Hacking fingerprint scanners. Or: why Microsoft Fingerprint Reader is not a security feature
|
|
|
- Lydia Lucas
- 10 years ago
- Views:
Transcription
1 Hacking fingerprint scanners Or: why Microsoft Fingerprint Reader is not a security feature
2 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 1
3 Biometric authentication systems Large number of components and modules many vulnerable communication channels These communications channels are usually secured Physical closeness (& tamperproof hardware) Encrypting the communication channel Data collection Raw data Signal processing Feature vector Matching Template Feature storage Score Application Yes/No Decision 2
4 Exploit targets (1) Unencrypted communication channels (sniffing) Person, if the biometrics is easily extractable (social engineering, rubber-hose) Decision module (reverse engineering) Data collection Raw data Signal processing Feature vector Matching Template Feature storage Application Yes/No Decision Score 3
5 Exploit targets (2) Usually the lack of physical protection make the raw data (if unencrypted) the most promising target of the communication channels Likewise the data collection module (i.e. fingerprint scanner) is usually more easily accessible than other modules The channel between the data collection module and the signal processing (such as device drivers) should be well protected The focus of this presentation is on cryptographic protection (or lack thereof) Data collection Raw data 4
6 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 5
7 Fingerprint scanning example protocol A Scan ready Signal processing B M=D Private,B (E Public,A (RAND)) K=GenKey(RAND) RAND=D Private,A (E Public,B (M)) K=GenKey(RAND) E Public,B (RAND+1) E K (FP-scan) Transmission of the scanned image Check, if D Private,B (E Public,B (RAND+1))-1=RAND 6
8 Properties of the example protocol Anyone not knowing the private key of A cannot open the random number. Replaying the encrypted random number will not help the attacker, since the operation is done on the original number replayprevention (1) and authentication of A (2) Anyone not knowing the private key of B may generate some nonce that will end the protocol, but A will generate a different session key from B a party simulating B cannot decrypt the raw data (3) 7
9 Protecting the raw data In order to protect the raw data, two things are needed: A decent cryptographic algorithm A good cryptographic protocol 8
10 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 9
11 Microsoft Fingerprint Reader A USB-fingerprint scanner for consumer market Price around 40 Can be used to log in to Windows (not domains) and in to certain types of web-sites (providing they have standard GUI-controls used for the password) The device can be used as a fingerprint scanner for other applications as well, if 3 rd -party software is used Very little public technical information available 10
12 MSFR as an access control device? 11
13 MSFR security features Not recommended to be used as a guardian for sensitive information Why? Microsoft is not saying (publicly anyway) Bugtraq / SecurityFocus, etc: no sources The few sources (i.e. Globetechnology [1]) tend to think that the anti-forgery and encryption features are ok [1]: Misconception from a different device (APC) 12
14 Playing field Microsoft: - Casing ri Griaule: - SDK Signaalinkäsittely Piirrevekto Vertaaminen (matching) Vertailuarv o (template) Biometristen piirteiden säilytys Kyll ä/ei Päätös Pistey tys DigitalPersona: - Hardware - Drivers - GUI 13
15 Related products DigitalPersona U.are.U-technology According to DP s Gold SDK (and others) this technology is used in MSFR as well Architecture: Fingerprint scanner Challenge Response Raw data encrypted with a session key U.are.U COMserver Encrypted raw data 128-bit cipher key Signal processing 250-byte feature vector Matching module DP Fingerprint Engine Template Feature storage 14
16 Related products, cont d DP U.are.U 4000B scanner firmware & MSFR scanner firmware are NOT identical there is a one-bit difference! [1] Replacing this bit in MSFR drivers Does not crash Windows or freak out the MSFR Does not work properly either => MSFR = UrU 4000B, with commercial modifications [1]: 15
17 DigitalPersona The hardware has been tested and found to be sound The transmission of raw data with DP s system includes (Unspecified) challenge-response - protocol Stream cipher encryption, with session keys All is well? 16
18 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 17
19 Testing equipment Raw data transmission: Sniffer/Filter built on top of USB Sniffer [2] Formatting: PaintShopPro, HexEdit, Custom-made filter Anti-forgery and technical properties: Griaule GrFinger SDK [3], and miscellaneous equipment [2] [3] 18
20 MSFR: technical properties Optical scanner Resolution 512dpi (> 650dpi horizontal, dpi vertical) Scanned result in raw format: 384x288 pixels Scanning focus not immediately on the surface of the scanner glass: uses the skin s ridges 3D-properties FTIR (Frustrated Total Internal Reflection) Starting the scan requires a certain (coarse) pressure distribution and activity on the sensors heat does not matter, but reflective surfaces do not induce a scan 19
21 FTIR-sensors Optical material (prism, etc.) Finger 3D-sensitive Geometrical distortion Light source CCD/CMOS 20
22 MSFR: anti-forgery (1) Raw data is made of the actual scan and a checksum : a differently scanned smaller area from near the fingerprint scan focal point Imaging is not 1:1, but a conformal transformation of the fingerprint (FTIR-property, makes constructing digital replay-images from latent fingerprints harder) Forgery attempts did not achieve login with the experimented tricks, but a partial print was achieved with merely a 2D-image and blue tack (sort of sticking plasticine). Thresholded fingerprint image was printed on a transparency and used as the print of a blue tack finger 21
23 MSFR: anti-forgery (2) Tinfoil to create different reflective properties near the hotspot Partial fingerprint scan (with checksum) achieved with printed transparency and blue tack Actual fingerprint scan (with checksum) 22
24 MSFR: FTIR distortion Test grid to estimate the transformation ()14'1,15316,41010'0,845xxyyy = Screenshot from Griaule SDK, points to the type of conformal transformation made to the raw data Must be reproduced for digital replays An estimate of the transformation made by MSFR, obtained from measuring the pixels between MSFR and Griaule SDK scans 23
25 MSFR: crypto-features (1) First guess: Griaule s SDK will expose the crypto in the device (The free-version of the SDK let s one save the scans encrypted) This does not prove to be a correct guess, but: It is instructive to look closer at the pictures saved by the Griaule SDK 24
26 Griaule SDK: encryption Encrypted scan 1 Encrypted scan 2 Difference of the scans The same encryption key between scans and even sessions small graylevel differences in the scanned fingerprint don t cancel, but the background does No decent key management no replay protection Confidentiality not protected 25
27 USB Sniffer Affordable hardware sniffers with appropriate wiring hard to come by A software sniffer is placed between drivers and the client app A lot of USB-control traffic that needs to be identified and filtered 26
28 27
29 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 28
30 MSFR: messaging (1) MSFR DP drivers Firmware Scanner init Empty scan Scan ready Finger placed Fingerprint scan Fingerprint checksum Finger removed Data obtained with USB Sniffer and Griaule SDK 29
31 MSFR: messaging (2) Messages travel also to MSFR USB-protocol control messages Device firmware USB-protocol request messages (incl. memory areas) Almost all messages to MSFR are constant All messages bound for DP s drivers (aside from the scans themselves) are constant, excluding the serial number and type Not at least per-scan keys are used The messages to DP s drivers in the beginning of a session are identical no session keys are used either 30
32 MSFR: crypto features (2) MSFR does not use any kind of key management protocol Encrypting the actual scan? The values of the scan obtained from the USB Sniffer s log are suspiciously unevenly distributed, and there are easily seen 384 bytes sequences Form a bitmap of the values, of width 384 pixels: 31
33 MSFR: crypto features (3) Empty initial scan Fingerprint, and its checksum MSFR scanning results from the sniffer 32
34 MSFR: crypto features (4) Let s turn on the bit different from the DP s firmware Scans become encrypted! - Also some session keys or salt seem to be in use (trivial image difference did not work) But: DP s drivers are unable to process the scan any further Crypto-bit is turned off in the firmware, but the DP s drivers do not expect anything encrypted either 33
35 UrU 4000B messaging MSFR DP drivers Firmware Scanner init Empty scan Scan ready Challenge ( ) Response (2E 95 D9 63) Finger placed Fingerprint scan Challenge ( ) Response ( B) Fingerprint checksum Challenge ( ) Response (D9 00 CC A1) Finger removed Data obtained with USB Sniffer, courtesy of Daniel Drake 34
36 MSFR: crypto features (5) If crypto is on, session keys are used, BUT, who initializes them? replugs: two initial scans were retrieved: - Image difference did work! => MSFR initializes the keys => UrU & MSFR cipher is a stream cipher 35
37 Agenda Introduction In a perfect world Setting the stage Testbed Results Replay-attack Demo 36
38 Equipment and software Impostor Victim USB male-to-male cable Custom-made USB-message player software USB-sniffer software 37
39 MSFR messaging Lot of USB control data; constant Request-response messages Requests vary, but responses are constant => requests need not be interpreted, only counted Actual images Image headers must be sequenced 38
40 MSFR messaging (filtered) Ignore Time (ms) start=30610 Message direction MSFR DP Size (B) Type Ta.ID Contents INIT 156 0x10000 BULK 13 Contents of previous(?) scan, part x40 BULK 14 Msg X 276 0x40 BULK 14 Msg Y 276 0x40 BULK 31 Msg Q 533 0x10000 BULK 13 Empty scan, part xB340 BULK 35 Contents of previous(?) scan, part xB1C0 BULK 35 Empty scan, part x10000 BULK 36 Mem dump in ASCII x40 BULK 31 Msg Z x40 BULK 39 Msg Y Known finger x40 BULK 39 Msg Z x40 BULK 41 Msg Z x10000 BULK 36 FP scan, part xB340 BULK 43 Mem dump in ASCII xB1C0 BULK 43 FP scan, part x10000 BULK 45 Mem dump in ASCII x8740 BULK 45 FP checksum x10000 BULK 47 Mem dump in ASCII x40 BULK 41 Msg Z x40 BULK 50 Msg Z Identical between scans 39
41 MSFR image headers Initial empty scan headers All identical Checksum headers Variable, but simple sequence number, can be replayed Scan headers Variable, but simple sequence number Additional variable byte, varies within four units => at most 4 trials needed 40
42 Replay attack 1 Install a USB-sniffer to the victim s computer Get the logfile Use a custom-made USB message-player to parse the logfile Play back the logfile to the victim s computer Drawback: identical image - protection possible (untested) would require post-processing of the image at first (histogram changing, geometrical distortions) 41
43 Replay attack 2 Create a template: Generate a logfile in your own computer Create data: Get a fingerprint (i.e. a latent print) of the victim Digitize the fingerprint Apply the aforementioned conformal transformation to the fp image Combine data & template Replace the scan in the original logfile with the transformed fp image Replace the checksum with a negative image from the hotspot Play this message sequence to the victim s computer Identical image -protection is bypassed Drawback: checksum may be formed with a more complex method than just negative image (untested) combining known checksums? 42
44 Possible replay attack 3 (for encrypted version, conjectured) Create a template: Generate a logfile (encrypted and unencrypted fingerprint) in your own computer Record the challenge and response values Subtract the plain and encrypted images to get a one-time pad for the CPpair Create data: Get a fingerprint (i.e. a latent print) of the victim Digitize the fingerprint Apply the aforementioned conformal transformation to the fp image Add the one-time-pad to this image Combine data & template Replace the scan in the original logfile with the transformed & encrypted image Play this message sequence to the victim s computer Modify challenge and response messages between the driver and device Identical image -protection is bypassed Drawback: lots, not tested 43
45 Fix? MSFR would work correctly with just one flipped bit (*) Also DP s drivers should not expect an unencrypted image the bit location for this is not known Fix available in Linux, not in Windows, see [1] (*) Location 0xE9B7 in dpd0bx01.dll and location 0x42B in the uploaded firmware-messages should be 0x17, not 0x7 [1]: 44
46 MSFR as an access control device MSFR uses no crypto whatsoever: No protocol, (which could just have been misused due to a bug) No communication channel encryption at all in the most vulnerable part of a biometric authentication system Optical scanner, from which partial scans can be obtained with a 2D-model With predictable messaging and no crypto, one will not even need a gelatine finger, just a USB- recorder/player This is NOT a security feature 45
47 Demonstration 46
48 MSFR: closing statements Security features have been sacrificed for low price (DP s drivers have the security features, they are just not used) By using nonexistent crypto-features, MSFR also reveals some of the DP s anti-forgery techniques, such as the checksum The MS / DP disclaimer holds more likely it is an understatement! 47
49 Questions? 48
Penetration Testing Biometric System
Penetration Testing Biometric System A Penetration Testers Guide to Finger Print Authentication [FB1H2S aka Rahul Sasi] http://fb1h2s.com http://www.garage4hackers.com Presented @ NullCon International
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Wireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Biologger A Biometric Keylogger
Biologger A Biometric Keylogger Matt Lewis, Black Hat Europe 2008 Agenda Background and research aims Worked example Protocol investigation Identifying template formats Identifying image data Fake biometric
Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration
WELCOME ievo would like to thank you for purchasing our product. ievo advise the use of a. Ensure you have calculated the correct power supply amp rating if you are connecting the ievo board and other
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06
Wireless Traffic Analysis Kelcey Tietjen DF Written Report 10/03/06 Executive Summary Wireless traffic analysis provides a means for many investigational leads for a forensic examination. It can provide
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Security. Definitions
Security While protection has been discussed throughout the class kernel vs. user mode, protected memory, file permissions these mechanisms have generally been focused on protection from accidental misuse
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
Digital Persona Fingerprint Reader Installation
Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.
Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview
4050-350-39 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1 With the current mindset of
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
How to hack VMware vcenter server in 60 seconds
Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexander Minozhenko #whoami Pen-tester at Digital Security Researcher DCG#7812 / Zeronights CTF Thanks for ideas
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00
Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System
Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System The California Secretary of State tasked Freeman Craft McGregor Group (FCMG) to perform functional testing, accessibility
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
