A group of researchers from China and the US has introduced an intriguing new method for compromising biometric security systems. Their study, titled “PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound,” presents a novel side-channel attack aimed at the sophisticated Automatic Fingerprint Identification System (AFIS).
This attack exploits the sound produced by a user’s finger swiping across a touchscreen to extract fingerprint pattern details. Through testing, the researchers claim success rates of attacking “up to 27.9% of partial fingerprints and 9.3% of complete fingerprints within five attempts at the highest security FAR [False Acceptance Rate] setting of 0.01%.” This research marks the first instance of utilizing swiping sounds to deduce fingerprint information.
Fingerprint biometric security measures are prevalent and widely trusted, with projections suggesting the fingerprint authentication market could reach nearly $100 billion by 2032. However, with growing awareness of potential fingerprint theft, individuals and organizations are becoming more cautious about exposing their fingerprints, even in photographs.
In the absence of direct access to fingerprints or detailed finger images, attackers have found a new avenue for obtaining fingerprint data to bolster dictionary attacks like MasterPrint and DeepMasterPrint. The PrintListener study reveals that “fin
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: