LASCON 2017 has ended
View analytic
Friday, October 27 • 3:00pm - 4:00pm
Attack Vectors in Biometric Recognition Systems

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Attack Vectors in Biometric Recognition Systems: Mobile Authentication Use Case, Blockchain, and More.

Biometrics can be used to recognize individuals based on biological or behavioral characteristics. The subversion of biometric recognition systems by determined adversaries played out in headlines for Touch ID, Samsung Galaxy S8 face, and Samsung Galaxy S8 iris. It is only a matter of time until Face ID is spoofed.

  • What does it mean to subvert a biometric recognition system?
  • Is it possible to reverse-engineer a biometric template?
  • Is it possible to deceive machine learning in a biometrics recognition system?
  • What is anti-spoofing, otherwise known as Presentation Attack Detection (PAD)? 
  • Why is it so difficult for a biometric recognition system to tell the difference between you and an imposter?

Topics include:
 •Vulnerabilities •Attack Diagram •Spoofing •Presentation Attack Detection (PAD) •Mobile Device Vulnerabilities •TABULA RASA, ISO, NIST •Template Security and Evolution • Biometrics and Blockchain •The Future


avatar for Clare Nelson

Clare Nelson

CEO, Founder, ClearMark Consulting
Clare lives at the nexus of security, privacy, and identity. Her middle name is MFA, and she loves all things identity. She forges identity solution roadmaps and tracks emerging technologies, especially in light of GDPR and PSD2. She recently evaluated 200+ MFA vendors, resulting... Read More →

Friday October 27, 2017 3:00pm - 4:00pm
Security Innovation Room

Attendees (8)