- The first approach relies on tricking the biometrics system with the aid of artificially created data whilst making use of the regular sensor technology of the system; a precondition for this approach being spy-work that gets hold of more or less easily obtainable biometric features such as an image of a face or a fingerprint. After developing the appropriate photograph(s) and/or creating the artificial fingerprint(s) required, these copies of features can then be used to attempt to obtain authentication. The reactivating of traces of fat on a fingerprint scanner- of so-called latent images - also belongs to this scenario.
- The second scenario also entails tricking the biometrics system with artificial data. In this case, however, by playing back to it reference data sets, collected, for instance, with the aid of a sniffer program listening on the USB port, the systems regular sensor system is bypassed. This procedure is commonly called a replay attack. For more on USB sniffers and hardware analyzers consult the Attacking Via the USB Port box.
- The third approach is made up of attacks that aim at the data base directly. In general this scenario requires that one be in possession of data base administrator rights and have permission to exchange sets of data used as reference sets for recognition purposes. In the event that these data sets have no separate protection of their own the assailant has the opportunity of forging user data with a view to reactivating these at a later date in accordance with his or her designs. In the sensitive area of financial transactions this could turn out to be a ticking time bomb. Vide the hypothetical case of a former bank employee who years after leaving his firm decides to bring back to life the at one time surreptitiously created data set Mr. Millers eleventh finger with the intention of generously taking care of his retirement needs.
Body Check: Biometrics Defeated - Page 3
Application Modernization: What Is It and How to Get Started