FB pixel

Android biometric safeguards fail to withstand brute-force attack

Android biometric safeguards fail to withstand brute-force attack
 

A team of Chinese scientists has bullied its way past fingerprint authentication protections on smartphones, exposing significant vulnerabilities, reports TechXplore.

The operation, conducted by researchers at Zhejiang University and Tencent Labs, was codenamed “Bruteprint: Expose Smartphone Fingerprint Authentication to Brute-force attack.” The attack exposed a weakness in the phones’ lockout features (Match After Lock, or MAL), gained the team easy access to biometric fingerprint data stored on the devices or acquired through online databases, and circumvented Cancel-After-Match-Fail (CAMF), a feature designed to limit the number of unsuccessful fingerprint matches.

Of ten tested phones, models from Android and Huawei were found to be vulnerable, whereas Apple’s iOS devices were able to withstand the brute-force attack. For vulnerable devices, says a report detailing the attack, “the shortest time to unlock the smartphone without prior knowledge about the victim is estimated at 40 minutes.”

The report says that the more familiar presentation attack, which “impersonates a target victim by presenting artefacts (e.g. silica gel fingers) to the fingerprint sensor,” has “long been identified as a severe threat to the security of fingerprint authentication systems.” Manufacturers rely on tools such as liveness detection and attempt limits to combat presentation attacks. But, with attacks like BrutePrint, there are new risks to consider when assessing fingerprint authentication on smartphones.

Global biometric data marketplaces, such as the recently shut down Genesis market, provide low-barrier access to millions of credentials mined from data breaches. Moreover, the Chinese team discovered “insufficient protection of fingerprint data on the Serial Peripheral Interface (SPI) of fingerprint sensors,” which enabled “a hardware approach to man-in-the-middle (MITM) attacks for fingerprint image hijacking.”

This is not the first time that Tencent Labs has taken a jab at smartphone fingerprint scanners. At a conference in 2019, a Tencent team claimed it could easily hack its way into almost any Android or iOS device in 20 minutes, through a presentation attack using a 3D-printed finger based on photographs. The fake finger worked on devices with capacitive, optical and ultrasonic sensors.

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Do biometrics hold the key to prison release?

By Professor Fraser Sampson, former UK Biometrics & Surveillance Camera Commissioner In the criminal justice setting there are two questions in…

 

New digital identity verification market report forecasts dramatic change and growth

The latest report from Biometric Update and Goode Intelligence, the 2025 Digital Identity Verification Market Report & Buyers Guide, projects…

 

Live facial recognition vans spread across seven additional UK cities

UK police authorities are expanding their live facial recognition (LFR) surveillance program, which uses cameras on top of vans to…

 

Biometrics ease airport and online journeys, national digital ID expansion

Biometrics advances are culminating in new kinds of experiences for crossing international borders and getting through online age gates in…

 

Agentic AI working groups ask what happens when we ‘give identity the power to act’

The pitch behind agentic AI is that large language models and algorithms can be harnessed to deploy bots on behalf…

 

Nothin’ like a G-Knot: finger vein crypto wallet mixes hard science with soft lines

Let’s be frank: most biometric security hardware is not especially handsome. Facial scanners and fingerprint readers tend to skew toward…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events