all InfoSec news
Brute-Forcing a Fingerprint Reader
Schneier on Security www.schneier.com
It’s neither hard nor expensive:
Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint authentication determines a match using a reference threshold. As a result, a successful fingerprint brute-force attack requires only that an inputted image provides an acceptable approximation of an image in the fingerprint database. BrutePrint manipulates the false acceptance rate (FAR) to increase the threshold so fewer approximate images are accepted.
BrutePrint acts as an adversary …
academic papers attack authentication brute brute-force brute-force attack cracking database fingerprint fingerprints hard password password authentication reader reference result smartphones what is