Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel



Similar documents
Biometrics in Physical Access Control Issues, Status and Trends White Paper

Physical Security: From Locks to Dox

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

Security Management System

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

W.A.R.N. Passive Biometric ID Card Solution

GLOSSARY of SECURITY TERMS

Techno Security's Guide to Securing SCADA

Advanced Authentication

May For other information please contact:

Biometrics and Cyber Security

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

BIOMETRIC SOLUTIONS 2013 ISSUE

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

22 nd NISS Conference

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

SCB Access Single Sign-On PC Secure Logon

WHITE PAPER. Let s do BI (Biometric Identification)

Understanding Access Control

BIOMETRIC AUTHENTICATION SECURITY AND USABILITY

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

visit us on the web at:

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

NFC & Biometrics. Christophe Rosenberger

We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system

Multi-Factor Authentication

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

ATM FRAUD AND COUNTER MEASURES

Security Levels for Web Authentication using Mobile Phones

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

PUF Physical Unclonable Functions

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Fingerprint-Based Authentication System for Time and Attendance Management

Section 2.2 Locks and Keys. Legal Notice

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Assignment 1 Biometric authentication

Research Article. Research of network payment system based on multi-factor authentication

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Security Management System Wiring Diagram Portfolio

Biometric SSO Authentication Using Java Enterprise System

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Access Control Glossary

Smart Cards and Biometrics in Physical Access Control Systems

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

Biometric authentication systems today and in the future

SYMMETRY PRODUCT OVERVIEW

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007

integrated fire and security solutions Maximum protection for buildings

Two-Factor Authentication Making Sense of all the Options

Physical Security in Mission Critical Facilities

True Identity solution

Fingerprint-Based Authentication System for Time and Attendance Management

EQUIPMENT SPECIFICATIONS

Development of Attendance Management System using Biometrics.

AD-Series. Selection Guide

GMS GRAPHICAL MANAGEMENT SYSTEM

Authentication Methods Used for Banking. Seth Thigpen. East Carolina University

PoE-Touch Fingerprint and RFID Access Control

Improving Online Security with Strong, Personalized User Authentication

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Major Risks and Recommended Solutions

Physical Security in Mission Critical Facilities

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

solutions Biometrics integration

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

Access Control System Access Control System is designed for the places where need for crucial security.

White paper. Biometrics and the mitigation of card-related fraud

T imetrak Systems Inc. offers the widest variety

What is a Smart Card?

Electronic Security. For Financial Institutions

Moving to Multi-factor Authentication. Kevin Unthank

PAC1 Door Access Controller

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

F11 User Manual. Version:1.0 Date:Jul. 2010

Authentication Levels. White Paper April 23, 2014

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Transcription:

Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel

Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints

Error Rate False Reject Rate (Type I error) False Accept Rate (Type II error) Equal Error Rate

Environment Does it have to handle inclement weather? Vandals? Extreme temperatures?

Cost You re on a budget.

Physical Vulnerability Decreased resistance to forced and covert entry Electromagnets can be bypassed with packing tape Electric strikes can disable anti-loiding features on locksets Loiding : from the celluloid strips originally used to slip latches. Credit cards can also be used. Request to exit sensors can be defeated with balloons, long pieces of plastic, etc.

Additional Constraints What load does the system need to handle? How fast does it have to process users? Do you need different levels of access for different users? An audit trail? Does the system have to talk to a separate alarm system? Will it detect or resist physical attacks? From DOD UG-2045-SHR

How to improve the security of any access control system

Stacking What you have + What you know + What you are Improve either FAR or FRR (in the most common configuration) Can reduce security e.g. mechanical key bypass

Centralized systems Terminals Communication lines Servers

Categories of Systems Guard Token Knowledge Biometric

Guard Checks Photo ID Good: Simple Low initial cost Fast Not affected by the environment.

Guard Checks Photo ID Bad: Easy to counterfeit ID cards Cards can be stolen People get complacent Guards have salaries, not a one-time purchase cost.

Guard Checks Photo ID Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: 32.6% error overall Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: 32.6% error overall Paranoid: 3/6 cashiers rejected a recent, accurate photo at least once Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: 32.6% error overall Paranoid: 3/6 cashiers rejected a recent, accurate photo at least once 34.09% of the time a blatantly wrong photo was accepted Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: 32.6% error overall Paranoid: 3/6 cashiers rejected a recent, accurate photo at least once 34.09% of the time a blatantly wrong photo was accepted 50% false accept rate Source: www.african-safari-pictures.com

Guard Checks Photo ID Ugly: 32.6% error overall Paranoid: 3/6 cashiers rejected a recent, accurate photo at least once 34.09% of the time a blatantly wrong photo was accepted 50% false accept rate 63.64% FAR for a similar-looking photo Source: www.african-safari-pictures.com

Mechanical key locks Magnetic cards Barcodes Proximity / RFID Smart cards / CPU tokens BFV and Wiegand Wire VingCard Tokens

Mechanical key locks Very reliable and need no power supply No audit trail Lots of security issues Picking Bumping Decoding Attacking the master key Many different mechanical lock technologies

VingCard Mechanical keycards Quick to rekey Easy to copy Hotel thieves example Low security Electronic lock decoding

Magnetic Stripe cards Low vs. High Coercivity Reliable (as long as there s no magnet around) Audit trail limited by back-end Cheap Trivial to read, duplicate, and potentially modify

Barrium Ferrite Cards Preceded HiCo magstripe standard Embedded layer of Barium Ferrite Tough: Weather-resistant High Coercivity Easy to decode Last seen in an automated parking system

Wiegand Wire Processed magnetic alloy Single apparent domain wall Low coercivity core High coercivity shell Image adapted from Switching Behavior of Stressed Vicalloy Wire, IEEE Transactions on Magnetics, 1979

Image adapted from US patent 4,736,122

Wiegand

Wiegand Wire First attack published in 1996 on cypherpunks list: Cut wires out of a card and rearrange Vulnerable to emulation style attacks

Barcodes Cheap, low security Easy to duplicate Invisible barcodes 1D and 2D versions

Prox / RFID Many well-known issues Cloning Hybrid RFID / Magstripe systems http://web.mit.edu/keithw/public/mit-card-vulnerabilities-march31.pdf

Richard M. Stallman s Office Key Image credit Austin Roach, Josh Mandel, and Keith Winstein of MIT

CPU Tokens Smart cards, ibuttons It s easy to make a virtual token Cryptographic authentication is necessary for real security DirecTV vs. Hackers Image from CA Technology Inc. / Keylessdepot.com

Knowledge Mechanical combination locks Electronic keypads Safe-type electronic locks

Mechanical combination locks

Mechanical combination locks Good: Simple, reliable, and no power necessary

Mechanical combination locks Good: Simple, reliable, and no power necessary Bad: No audit trail Can be manipulated (usually) Brute force attack http://www.cs.berkeley.edu/ ~bh/v3ch2/math.html http://www.tech-faq.com/ simplex-lockcombinations.shtml

Simplex operation

Opening Procedure

Which tumbler is binding? binding not binding

Push 1. Is a new tumbler binding?

Advance tumbler 1 by pushing a throwaway button -- here, number 5 -- and check if another tumbler is binding This tumbler is advanced by 1 when I push this one

Try pushing another throwaway button -- 4 -- and check for binding binding

Reset, and try the combination 152

Check if any new tumblers are binding now

Reset, and try the combination 125

Check if any new tumblers are binding now

Reset and try the combination 123

Electronic keypads

Attacks Electronic keypads

Electronic keypads Attacks The UV powder trick Attacker needs to enter very many combinations So use a highlighter

Electronic keypads Attacks The UV powder trick Attacker needs to enter very many combinations So use a highlighter Shoulder surfing and hidden cameras

Electronic keypads

Photograph by Schlage ge every time the ng directly in Electronic keypads ed digits.

Dynamically changing scramble-key high-security keypads fix most of these problems Photograph by Schlage ge every time the ng directly in Electronic keypads ed digits.

Dynamically changing scramble-key high-security keypads fix most of these problems Users can still distribute the combination Photograph by Schlage ge every time the ng directly in Electronic keypads ed digits.

Safe-type electronic locks

Safe-type electronic locks

Safe-type electronic locks Very secure

Safe-type electronic locks Very secure Audit trail usually available LaGard Navigator Web-based lock designed for ATMs, extensive audit trail User connects smart phone or PDA loaded with client software that allows the lock to communicate with the server

Safe-type electronic locks Very secure Audit trail usually available LaGard Navigator Web-based lock designed for ATMs, extensive audit trail User connects smart phone or PDA loaded with client software that allows the lock to communicate with the server Some are vulnerable to spiking and other safe-technician tricks

Biometrics Voice Face Fingerprints Hand geometry Retina scan Iris scan Signature

Voice pattern recognition Reliability Time, stress, illness Easy to defeat

Face recognition Hold up a photo or a laptop

Fingerprints

Fingerprints Guess what your fingers leave behind on the sensor? Use gummi bears, breath, water-filled bag (condom)

Fingerprints Guess what your fingers leave behind on the sensor? Use gummi bears, breath, water-filled bag (condom) Environment around the sensor has fingerprints too

Fingerprints Guess what your fingers leave behind on the sensor? Use gummi bears, breath, water-filled bag (condom) Environment around the sensor has fingerprints too Supervision by trained guards

Multispectral imaging The manufacturer claims that it: Does not require contact between the finger and reader Is capable of reading when the reader is immersed in water Inherently differentiates between a live finger and any prosthetic

Images from lumidigm.com

Multispectral imaging http://www.lumidigm.com Images from lumidigm.com

Hand geometry Hands are not unique Privacy Dummy hands

Retina scan Nobody in the public literature has yet falsified a retina. Invasive

Iris scan

Iris scan Effectively zero error rate 1 in 1 million Equal Error Rate For FRR of 0.0001%, an FAR of 1 in a trillion (1x10-12 %)

Iris scan Effectively zero error rate 1 in 1 million Equal Error Rate For FRR of 0.0001%, an FAR of 1 in a trillion (1x10-12 %) Defeating iris scan Magazine covers Printing on contact lenses

Signature Measure pressure and velocity 1% ERR Banks demand 1% FAR and 0.01% FRR Forging signatures is easy to learn

Further reading Ross Anderson s Security Engineering Ross, et al. Handbook of Multibiometrics