+ All Categories
Home > Technology > Cyber Vulnerabilities of Biometrics - OWASP 2015

Cyber Vulnerabilities of Biometrics - OWASP 2015

Date post: 15-Jul-2015
Category:
Upload: bojan-simic
View: 85 times
Download: 1 times
Share this document with a friend
13
Cyber Vulnerabilities of Biometrics Bojan Simic CTO @ Hypr Corp. @bojansimic hypr.com
Transcript
Page 1: Cyber Vulnerabilities of Biometrics - OWASP 2015

Cyber Vulnerabilities of

BiometricsBojan Simic

CTO @ Hypr Corp.

@bojansimic

hypr.com

Page 2: Cyber Vulnerabilities of Biometrics - OWASP 2015

What’s this talk about?

Page 3: Cyber Vulnerabilities of Biometrics - OWASP 2015

Current methods of proving

Am I who I say I am?

have failed miserably.

Page 4: Cyber Vulnerabilities of Biometrics - OWASP 2015

Our Authentication Failures

1. 123456

2. Password

3. 12345

4. 12345678

5. Qwerty

6. 123456789

7. 1234

8. baseball

9. dragon

10. football

11. 1234567

12. monkey

13. letmein

14. abc123

15. 111111

Top 15 Passwords of 2014

“2FA Systems Used by Banks Bypassed

with Malware, Rogue Mobile Apps”

Page 5: Cyber Vulnerabilities of Biometrics - OWASP 2015

Biometrics to the Rescue

Page 6: Cyber Vulnerabilities of Biometrics - OWASP 2015

Not so fast...

• Man in the Middle Attacks (MITM)

• Malware

• Biometric Storage (Digital Lockers)

• BYOD/Internet of Things

Page 7: Cyber Vulnerabilities of Biometrics - OWASP 2015

Biometrics the Wrong Way – Example 1

Malware Bypasses Client Side Verification

Page 8: Cyber Vulnerabilities of Biometrics - OWASP 2015

Biometrics the Wrong Way – Part 2

Man in the Middle Attacks – Biometric Storage

Page 9: Cyber Vulnerabilities of Biometrics - OWASP 2015

Do’s and Dont’s of Biometric Security

Do encrypt everything

Do device tracking

Do behavioral analysis

Do require 3-factor

security

Don’t do Client Side Verification

Don’t store biometric data in a

centralized repository

Don’t rely on passwords

Don’t do verification of template

data remotely

Do

Don’t

Page 10: Cyber Vulnerabilities of Biometrics - OWASP 2015

Free tools for your consideration

Fast Identity Online (FIDO) alliance

Read it

Learn it

Love it

Open Web Application Security Project (OWASP)

Read the top 10 – Especially authentication

Join and participate

Dozens of free tools and documentation

Join pilot programs for new biometric tech

Page 11: Cyber Vulnerabilities of Biometrics - OWASP 2015

FIDO Spec Biometric Registration Process

Page 12: Cyber Vulnerabilities of Biometrics - OWASP 2015

FIDO Spec Biometric Authentication Process

Page 13: Cyber Vulnerabilities of Biometrics - OWASP 2015

Thank You! Email - [email protected]

Twitter - @bojansimic

https://hypr.com


Recommended