A question many researchers are trying to answer is whether 3D printing can fool devices using a fingerprint biometric authentication method. A few days ago, her researchers Cisco TalosPaul Rascagneres and Vitor Ventura have published the results of a detailed study of how sensors used in biometric fingerprint systems can be tricked, resulting in smartphones, tablets and other devices to allow access to others other than their owners.
As biometric data, such as fingerprints, face recognition and retinal scanning, are increasingly replacing traditional ones. passwords as an identity verification method, the researchers through this study tried to demonstrate the ways in which these systems Identity checks could be fooled, making them completely unreliable.
Our fingerprints are unique and are now used to lock everything - from computers to smartphones. While the early forms of fingerprint verification began to be bypassed TouchID Apple's first iPhone 5 in 2013, this technology not only now covers a wide range of devices, but has also become more advanced. However, Cisco Talos has found that it is possible to bypass the three main types of sensors (optical, ultrasonic and capacitive) used to verify fingerprints. In particular, optical sensors use light to scan and create an image of a finger, while capacitive sensors do exactly the same thing, but with electricity. Ultrasonic sensors use ultrasonic waves to bounce off a physical object, in this case, a finger, and create a more detailed and potentially safer 3D map. Researchers have found that about 80% of people have access to devices using fake fingerprints and bypassing any form of sensor at least once. However, this does not mean that bypassing today's biometric authentication standards is an easy task. Instead, the researchers described it as a difficult and tedious process.
In their study, the researchers used devices such as various models of smartphones, laptops, USB drives and smart locks, each of which was locked with its owner's fingerprints. After collecting these fingerprints, they printed their exact copies using 3D printing using a variety of materials, such as silicone glue and fabric glue. With the help of 3D printers, graphic design software and graphite powder to improve the details of fingerprints, the researchers conducted tests on smartphones, in which, as it turned out, there was no real advantage in using different forms of sensors. In addition, her devices were tested Samsung, Apple and her Huawei, which were eventually fooled by 3D printing. According to the researchers, the fingerprint test on mobile phones has not shown any progress, compared to when this method first appeared in 2013. When it comes to laptops, researchers have not been able to fool computers Microsoft Windows, unlike other laptop models such as MacBook Pros of Apple, who fooled them with a 95% success rate, using 3D printing. A similar test was performed on both types USB, USB Verbatim and Lexar USB, in none of which this method was successful, while a smart Aicase lock broke.
Therefore, the study concludes that while the sensors can be deceived, the time and tests required prove that there is no specific method by which all types of devices can be deceived. However, smartphones, laptops and smart locks have proven to be more vulnerable to the method of authentication with the help of 3D printing. Finally, Cisco Talos points out that for a regular user, fingerprint authentication has many advantages, as it offers enhanced security. However, if a user has been targeted by thieves or if their device contains sensitive and confidential information, then it would be best to rely more on strong passwords and two-factor authentication. (2FA).