should have enough fingerprints on them to unlock it.
    • Yeah, that was going to be my question. If you have the phone, dust it for fingerprints.
    • Probably depends on how the hardware works, I know some of the face recognition cameras use IR to be sure they're looking at a living face rather than a photograph.
      • Re:Just curious (Score:4, Interesting)

        by Errol backfiring ( 1280012 ) on Wednesday May 24, 2023 @08:29AM (#63547683) Journal
        I remember one of the first fingerprint sensors, decades ago. A system administrator showed that you could log in as the previous user by holding your hand close to the sensor, because it was smart enough to check for body heat. Holding your hand close radiated enough heat for the sensor to activate and send the fingerprint that was still on it.
    • Yes, you can. As a matter of fact, there is a group in Germany who captured a photo of Angela Merkel's hand as she was waving at a public event, and were able to generate a spoof fingerprint from the photo (https://www.theregister.com/2014/12/29/german_minister_fingered_as_hackers_steal_her_thumbprint_from_a_photo/).
      The problem with having a fingerprint is then turning it into a usable spoof. In the early days of fingerprint sensors, it was easy; an image or an easily created Gumi bear (gummy bear) mold c

  • If I understand correctly, the "Cancel-After-Match-Fail (CAMF)" flaw that allowed researchers to inject a checksum error is a software bug the fix for which would render this attack a lot less practical.

    • by Shaitan ( 22585 )

      The core vulnerability isn't really fixable. Biometrics are a password that can't be changed. Police have them, former devices and employers have them... database leaks contain them. You can't have this lock rekeyed after you break up.

      • by AmiMoJo ( 196126 )

        That's not the core vulnerability. Biometrics wouldn't be a problem is they could not be faked. It's supposed to be your fingerprint that unlocks the device, not an image or recreation of your fingerprint.

        Decent fingerprint scanners do have some resistance to fakes, such as being able to scan through the epidermis to parts of your finger that are not reproducible from a latent fingerprint image.

        • by Shaitan ( 22585 )

          "Decent fingerprint scanners do have some resistance to fakes, such as being able to scan through the epidermis to parts of your finger that are not reproducible from a latent fingerprint image."

          First there are very few 'decent' fingerprint scanners in the wild. Second that just makes them an improved scanner for use in producing a more sophisticated fakes and checks features less reliably proven to be unique in the first place.

          Also these systems will always be vulnerable to side-channel attacks. Biometric

          • I'll agree with you that, sadly, there are few 'decent' fingerprint scanners in the wild. I will submit that Apple devices and HP Enterprise / Lenovo Enterprise laptops with fingerprint sensors have 'decent' fingerprint scanners, though, which makes them not rare.

            >>> that just makes them an improved scanner
            Well, that's your uninformed opinion. I like to think mine is just a bit better informed.

            I will agree that a biometric is not a perfect authentication device; it can be spoofed, it can't be chan

            • by Shaitan ( 22585 )

              "Well, that's your uninformed opinion. I like to think mine is just a bit better informed."

              We are all entitled to our uninformed opinions I suppose. :)

              "the remarkable people like yourself, who can remember dozens of complex passwords and have information that Mossad is interested in, aren't common"

              Complex passwords are far inferior to long ones but and that is what password managers are for but that is a side rant. I personally might be a higher priority target for many than most but don't knock the value o

      • Re: (Score:3, Insightful)

        by blitzd ( 613596 )
        I don't know about you, but I can change mine AT LEAST nine times. /s
    • But the fix cannot result in a phone being locked out by being shoved into a pocket.
  • Best guess: To force patches and updates that would introduce malware China has planted somewhere.
  • by RUs1729 ( 10049396 ) on Wednesday May 24, 2023 @08:15AM (#63547643)
    Biometrics are decent (not good - just decent) replacements/analogies for user names. As a replacement for passwords/passphrases (i.e. as authentication anchors) they suck to high heaven.
  • by FrankSchwab ( 675585 ) on Wednesday May 24, 2023 @08:38AM (#63547715) Journal

    Disclaimer: I worked on fingerprint sensors in the 00's, shipping a couple hundred million units to major Phone and Laptop manufacturers.

    Our top line sensors fully encrypted all communications between the sensor and the host, similar to what the Authentec sensor in Apple devices used. Note that the researchers had zero success against Apple devices. We sold tens of millions of these to the likes of HP and Lenovo. But the mobile world wanted cheaper, cheaper, cheaper and simpler, simpler, simpler - the mobile customers neither wanted to pay an extra dime for encryption, nor did they want to deal with the hassle of encryption. So we sold them hundreds of millions of sensors with no encryption, and eventually exited the business when we could no longer compete at the sub-$1 price points.

    What these researchers were attacking were the bottom-of-the-barrel sensors, selling for pennies, that the manufacturers demanded. The result isn't too surprising. It's mostly an attack on the architecture of the Android fingerprint stack, written by Google and common to all manufacturers - whoever thought that enforcing retry lockouts AFTER matching wasn't thinking very deeply. That's like accepting passwords, validating them, then deciding whether or not the user is locked out due to too many bad passwords in a row; there are way too many side channels attacks to even think that this is a good idea in the 2020's.

    • ohhh, maybe you know the answer to some finger-print reader questions I've had for awhile. Got a Kensington USB reader for my Desktop to login with my fingerprint. Works great the moment after I train it, then generally gets less reliable over a week or so, quicker if I've been doing any manual labor. I can of course re-add my fingers, but I'm curious what the difference is between it, and the sensor in my iPhone which is much more reliable over time? Is the iPhone revising it's stored version of my fingerp
      • by FrankSchwab ( 675585 ) on Wednesday May 24, 2023 @10:48AM (#63548075) Journal

        There's lots of magic involved in making a fingerprint sensor work, but the deepest, blackest magic is in the piece of software called the "Matcher" that compares the image from the sensor with the stored fingerprint template (the stored template is generally not an image, it's a processed description of the multiple fingerprint images taken during enrollment). I don't know what sensor is in the Kensington, or what matcher software was used, but primitive matchers had the kinds of issues that you're describing. They tried to store an image of your fingerprint, then match against that in succeeding days. That didn't work well, as you're noting, because fingerprints change from day to day - humidity can cause the skin to expand or contract, daily damage can cause images to change, etc. More sophisticated matchers work hard to extract information from the enrollment images that doesn't change over time - ours involved various neural nets and a process that, even after having it explained to me several times, I didn't fully grasp.
        Yes, it is possible to update stored templates over time, but it's very risky - there are various methods that an attacker could use to modify the template over time to make it easier and easier for them to log in. We looked into it, but never pulled the trigger on that.
        The iPhone has a sophisticated fingerprint sensor and matcher - it came from Authentec, who had been doing fingerprint sensors for a long time before being acquired. I have an iPhone 8 with their sensor, and it always matches (unless my finger is wet), despite not having re-enrolled in years. I doubt very much that it's updating the template over time, we didn't have to and had similar performance.
        So, short answer, the Kensington has a crappy Matcher, and there's not much you can do about it.

        • Very interesting, appreciate the insights. Any idea which sensors/brands have good sensors & matchers? I'm perfectly happy to pay a bit more for a nicer device if I knew which ones were legitimately better, just never been quite sure how to actually figure that out. I'm also a cynic and don't trust review sites or anyone trying to make a sale, of course the review site I just found lists them all as "reliable". As far as updating the image, I wondered that too. Could you effectively trick the sensor in
    • by tlhIngan ( 30335 ) <slashdot&worf,net> on Wednesday May 24, 2023 @10:35AM (#63548037)

      Our top line sensors fully encrypted all communications between the sensor and the host, similar to what the Authentec sensor in Apple devices used.

      The problem with encryption is you need to pair the sensors with the SoC. And the problem with that is the right to repair crowd screech that it's artificially locking down repairs of the device. After all, it means you can't just change the fingerprint sensor because now you need to re-pair the new sensor to establish a new encryption key.

      Oh, but why can't you just have the device pair on the screen?

      Well, then that just defeats the entire purpose of the encryption! You want to lock out man in the middle attacks, and replay attacks, and likely compromised sensor attacks (where the sensor is replaced with a fake one - either to capture fingerprints in cleartext, or to allow attacks like this where the sensor is basically being a bad actor.

      Any mechanism you think of to fix the issue is also one which a bad guy can use to try these attacks.

      It's one thing I'd like to see the right to repair groups propose - a way to allow people to repair things like this by replacing sensors/screens/etc with new ones, but being able to pair the new sensor in such a way that it cannot be used as a way to perform an attack. Because the problem is, they're not happy until you can replace anything you want to bring it to full functionality. So disabling security functions because you cannot trust the sensors used is a non-starter.

      • Pairing isn't really a problem.

        All of the secure sensors we sold were paired with the host. Some of them used public key processes to assure that the sensor would only work with a host from the particular OEM - not our choice, but they were writing the checks.

        Apple chose the path of pairing at manufacturing - so replacing the fingerprint sensor is not something you could do as a third-party repair. That was their choice.

        Pairing a new sensor can easily be done securely on the screen, but OEMs chose not to

  • by Gravis Zero ( 934156 ) on Wednesday May 24, 2023 @08:48AM (#63547757)

    I looked at the actual paper (PDF) [arxiv.org] and the big issue here is that the "failed fingerprint attempts lockout" is easily foiled by submitting an attempt containing a bad checksum. The bad checksum causes the failed attempts counter to be reinitialized to zero and thus submitting one after a few failed attempts will enable unlimited attempts.

    The lesser issue is that the fingerprint scanner data isn't signed which means anything can pretend to be your fingerprint scanner.

    The takeaway here is that your fingerprint scanner isn't going to stop a motivated individual or organization. However, that should be the assumption in the first place because you leave your fingerprints on everything you touch.

  • Shì de, n ho bào bó? W zhèl yu ygè zhung mn mzh de róngqì, w xyào chl diào.

One person's error is another person's data.

Working...