The problem with biometrics

SMART Access & Identity 2023 Editor's Choice, Access Control & Identity Management, Integrated Solutions

People who are not very knowledgeable about digital authentication often think biometrics are the answer to all our authentication problems. Hint: They are not. Many people think the Holy Grail of authentication is facial recognition or maybe even DNA analysis, “When the technology gets here!” It will not.

Biometrics (e.g., fingerprint, facial, iris, retina, veins, geometry, voice, keystrokes, cursor movements, etc.) can be a good form of authentication, but you have to pick good implementations and there are valid concerns no matter what biometric option you may choose.

Biometric challenges

Here are some of the common issues with biometric authentication:

• Accuracy.

• Security/hacking.

• What to do if your biometric attribute is stolen

• Shared systems can promote disease transmission.

• Privacy issues, government intrusion, etc.

• Bias.

Accuracy

Most biometric vendors tout how incredibly accurate their biometric solution is or can be. In most cases, their quoted accuracy figures are overstated. What the vendor is really stating is some hypothetical example of how uniquely different the involved biometric attribute is (e.g., “Your fingerprint is unique in the world!”) or what the maximum capability of the underlying hardware is (e.g., “It only has one false-negative error per 10 billion fingerprint submissions!”).

None of that matters. The only accuracy fact that matters is how accurate the biometric solution is in practice in real-world conditions as deployed. It turns out that most real-world deployments are a lot more inaccurate than the advertising.

The National Institutes of Standards and Technology (NIST) has been reviewing the accuracy of different biometric solutions (mostly fingerprint and facial) for years. Any biometric vendor or algorithm creator can submit their algorithm for review.

NIST accuracy goals depend on the review and scenario being tested, but NIST is looking for an accuracy goal around 1:100 000, meaning one error per 100 000 tests. So far, none of the submitted candidates came anywhere close. The best solutions have an error rate of 1,9%, translating to almost two mistakes for every 100 tests. That is very different from 1:100 000 and certainly nowhere close to the figures touted by most vendors.

I have been involved in many biometric deployments at scale and we see far higher rates of errors (false-positives or false-negatives) than what NIST is seeing in their best-case lab condition testing. I routinely see errors at 1:500 or lower. Biometrics in the real world is a hard nut to crack.

The bottom line is that most biometric solutions are not anywhere as accurate as the vendor claims. With that said, many biometric solutions are far more accurate than their competitors are. There are solutions that rank at the top of their class and a bunch that rank at the bottom. If you are buying a biometric solution, try before you buy, and make sure you are getting the accuracy you thought you were getting. Request to talk to two or three of the vendors largest existing customers and ask them about the accuracy rates and if they have any problems using the product in the real world.

Security/hacking

Anything can be hacked. Any biometric solution can be hacked. Avoid any biometric vendor telling you different. Some biometric solutions are more resilient than others are. The tough part is telling the difference. Here is what I look for when looking to see if a particular biometric solution is more secure than its competitors are:

• Are the biometric solution developers trained in secure development lifecycle (SDL) programming?

• Does the biometric vendor do in-house code reviews and penetration testing?

• Does the biometric vendor hire external penetration testers and participate in bug bounties?

• Is the solution resistant to man-in-the-middle attacks?

• Does the solution store the biometric attributes of its users in their true image form or transform the captured biometric data into something else that will be less useful to hackers if stolen?

• Is the solution single factor or multi-factor authentication (MFA)? MFA is stronger.

• Does the solution have above average accuracy compared to its peers?

If you have the ability to choose your biometric solution, choose a solution that is more resilient to attacks.

What to do if a biometric attribute is stolen

One of the most challenging problems is what to do if your biometric attribute is stolen. For example, all ten of my fingerprints were stolen, along with 5,6 million other people, in the infamous June 2015 OPM data breach (www.securitysa.com/*kb1). For the rest of my life, I know that my fingerprints are out there in the possession of attackers. How can any system that relies on my fingerprints truly know that it is I submitting them?

Well, for one, it is better if biometric attributes are paired with a knowledge-based secret like a password or a PIN. An attacker with my fingerprints would also have to know my knowledge-based secret in order to access the system. The attacker might be able to obtain that knowledge-based secret as well, but at least it is harder to accomplish.

I like biometric systems that do not store my biometric attributes in ‘plaintext’ form, meaning I do not like any biometric system that takes my fingerprints (or face, retina, iris, etc.) and stores them as the real, complete image in their database. I want biometric systems that read my biometric attributes and then transform them into something the biometric system can store and use, but if stolen, mean nothing to the thief. (See box: Protecting MFA shared secrets.)

Privacy issues, government intrusion, etc.

Many nations and businesses now store billions of fingerprints and faces. It may be to conduct legitimate law enforcement scenarios, but many privacy advocates wonder if any single entity having billions of people’s biometric attributes can lead to illegal abuse. Only time will tell, but this is certainly a worry for a non-minor percentage of our population.

Bias

Lastly, many biometric (really, any authentication solution) can have technical bias. This is not the same as a personal bias. This is a bias caused by the technology. For example, many studies have shown that biometric facial scanners have a harder time discerning people with different skin types due to how light reflects off that skin and the ability to recognise features and geometry.

Biases can develop because of socio-economic issues. For instance, people without cell phones cannot use any biometric solution requiring a cell phone to work. You may think that everyone in the world has a cell phone, but about 25% of people around the world have no cell phone and many people share cell phones with other people (complicating authentication). Many people may not have a smartphone capable of using a biometric app.

Some people are born without fingerprints (it is called Adermatoglyphia), some without voices or eyes. Face tattoos, glasses, masks and hair can complicate facial recognition scans. Some labour-intensive jobs cause more ‘micro-abrasions’, which can cause problems with fingerprint scanners, and so on.

In closing

Biometrics are a growing part of the digital authentication world. There are good biometric solutions and bad biometric solutions. Try to pick the more secure and more accurate solutions. Even then, no biometric solution is unhackable or perfect. The best any defender considering a biometric solution can do is to be aware of the good and bad of biometric solutions and pick the best one they can.

This is an edited version of an article by Roger Grimes, used with permission, first published in November 2022 at https://www.linkedin.com/pulse/problem-biometrics-roger-grimes (short URL: www.securitysa.com/*kb2).


A response from Dahua Technology

Following the article from Roger Grimes, Smart Access & Identity asked Dahua for its perspective on the points raised.

Where biometrics succeed

For the average person with a smartphone, it is a given that their private data is stored on the phone and this creates a risk. This is where biometric identification succeeds in ensuring their data is safely locked away without being compromised. When this technology is used in residential estates, business offices and other day-to-day technology, it still is an excellent solution for conventional uses.

It’s more secure than passwords and other login systems and it is more convenient because there is no room for error in terms of forgetting a password or PIN, or losing an access card. With biometric authentication your standard sign-in time, at your residential gate or office door is drastically reduced versus keying in a password or PIN. Biological traits are stable and will not drastically change over a short period of time.

Where it falters

In terms of a smartphone having a fingerprint access to unlock it, someone sleeping soundly could be placed in a position where their print is used to unlock their phone without them waking up. In this case it does serve as an illustration of how biometric identification is far from foolproof. Had the phone been secured with a password or PIN, another person would likely not have been able to access the smartphone.

Where it fails

As much as it would be nice to believe that biometrics is the solution to all access problems, biometrics are not hackproof. There have already been instances of hackers beating biometric authentication measures, for example, a hacker who used high-resolution photos of the other person’s finger in order to outsmart fingerprint authentication technology.

Even as security measures get smarter, hackers don’t tend to give up. They become more resilient, and their advanced strategies can target high-profile employees of high-profile organisations.

Should a person be placed in a situation where their biometric information has been compromised, it can’t be changed, edited or reformatted as a password can be. These traits are a permanent part of a person, for better or – in this case – for worse.

Most frighteningly, there is a stark difference between a security measure where biometric information is stored solely on a user’s device and a security measure where a central database stores biometric data. As more organisations get into the biometric identification security game, there will be an ever-increasing number of these databases at risk of being breached.

As mentioned above, once a hacker steals biometric information, it cannot be changed. In a future where biometric information will probably verify bank accounts and home security systems, and any number of things in our smart world, this could lead to a very unsecure future.

For more information contact Dahua Technology South Africa, +27 10 593 3242, [email protected], www.dahuasecurity.com/sa


Protecting MFA shared secrets

Multi-factor authentication (MFA) usually has shared secrets. With one-time-password (OTP) MFA solutions, the shared secret is usually a randomly generated ‘seed value’ that is stored in both the authentication database and on the OTP solution (hardware or software) being used. If an attacker can gain access to the stored seed values and other identifying information associated with the OTP solution, the attacker can generate additional unauthorised instances and use them as if they were the legitimate user.

This routinely happens in real life. For example, Google Authenticator shared secrets are routinely compromised by hackers and used to hack users who rely on Google Authenticator to protect their accounts. Google Authenticator secrets are often stored on Linux servers on the network or service the user is accessing, or they can be compromised on the user’s side.

The QR code is just a barcode-like representation of the shared seed value used to initiate the new Google Authenticator instance. Because it never expires, any attacker looking for or coming across one can use it against the victim. People who get the Google Authenticator QR codes via email often keep them forever in email, take pictures of them or never permanently delete them after use, for fear that they may need to reuse to reinstall their particular Google Authenticator instance if something happens to the current install.

Biometric authentication requires shared secrets, too. If an attacker compromises a biometric database, they are not usually stealing a user’s entire scanned fingerprints, face, retina vein images or whatever. What they are usually getting instead, is whatever interpretative representation of that scanned biometric attribute. Still, once stolen, it can be enough to then use it to make additional unauthorised biometric copies that an attacker can use to try to login as the user. Therefore, like a password hash, a biometric attribute ‘hash’ is usually what is stored and does give some basic protection against an attacker immediately compromising the user’s entire image of the biometric attribute. Yes, some biometric solutions, sadly, do store the entire scanned images of the biometric attribute, making the hacker’s job far easier.

No matter what the type of authentication, MFA or not, biometric or not, shared authentication secrets need to be protected.

This is a short extract from https://www.linkedin.com/pulse/protecting-mfa-shared-secrets-roger-grimes (short URL: www.securitysa.com/*kb3). Far more information is available in the article.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Cyber top business risk as climate change hits record high
Editor's Choice
Globally, companies identify cyberattacks, particularly data breaches, as their primary business concern for the coming year, with business interruption ranked second. In Africa and the Middle East, cyber incidents, shifts in legislation and regulation, and macroeconomic developments are the three foremost business risks.

Read more...
As technology converges, so does cybercrime
Editor's Choice
Cybercrime is no longer siloed: it involves complex collaborations and coordination between different malicious entities, including state actors, organised crime and even drug and human trafficking networks.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...