Monday, August 10, 14:47
Home inet 3D printing: Can it trick devices that open with fingerprints?

3D printing: Can it trick devices that open with fingerprints?

A question many researchers are trying to answer is whether 3D printing can fool devices using a fingerprint biometric authentication method. A few days ago, her researchers Cisco TalosPaul Rascagneres and Vitor Ventura have published the results of a detailed study of how sensors used in biometric fingerprint systems can be tricked, resulting in smartphones, tablets and other devices to allow access to others other than their owners.

3D printing-devices with fingerprints

As biometric data, such as fingerprints, face recognition and retinal scanning, are increasingly replacing traditional ones. passwords as an identity verification method, the researchers through this study tried to demonstrate the ways in which these systems Identity checks could be fooled, making them completely unreliable.

Our fingerprints are unique and are now used to lock everything - from computers to smartphones. While the early forms of fingerprint verification began to be bypassed TouchID Apple's first iPhone 5 in 2013, this technology not only now covers a wide range of devices, but has also become more advanced. However, Cisco Talos has found that it is possible to bypass the three main types of sensors (optical, ultrasonic and capacitive) used to verify fingerprints. In particular, optical sensors use light to scan and create an image of a finger, while capacitive sensors do exactly the same thing, but with electricity. Ultrasonic sensors use ultrasonic waves to bounce off a physical object, in this case, a finger, and create a more detailed and potentially safer 3D map. Researchers have found that about 80% of people have access to devices using fake fingerprints and bypassing any form of sensor at least once. However, this does not mean that bypassing today's biometric authentication standards is an easy task. Instead, the researchers described it as a difficult and tedious process.

In their study, the researchers used devices such as various models of smartphones, laptops, USB drives and smart locks, each of which was locked with its owner's fingerprints. After collecting these fingerprints, they printed their exact copies using 3D printing using a variety of materials, such as silicone glue and fabric glue. With the help of 3D printers, graphic design software and graphite powder to improve the details of fingerprints, the researchers conducted tests on smartphones, in which, as it turned out, there was no real advantage in using different forms of sensors. In addition, her devices were tested Samsung, Apple and her Huawei, which were eventually fooled by 3D printing. According to the researchers, the fingerprint test on mobile phones has not shown any progress, compared to when this method first appeared in 2013. When it comes to laptops, researchers have not been able to fool computers Microsoft Windows, unlike other laptop models such as MacBook Pros of Apple, who fooled them with a 95% success rate, using 3D printing. A similar test was performed on both types USB, USB Verbatim and Lexar USB, in none of which this method was successful, while a smart Aicase lock broke.

Therefore, the study concludes that while the sensors can be deceived, the time and tests required prove that there is no specific method by which all types of devices can be deceived. However, smartphones, laptops and smart locks have proven to be more vulnerable to the method of authentication with the help of 3D printing. Finally, Cisco Talos points out that for a regular user, fingerprint authentication has many advantages, as it offers enhanced security. However, if a user has been targeted by thieves or if their device contains sensitive and confidential information, then it would be best to rely more on strong passwords and two-factor authentication. (2FA).

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

Do hackers carry out their attacks in real time?

More generally, there is a perception that hackers are suddenly infiltrating systems and devices and carrying out attacks. However, the reality is different. The...

Facebook: How to hide old posts

Facebook has introduced a new tool called "Activity Management" that will allow you to delete old posts, helping you to improve ...

How to download and install the Play Store on laptops and PCs?

Nowadays, many people rely on their smartphones, as they can be used easily and quickly for ...

Portable air conditioner: It is worn on the back and as a jewel 😛

Portable air conditioner - Worn on the back and like jewelry: 40 degrees and we have melted. Those of you who are lucky on the beach, please stop ...

How to download Google Camera Port 7.4 / GCam 7.4 on Xiaomi devices?

Pixel devices have Google Camera (GCam) as their default camera application. And since the Pixel series is known for ...

How to type in multiple languages ​​simultaneously on Android

People in today's world are very much addicted to smartphones. They provide access to many applications that can be used mainly ...

LucidPix: Make your photos 3D with this app!

Give a 3D format to your photos, with the LucidPix application, which is available in various versions for both Android and iPhone ...

Private or anonymous browsing: Does it guarantee your privacy on the Internet?

The term "private" is relevant, especially when it comes to private or anonymous browsing on the Internet, a setting in your web browser ...

Businesses: 8 types of cyber attacks to watch out for

Nowadays, all businesses, small and large must be on alert, as they can ...

How to reverse image search via Google?

The term "image search" is familiar to those who use search engines. It means that you are looking for an image related to a text that ...