Security exaggerations damage the industry’s reputation. They need to stop, says FaceTec.
Recently in news that made it around the world, the latest flagship smartphone from Samsung was reported to be spoofed – again. As every hardware-based face and fingerprint biometric has been spoofed shortly after new phones were introduced, each highly visible incident casts further doubt on the efficacy of mobile consumer biometrics. 3D face authentication specialist FaceTec is saying, enough is enough!
Since the 2013 launch of the iPhone 5S and Apple’s Touch ID fingerprint sensor, hackers and security researchers have honored a new tradition: spoofing the latest consumer biometric hardware. Biometrics systems that match the user to their own fingerprint, face, voice, and even palmprints, have all been circumvented with easy-to-imitate presentation attacks. Several days ago, the FIDO-certified ultrasonic in-display fingerprint sensor in Samsung’s Galaxy S10 handset was spoofed with a fake fingerprint. It took 13 minutes to take a photo of a fingerprint on a wine glass and make a 3D-printed finger, allowing unlimited device access.
In another recent spoof example in China, a man’s bank account was hacked and his savings stolen while he was sleeping because his phone was only locked with unsecure 2D on-device face recognition. His roommates unlocked his phone by pointing the camera at his face and even with his eyes closed it gave them access to his WeChat where there they transferred his money to their accounts.
After launching a new white paper demystifying biometric liveness detection, FaceTec is now calling for the biometrics industry itself to consider these consumer device presentation attacks a serious threat to the public perception of authentication technologies. Mainstream articles featuring these spoofs expose exaggerated security claims and, unfortunately, get a lot more readers than when a new biometric authenticator passes the iBeta/NIST PAD tests for the very first time.
“Every time a high-profile biometric presentation attack makes mainstream headlines it hurts our industry,” said John Wojewidka, FaceTec’s International Marketing Director, when FindBiometrics reached out for comment. “There is a material difference between a spoof-able smartphone fingerprint sensor and a real authentication solution with certified liveness detection. But when the average consumer, customer, and even person within the biometrics industry, hears that big companies can’t create secure biometrics, they assume smaller companies can’t either. The negative press hurts the public’s view of biometrics. It’s a serious problem that can only be addressed with third-party certifications based on rigorous, sanctioned testing. Given the increasing need for universal digital identity services, our industry needs to stop letting manufacturers pretend sensors without liveness detection provide security, and they certainly shouldn’t be given security certifications to glorified convenience features.”
On Imgur, according to the security researcher who goes by the handle “darkshark,” the ultrasonic sensor was expected to detect liveness by sensing blood flow, but seems not to be the case. Another possible explanation for the spoof is that after the S10 began shipping, a late February 2019 S10 software update addressed, among other things, user complaints about difficulties using the fingerprint sensor which might have affected the performance.
In an article posted on LinkedIn, FaceTec VP Steve Cook explained the spoof in detail, what liveness detection could have done to prevent it, and why it is the industry’s responsibility to take on this problem. Calling for greater accountability from solutions providers, he said it’s not enough to take a vendor’s word regarding the performance of a security biometric.
“Many have claimed liveness detection, but cannot back it up,” wrote Cook. “This is a serious issue. As we move quickly to embracing digital identities, sanctioned third-party certification against spoof attacks has become a necessity to ensure that the security a vendor promises can be reliably delivered.”
Asked for further comment, Cook elaborated, “That this spoof came only weeks after the Galaxy S10’s FIDO Certification has undercut the trust of a standard that we’d hoped could engender trust in consumer-facing biometrics. Once that mainstream trust is gone, I don’t know how you get it back.”
FaceTec’s response to the Galaxy S10 spoofing is emblematic of the company’s recent outreach initiatives intended to educate organizations and end users alike, and to advocate for rigorous, transparent third-party testing of biometric solutions. After ZoOm 3D Face Authentication software was the first (and still only face biometric) to pass the iBeta Level 1 Presentation Attack Detection Certification test in August 2018, the experience led them to the vocal promotion of third-party testing.
“The iBeta PAD tests are extremely challenging, but vendors owe it to our customers and their users to get certified, and if a product cannot achieve at least Level 2 PAD Certification it should not be sold,” said CEO of FaceTec, Kevin Alan Tussy. “At FaceTec, testing is a part of our culture and the result is better security, so it’s frustrating to watch these hyped sensors that are really only designed to unlock phones cast doubt on the security capabilities of all biometrics. Unlike most biometric vendors, we never make claims about security or Liveness Detection without the 3rd-party testing to back them up.”
In the months after the first certification, FaceTec entered into high profile liveness detection-focused partnerships with digital identity companies including Jumio and Yoti, while publishing two educational white papers on the importance of biometric standards testing and liveness detection.
In early 2019, FaceTec passed iBeta’s Level 2 Presentation Attack Detection Certification with a 100 percent spoof-proof score, as it did in Level 1. Learn more about what’s involved by reading our recent interview with Rich Lobovsky, the company’s SVP Business Development.
(Originally posted on FindBiometrics)