https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

Facial recognition

2020 Predictions: Black Hats Begin to Target Facial Recognition Technology

Research interest in defeating facial recognition technology is booming. Adversaries are likely taking notice, but don't expect widespread adoption overnight.
  • Written by Brian Buntz
  • 6th December 2019

Facial recognition may not be a classic IoT use case, but the technology often follows the same basic pattern of many IoT applications. That is, a sensor-enabled networked device gathers data about an object in the physical world, digitizes it and analyzes it to trigger a potential action. In this case, an IP camera scans the face of an individual and checks its features against a database of known faces. If a wanted criminal turns up an airport, a facial recognition system could, for instance, automatically notify law enforcement. 

The volume of facial recognition technology use cases is swelling beyond surveillance. Access control is one burgeoning area for facial recognition and other types of biometrics. Amazon Go stores use facial scans. And in China, cities such as Shenzhen and Jinhua, are using the technology to enable residents to pay for public transit via a face scan. And now that facial recognition has become a mainstream method to unlock smartphones, the technology will likely gain ground for gaining access to secure portions of buildings to industrial machines. On the consumer side, Amazon’s Ring and a startup known as WUUK Labs has developed video doorbells. 

But as facial recognition technology and other types of image recognition gain ground, so is the interest in defeating it or blocking it entirely. While to date, most of that interest has been in research environments, that could begin to change in 2020. Already, machine learning researchers proved successful in defeating the image recognition mechanisms in everything from facial recognition systems to convincing traffic sign recognition systems to mistake stop signs for yield signs.  

[IoT World is North America’s largest IoT event where strategists, technologists and implementers connect, putting IoT, AI, 5G and edge into action across industry verticals. Book your ticket now.]

Recently, researchers at Facebook AI and the University of Maryland created an adversarial print on a sweatshirt that could enable its wearer to elude detection by public surveillance systems. 

Earlier this year, researchers at the Belgian university KU Leuven created an adversarial print — roughly a foot square — that enabled someone wearing it to escape identification by a person detector. Meanwhile, researchers in Russia used a similar technique — affixing a sticker to a hat — to defeat facial recognition systems.  

The barrier to entry for individuals wanting to manipulate images is quickly lowering, as McAfee’s annual predictions report explained. Websites currently exist where an individual can upload a video that will be manipulated into a deepfake version for a nominal fee or potentially for free. Nation-states will likely begin using deepfake society to sow seeds of chaos across the world, according to McAfee Chief Technology Officer Steve Grobman. 

Gorbman’s colleague Steve Povolny, head of McAfee Advanced Threat Research, foresees adversaries using deepfakes to bypass facial recognition. 

In October, VentureBeat reported on research from Facebook AI Research that succeeded in defeating video-based facial recognition systems — even in real time. 

Interest in lower-tech options to defeat facial recognition is increasing as well. A UK Wired article cites the use of 3D printed masks, bespoke textiles, makeup and infrared lights, among other strategies to defeat such systems. 

Given many hackers’ interest in privacy and in defeating emerging security controls, it’s only a matter of time before lab-based research dedicated to defeating image recognition systems spills over into the everyday world. 

Trend Micro’s Jon Clay, director of global threat communications points out, however, that techniques ranging from deep fakes to adversarial machine learning are likely still in an embryonic stage. “Based on most information we’ve seen the likelihood of broad usage of these technologies is still a ways off,” Clay said. “There have been a few instances of adversarial machine learning, which is mainly malware designed to defend itself against a machine learning technology,” he added. Video-based deep fakes are likely still a future threat, but voice-based deep fakes could be a threat in the near term. Clay envisions that an adversary could, for instance, record a voice-mail with instructions to, say, wire-transfer money. “I don’t see deep fake video used in business unless it is to hurt a public company’s stock price by manipulating something their CEO says publicly and using social media to expand the video.”

Even as techniques like adversarial machine learning and deep fakes advance, it will likely take some time before adversaries adopt them at scale. The majority of cybercriminals stick with their TTPs that “don’t require the investment and time required to utilize these newer technologies,” Clay said, referring to the acronym for tactics, techniques and procedures. “They will continue to utilize ransomware, BEC, phishing and exploits of known vulnerabilities in their attacks, simply because it still works. Until it doesn’t, we won’t see widespread adoption of these newer technologies,” he concluded.

Tags: Security Features

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Common Internet of Things Security Pitfalls 
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Developing a Critical Infrastructure Cybersecurity Strategy
  • Addressing IoT Security Challenges From the Cloud to the Edge 

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @aicas_IoT — a flexible, more efficient approach to embedded realtime application… twitter.com/i/web/status/1…

4th March 2021
IoTWorldToday, IoTWorldSeries

Microsoft Ignite 2021: Innovation in COVID-19 Era Signals Future Trends dlvr.it/RtwYcg

4th March 2021
IoTWorldToday, IoTWorldSeries

At Microsoft Ignite: How IoT and Robotics Are Driving Industry 4.0 dlvr.it/Rttgwj

3rd March 2021
IoTWorldToday, IoTWorldSeries

🎙️ Introducing #EIOTWORLD speaker, Obinna Ilochonwu, Industrial IoT Architect at Schlumberger. 📅 Join his session… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

#Smartbuilding technology lays the foundation for #energyefficiency efforts but also new COVID-19 goals, such as… twitter.com/i/web/status/1…

2nd March 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X