FB pixel

Expert says biometric systems subject to spoofs

 

According to Biometrics Institute Technical Committee Chair Ted Dunstone, biometric systems are more susceptible to vulnerabilities or spoofs because hardware vendors cannot update their biometric systems immediately.

Unlike spoofs that are found in software systems, hardware is complicated due to its hands-on components.  In contrast, software firms such as Microsoft and Google can often immediately patch an issue through an online update.

Companies such as Google have reached out to the developer community by providing incentives to identify flaws that can be found in their software. Software developers who report bugs are asked not to disclose these deficiencies publicly until a patch is developed.  However, with regards to potential bugs found in biometric systems, Dunstone would rather not encourage vendors to provide incentives to find bugs since this would be counter-productive to the overall security of the systems.

Dunstone says: “It’s very important not to set up an incentive to get people to break these systems. You need to find a way that encourages people that have broken systems to provide that information, but it’s a dangerous path to go down [to provide incentives]”. He also added, “In order to break the systems, you can’t just be hacking around the edges; it requires a relative amount of sophistication and set-up to be able to do that.”

Dunstone also believes that there aren’t many people capable of finding such bugs due to the level of sophistication needed to diagnosis biometric systems. Despite this fact, Dunstone acknowledged that there are still be some individuals, with both expertise and good intentions that should report vulnerabilities found in biometrics systems. He also stressed such people should be protected from legal actions, referencing the case of Patrick Webster, a security researcher who was reported to the police by the same organization that he was trying to help.

“It is important to make sure that people that bring vulnerabilities to light are not unfairly prosecuted; there needs to be mechanisms whereby people can provide that information in a secure environment where they don’t feel that they need to go public with it,” said Dunstone.

Dunstone asserted that it is the responsibility of system users to find potential vulnerabilities that the systems may have. Greater collaboration is also required between users and vendors to develop a standard way of discovering vulnerabilities in both existing and as well as in new biometric systems, and thus develop a secure way of providing information among relevant organizations.

Should legal protections be put in place for users who report vulnerabilities in biometric systems?

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

AgeAware goes live, setting up faceoff between reusable age check systems

AgeAware, the cryptographic token-based age assurance system developed by the nonprofit euCONSENT ASBL, has gone live. The launch comes in…

 

Scottish Biometrics Commissioner launches strategic plan, 4 police reviews

A better public understanding of how police in Scotland use biometrics and a series of reviews to provide assurance that…

 

EU AI Act proposals could rewire GDPR, water down tech regulations

The European Commission is considering amending its landmark AI Act as Brussels faces overwhelming pressure from U.S. tech companies and…

 

Yubico adds Hypr, Nametag identity verification options to passkey service

Yubico has added support for digital identity verification from Hypr and Nametag to its YubiKey as a Service platform to…

 

Wallets for the win: digital payment model enters pantheon of everyday tech

After Commodores, IBMs and Macs; Segas and Nintendos; mp3s and streaming services; smartphones and tablets and apps; biometrics and everything…

 

a16z highlights importance of decentralized digital ID for crypto in US gov’t feedback

The American government should reform its regulations for financial institutions to allow them to use merging technologies, particularly those related…

Comments

2 Replies to “Expert says biometric systems subject to spoofs”

  1. The Nerdy Nurse wrote a great post caelld 18 patient identifiers hippa defines as off limits. Head over to her site and read what those 18 identifiers are and see if you are using any of them.

  2. wake up calls since the 70s, and we explained that, even in an age of beiimtroc access controls, passwords will remain relevant in case the user has to access his or her information under

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events