FaceTec Liveness Security Report Q2 2022
FaceTec Liveness Security Report Q2 2022
Biometric matching is now replacing legacy KBA, serving as a strong verifier of the user's unique
biology that can provide the right to access their specific account. However, it is not enough to verify
biometric data matches, as that data can be collected, stored, and then reused in most cases. To
prevent such abuse, the new biometric data sample must be confirmed to be a first-generation capture
from a living, 3D user just moments before it is matched to trusted enrolled data.
The confirmation that the user is a real, 3D, physical human is called "Liveness Detection." FaceTec is a
pioneer in Liveness Detection (more specifically, 3D Liveness Detection) and, for the past eight years,
has developed and deployed a user-friendly, yet exceptionally secure Liveness AI, delivering the most
accurate 3D face matching for smartphones and web browsers available.
Using only 2D face matching isn't sufficient for remote identity verification. Liveness Detection is
required, but not all Liveness can actually stop attackers. In fact, most cannot and have become a mere
nuisance for fraudsters to work around. Relying on outdated standards and testing criteria, such as
iBeta/ISO 30107-3, creates a false sense of security. Attack vectors have evolved so quickly that
standards released in 2017 were rendered obsolete within just a few years. ISO 30107-3 and iBeta
testing does not include new attack vectors such as digital deepfakes or video injection, two of the
most scalable types of attack vectors with the potential to cause widespread damage.
To ensure real-world security in the face of emerging attack vectors, FaceTec's $200,000 Spoof Bounty
Program has opened up the AI to attackers, inviting them to use their expertise to bypass FaceTec's
Liveness Detection and providing up-to-the-minute proof that FaceTec's AI can defend against all known
Level 1-5 Attacks. No other vendor in the world has Liveness AI capable of supporting such a
transparent and dynamic program.
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.
Spoof Bounty Program Details:
The number of attacks on the Bounty Program broken out by Attack Level:
Level 5 $40,000 >14,000 - We count Virtual-Cam & Video Injection attacks, as well as
where attackers set breakpoints and fail to pass Liveness
* Two Level 1 PAD bounties were claimed in mid-2020. These attacks both used high quality video with slight blurs applied.
The bounties were paid and the vulnerability was patched. There are no known vulnerabilities at this time.
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.
Rebuffed attacks with 2D & 3D artifacts:
FaceTec's 3D Liveness proves to a very high level of confidence (+99.999%) that the physical user is
present and the camera feed is not being tampered with. This is done by determining that the app is not
running on an emulator, a virtual camera is not being used, and a camera hardware adapter bypass is
not being attempted. Over the last two years, the FaceTec Spoof Bounty Program has rebuffed over
110,000 attacks, providing FaceTec with the data to closely examine the real-world attacks our software
must defend against. The Spoof Bounty Program incentivizes attackers to employ their most effective
methods to claim the bounty. All attacks are analyzed, and if a new potential spoof method is identified,
the proper steps to mitigate the threat are taken immediately. This means that new threats are patched
before they can be exploited by fraudsters in real-world applications. Security is about staying ahead of
bad actors, and FaceTec is the only company that pays creative white-hat attackers to help uncover
potential vulnerabilities before they can be maliciously used for actual fraud.
Many Liveness vendors cite outdated third-party testing conformances to get credibility, preferring
lowest common denominator standards and methods that provide a false sense of security, rather than
actively and successfully addressing attacks from deepfakes and video injection. The primary reason
FaceTec's competitors do not provide spoof bounty programs is their AI would not be able to rebuff any
sophisticated attacks and be quickly compromised, which would result in massive bounty payouts.
The European Union Agency for Cybersecurity's (ENISA) January 2022 Remote Identity Proofing -
Attacks & Countermeasures report discusses the most recent threat vectors, highlighting the need for
3D data to be used in the Liveness assessment, as well as explains how spoof bounty programs are
currently the most effective way to test known and unknown threats.
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.
FaceTec Internal Security Self-Assessment
Over the last seven years, FaceTec's internal "Red Team" has attacked the FaceTec Liveness AI in
hundreds of different ways and with 10's-of-millions of attacks. Over these years and millions of
attacks, FaceTec has trained its AI to detect and reject attacks of all types.
These attacks are over and above the attacks in the iBeta Level 1 & 2 testing (total of 3,300+), and the
110,000+ attacks on the Spoof Bounty Program.
A user performs a 3D FaceScan™, which is the result of real-time processing on the video selfie. The 3D
FaceScan is encrypted and sent to the organization running the FaceTec Server SDK. When the user's
Liveness is deemed "true" by the AI, a 3D FaceMap™ (~170kb) is created, and the 3D FaceScan (and its
Liveness data) can be deleted. In the future, the 3D FaceMap can be used to perform the most accurate
face matching against 2D user photos that are on file, as a photo ID or in an NFC chip.
The 3D FaceScan (~350KB) is an encrypted byte blob that contains reverse engineered 3D data from
100-plus video frames captured during the two-second user selfie. FaceScans are always encrypted
and are not human viewable. 3D FaceScans do contain Liveness data. However, 3D FaceMaps are
always encrypted and are not human viewable. 3D FaceMaps do not contain Liveness data, and don't
need to because new Liveness data is always recollected and reassessed each time there is a new
access request.
FaceTec performs over 600,000,000 3D Liveness Checks annually and has never had any fraud reports
from any customer using a properly deployed, up-to-date version of the FaceTec Liveness software.
There are two types of video injection attacks that can defeat most Liveness Detection systems, either
software- or hardware-based.
The software-based attack vector uses breakpoints in the Device SDK code or a virtual camera program
to fool the system into thinking it is seeing data that was collected from a real camera.
Hardware video injection attacks use adapters to connect to the camera port of a device, and then
video is played from another device. This simulates live video that is captured by a physical camera, but
it is just receiving the incoming recorded video or synthetic deepfake video feed.
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.
Resources
Educational Wiki-style site - www.Liveness.com
ENISA 2022 - Identity Proofing Guidelines Report
NIST 800-63 RFI - Liveness Security Report Letter
Deepfake vs. 2D Liveness Paper - Seeing is Living?
Deepfake Spoof Article - Unite.ai
© 2022 FaceTec, Inc. All Rights Reserved. Visit www.FaceTec.com for additional information.