Главная
Study mode:
on
1
Intro
2
Risks: Leaking Fingerprint Is A Disaster
3
System Attacks against Fingerprints?!
4
Authenticating
5
Confused Authorization Attack
6
FIDO Alliance's Specification
7
Fingerprint Image Format
8
Fingerprint Bitmap Recovery
9
Fingerprint Sensor Spying Attack
10
Fingerprint Settings
11
Fingerprint Backdoor
12
Key Takeaways
13
Suggestions to Mobile Vendors
Description:
Explore a critical Black Hat conference talk that delves into the security vulnerabilities of fingerprint authentication on mobile devices. Uncover the potential risks of fingerprint leakage, including confused authorization attacks, TrustZone design flaws, and pre-embedded fingerprint backdoors. Witness live demonstrations of hijacking mobile payments protected by fingerprints and collecting fingerprints from popular devices. Learn about the long-term consequences of compromised biometric data and gain valuable insights into securing fingerprint authentication systems. Discover key takeaways and receive expert suggestions for mobile vendors to enhance fingerprint security in this 39-minute presentation by Yulong Zhang and Tao Wei.

Fingerprints on Mobile Devices - Abusing and Leaking

Black Hat
Add to list
0:00 / 0:00