Researchers at Clarkson University fooled biometric systems with fake fingerprints made out of Play-Doh nine out of ten times, demonstrating a weakness of some computer security systems.
Researchers fooled biometric systems with fake fingerprints made out of Play-Doh nine out of ten times, demonstrating a weakness of some computer security systems.
Led by Stephanie Schuckers, an associate professor of electrical and computer engineering at Potsdam, N.Y.-based Clarkson University, the researchers tested 66 Play-Doh copies of real fingerprints of 11 different people. The fake fingerprints were verified as the real deal 90 percent of the time.
"As with any identification or security system, biometric devices are prone to 'spoofing’ or attacks designed to defeat them," said Schuckers in a statement.
Schuckers also tested cadaver fingers on fingerprint readers, and got the same results. In some of the tests, dismembered fingers passed 94 percent of the time.
Security relying on fingerprints can be beefed up, she said, by accounting for perspiration on real fingers. Schuckers and her team created an algorithm that detects the moisture pattern on live fingers; when this was added to the readers, spoofing success fell to less than 10 percent.
Schuckers’ research is funded by $3.1 million from the National Science Foundation (NSF), the Department of Homeland Security, and the Department of Defense.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.