To create a forgery, the attacker picks a random signature and uses the verification procedure to determine the message "m" corresponding to that signature.
The important point about non-conformance is that verification and validation techniques are designed to detect them and security assurance techniques are designed to prevent them.
The group explained that the security system had been defeated by photographing a fingerprint from a glass surface and using that captured image as verification.
It is important to reduce the overhead of runtime verification tools as much as possible, particularly when the generated monitors are deployed with the system.