This is the website for an older EuroPython. Looking for the latest EuroPython? Click here!
Skip to main content

Face Off: Brute-force attack on Biometrical-databases

Level:
beginner
Room:
pycharm (forum hall)
Start:
Duration:
30 minutes

Abstract

Magic happens every time you take your phone out of your pocket. Somehow, just by looking at the screen, your phone recognizes you (and only you) and magically unlocks.

Have you ever stopped for a minute and thought to yourself - How does that even work? And maybe more importantly, how secure is it?

In this session, we're going to understand how facial recognition works under the hood. We'll dive into some potential security problems, and we'll show you how we were able to break into a biometric database built on the Dlib-python-library by applying a sophisticated brute-force attack. The results will surprise you.

TalkSecurity

Description

Outline:

  • Intro - The magic of Face ID [3 min]
  • Under the hood - How Deep Learning Face ID works [5 min]
  • Comparing faces - Exploring the Face-Space [4 min]
  • Recap - Tying it all together [2 min]
  • Exploitation - Weird behavior & Possible weakness? [6 min]
  • Shocking results! - [2 min]
  • The Attack - Our attack on a Biometrical database [6 min]
  • Summary [1 min]

The speaker

Roy M Mezan

Roy M Mezan

Roy is an enthusiastic Python programmer, Finished his B.CS at the age of 18. Lead the drone department at the University R&D Lab. Was a Drone development officer at the IDF & Project manager of AR/VR development team. Worked on autonomous drones in the defense industry. Currently working as a senior developer at Ownbackup in the Security group.


← Back to schedule