THAT FINGERPRINT SENSOR ON YOUR PHONE IS NOT AS SAFE AS YOU THINK.
SAN FRANCISCO — Fingerprint sensors have turned modern smartphones into miracles of convenience. A touch of a finger unlocks the phone — no password required. With services like Apple Pay or Android Pay, a fingerprint can buy a bag of groceries, a new laptop or even a $1 million vintage Aston Martin. And pressing a finger inside a banking app allows a user to pay bills or transfer thousands of dollars.
While such wizardry is convenient, it has also left a gaping security hole.
New findings published Monday by researchers at New York University and Michigan State University suggest that smartphones can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. In computer simulations, the researchers from the universities were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.
The researchers did not test their approach with real phones, and other security experts said the match rate would be significantly lower in real-life conditions. Still, the findings raise troubling questions about the effectiveness of fingerprint security on smartphones.
“It’s almost certainly not as worrisome as presented, but it’s almost certainly pretty darn bad,” said Andy Adler, a professor of systems and computer engineering at Carleton University in Canada, who studies biometric security systems. “If all I want to do is take your phone and use your Apple Pay to buy stuff, if I can get into 1 in 10 phones, that’s not bad odds.”
Full human fingerprints are difficult to falsify, but the finger scanners on phones are so small that they read only partial fingerprints. When a user sets up fingerprint security on an Apple iPhone or a phone that runs Google’s Android software, the phone typically takes eight to 10 images of a finger to make it easier to make a match. And many users record more than one finger — say, the thumb and forefinger of each hand.
Since a finger swipe has to match only one stored image to unlock the phone, the system is vulnerable to false matches.
“It’s as if you have 30 passwords and the attacker only has to match one,” said Nasir Memon, a professor of computer science and engineering at N.Y.U.’s Tandon School of Engineering, who is one of three authors of the study, which was published in IEEE Transactions on Information Forensics and Security. The other authors are Aditi Roy, a postdoctoral fellow at N.Y.U.’s Tandon School, and Arun Ross, a professor of computer science and engineering at Michigan State.
Dr. Memon said their findings indicated that if you could somehow create a magic glove with a MasterPrint on each finger, you could get into 40 to 50 percent of iPhones within the five tries allowed before the phone demands the numeric password, known as a personal identification number.
Apple said the chance of a false match in the iPhone’s fingerprint system was 1 in 50,000 with one fingerprint enrolled. Ryan James, a company spokesman, said Apple had tested various attacks when developing its Touch ID system, and also incorporated other security features to prevent false matches.
Google declined to comment.
The actual risk is difficult to quantify. Apple and Google keep many details of their fingerprint technology secret, and the dozens of companies that make Android phones can adapt Google’s standard design in ways that reduce the level of security.
Stephanie Schuckers, a professor at Clarkson University and director of the Center for Identification Technology Research, was cautious about the implications of the MasterPrint findings. She said the researchers used a midrange, commercially available software program that was designed to match full fingerprints, limiting the broader applicability of their findings.
“To really know what the impact would be on a cellphone, you’d have to try it on the cellphone,” she said. She noted that cellphone makers and others who use fingerprint security systems are studying anti-spoofing techniques to detect the presence of a real finger, such as looking for perspiration or examining patterns in deeper layers of skin. A new fingerprint sensor from Qualcomm, for example, uses ultrasound.
Phone makers have acknowledged that fingerprint sensors are not foolproof, but said that the ease of touching a finger to unlock a phone meant that more users actually turned on security features instead of leaving their phones unlocked — a common habit in the early days of smartphones.
Dr. Ross acknowledged the limitations of the work. “Most of the current smartphone vendors do not give us access to the fingerprint image,” he said.
For a thief or spy to turn master fingerprints into smartphone keys would require a lot of additional work. “In order to launch this attack, you still have to make fake fingers,” Dr. Ross said.
Still, the team’s fundamental finding that partial fingerprints are vulnerable to spoofing is significant, said Chris Boehnen, the manager of the federal government’s Odin program, which studies how to defeat biometric security attacks as part of the Intelligence Advanced Research Projects Activity.
“What’s concerning here is that you could find a random phone, and your barrier to attack is pretty low,” Dr. Boehnen said.
Phone makers could easily increase security by making it harder to match the partial fingerprint, he said, “but the average phone company is more worried about you being annoyed that you have to put your finger against the phone two or three times than they are with someone breaking into it.”
Adding a larger fingerprint sensor would also decrease the risk, Dr. Boehnen said. And some newer biometric security options, such as the iris scanner in Samsung’s new Galaxy S8, are harder to trick. (Face recognition, another security option available on some phones, is considered less secure than fingerprints.)
Phone users can also protect themselves by turning off fingerprint authentication for their most sensitive apps, such as mobile payments, Dr. Boehnen said.
Dr. Memon said that despite his research, he was still using fingerprint security on his iPhone.
“I’m not worried,” he said. “I think it’s still a very convenient way of unlocking a phone. But I’d rather see Apple make me enter the PIN if it’s idle for one hour.”
BY: VINDU GOEL,THE NEW YORK TIMES.
DISCLAIMER: “The views expressed in this article are the sole responsibility of the author and do not neccessarily reflect those of Ghana Media World. The contents of this article are of sole responsibility of the author(s). Ghana Media World will not be responsible or liable for any inaccurate or incorrect statements contained in this article.” © GHANAMEDIAWORLD.COM
HAVE A SAY. WHAT DO YOU THINK? DROP COMMENTS!
@ghanamediaworld on Twitter / lnstagram ghanamediaworld
Do you have a story for The Ghanameiaworld Online news team? Email us at firstname.lastname@example.org Or call us:
THE NEWS ITEMS ARE REAL AND WE ARE NOT FAKE MEDIA,WE ARE HERE FOR YOU BECAUSE OF TRUELY MEDIA. IF NOT BECAUSE OF YOU, WE CANNOT BE GHANA MEDIA WORLD. OR WHAT WE HAVE REACH TO BE NOW.WE PUBLISH WHAT IS TRUELY INSIDE THE MEDIA OF THE WORLD FROM JOURNALIST NEWS,MEDIA NEWS AND FROM THE PEOPLE WE GET THE REAL NEWS FROM AND TO GHANA MEDIA WORLD, WITHOUT HIDDEN THINGS FROM YOU AND FROM THE TRUTH THAT WE GET FROM MEDIA AND JOURNALIST.AND ALSO SOMEWHERE WE GET TO KNOWN.OUR MEDIA PAGE IS STILL NOT COMPLETED,THERE IS A LOTS TO BE DONE IN GHANA MEDIA WORLD PAGE.FOR THE MEAN TIME WE PUBLISHED NEWS,WE ADVERTISE FOR PEOPLE,ETC.LISTEN TO MANY RADIO STATIONS IN OUR PAGE BY CLICK.
READ MORE @ WWW.GHANAMEDIAWORLD.COM
CONTACT OF MEDIA AND ADVITISED IN OUR WEBPAGE ,IF YOU NEED PROFECTIONALS RADIO STATION LIVE STREAMING FOR BROADCASTING TOOLS PLUS WEBPAGE,DOMAIN,WE ARE NUMBER ONE PROFECTIONALS TO HELP YOU,FOR QUETIONS,DONATIONS,CONTACT OUR E-MAIL ADDRESS email@example.com
SHARE OUR PAGE AND LIKE US IN FACEBOOK,INSTAGRAM,WHATSAPP,PINTEREST,YOUTUBE,LINKEDIN.
WE ARE NUMBER ONE TRUELY MEDIA.