{"guid":"import-16b81408b8ec72018e","title":"Hacking fingerprint recognition systems","subtitle":"","slug":"mrmcd101b_-_Hacking_fingerprint_recognition_systems","link":"https://mrmcd101b.metarheinmain.de/fahrplan/events/1471.en.html","description":"Today biometric systems are becoming mainstream. They can be·\r\nfound everywhere. In mobile phones, computers, entrance systems even in ATMs.\r\nBecause of the low costs, small sizes and the alleged maturity mostly\r\nfingerprint sensors are used. But contrary to the assurance of the\r\nmanufacturers they are still very easy to hack with techniques invented\r\nthree years ago (see\r\nhttp://www.ccc.de/biometrie/fingerabdruck_kopieren?language=en).\r\nThe capacitive sensors built into the new generation of Thinkpad\r\ncomputer from IBM / Lenovo were one of the first implementing countermeasures·\r\nagainst this type of dummies. But counter measures only lead to new types of·\r\ndummies!·\r\nUsing this fingerprint system as an Example I want to explain the different\r\ntechniques of hacking biometric systems, from the attack on the\r\ncommunication and the stored reference data to the direct hack of the sensor·\r\nitself. The talk will present tools and ways to extract communication data to\r\nenhance dummy materials and a step by step approach to the final dummy finger·\r\nthat will defeat the sensor.","original_language":"eng","persons":["starbug"],"tags":["mrmcd"],"view_count":0,"promoted":false,"date":"2007-01-01T01:00:00.000+01:00","release_date":"2009-09-28T02:00:00.000+02:00","updated_at":"2021-01-02T20:31:30.438+01:00","length":3305,"duration":3305,"thumb_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b/mrmcd101b - Hacking fingerprint recognition systems.jpg","poster_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b","timeline_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b","thumbnails_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd101b","frontend_link":"https://media.ccc.de/v/mrmcd101b_-_Hacking_fingerprint_recognition_systems","url":"https://api.media.ccc.de/public/events/import-16b81408b8ec72018e","conference_title":"MRMCD 101b","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd101b","related":[],"recordings":[{"size":71,"length":3305,"mime_type":"video/mp4","language":"eng","filename":"mrmcd101b - Hacking fingerprint recognition systems.mp4","state":"new","folder":"","high_quality":false,"width":320,"height":240,"updated_at":"2021-01-02T20:04:17.440+01:00","recording_url":"https://cdn.media.ccc.de/events/mrmcd/mrmcd101b/mrmcd101b - Hacking fingerprint recognition systems.mp4","url":"https://api.media.ccc.de/public/recordings/50164","event_url":"https://api.media.ccc.de/public/events/import-16b81408b8ec72018e","conference_url":"https://api.media.ccc.de/public/conferences/mrmcd101b"}]}