[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2995289.2995297acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
invited-talk

Wireless Attacks on Automotive Remote Keyless Entry Systems

Published: 28 October 2016 Publication History

Abstract

Modern vehicles rely on a variety of electronic systems and components. One of those components is the vehicle key. Today, a key typically implements at least three functions: mechanical locking with a key blade, the electronic immobilizer to autorise the start of the engine, and the remote keyless entry (RKE) system that allows to wirelessly (un)lock the doors and disable the alarm system. These main components of a vehicle key are shown in Figure 1. For the mechanical part of the vehicle key, it is well known that the key blade can be easily copied and that the locking cylinder can be bypassed with other means (using so-called "decoders" or simply a screwdriver). In contrast, immobilizer and RKE rely on wireless protocols to cryptographically authenticate the vehicle key to the car. Immobilizers employ radio frequency identification (RFID) transponders to carry out a challenge-response protocol over a low-range bidirectional link at a frequency of 125 kHz. In the past, researchers have revealed severe aws in the cryptography and protocols used by immobilizers, leading to the break of the major systems Megamos, Hitag2, and DST40 [7, 6, 1]. In contrast to the immobilizer, the RKE part uses unidirectional communication (the vehicle only receives, the key fob only transmits) over a high-range wireless link with operating distances of tens to one hundred meters. These systems are based on rolling codes, which essentially transmit a counter (that is incremented on each button press) in a cryptographically authenticated manner. Until recently, the security of automotive RKE had been scrutinized to a lesser degree than that of immobilizers, even though vulnerabilities in similar systems have been known since 2008 with the attacks on KeeLoq [3]. Other results reported in the literature include an analytical attack on a single, outdated vehicle [2] and the so-called "RollJam" technique [5], which is based on a combination of replay and selective jamming. In 2016, it was shown that severe aws exist in the RKE systems of major automotive manufacturers [4]. On the one hand, the VWgroup (Volkswagen, Seat, Skoda, Audi) based the security of their RKE system on a few global cryptographic keys, potentially affecting hundreds of million vehicles world-wide. By extracting these global keys from the firmware of electronic controls units (ECUs) once, an adversary is able to create a duplicate of the owner's RKE fob by eavesdropping a single rolling code. The second case study in [4] exposes new cryptographic weaknesses in the Hitag2 cipher when used for RKE. Applying a correlation-based attack, an adversary can recover the 48-bit cryptographic key by eavesdropping four to eight rolling codes and performing a one-minute computation on a standard laptop. Again, this attack affects millions of vehicle world-wide. Manufacturers that used Hitag2 in their RKE system include Alfa Romeo, Peugeot, Lancia, Opel, Renault, and Ford among others. In this keynote talk, we will present the results of [4] and put them in into a broader context by revisiting the history of attacks on RKE systems and automotive electronics.

References

[1]
S. C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In 14th USENIX Security Symposium (USENIX Security 2005), pages 1--16. USENIX Association, 2005.
[2]
S. Cesare. Breaking the security of physical devices. Presentation at Blackhat'14, August 2014.
[3]
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology -- CRYPTO'08, volume 5157 of LNCS, pages 203--220. Springer, 2008.
[4]
F. D. Garcia, D. Oswald, T. Kasper, and P. Pavlidès. Lock it and still lose it -- on the (in)security of automotive remote keyless entry systems. In 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016. USENIX Association.
[5]
S. Kamkar. Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars. Presentation at DEFCON 23, August 2015.
[6]
R. Verdult, F. D. Garcia, and J. Balasch. Gone in 360 seconds: Hijacking with Hitag2. In USENIX Security Symposium, pages 237--252. USENIX Association, August 2012. https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final95.pdf.
[7]
R. Verdult, F. D. Garcia, and B. Ege. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. In 22nd USENIX Security Symposium (USENIX Security 2013), pages 703--718. USENIX Association, 2015.

Cited By

View all
  • (2024)A Survey of Edge Computing Privacy and Security Threats and Their Countermeasures2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00093(484-489)Online publication date: 1-Jul-2024
  • (2024)Securing the Future: A Comprehensive Review of Security Challenges and Solutions in Advanced Driver Assistance SystemsIEEE Access10.1109/ACCESS.2023.334720012(643-678)Online publication date: 2024
  • (2023)RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry SystemsACM Transactions on Cyber-Physical Systems10.1145/36278278:1(1-25)Online publication date: 19-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
October 2016
74 pages
ISBN:9781450345675
DOI:10.1145/2995289
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 2016

Check for updates

Author Tags

  1. automotive security
  2. embedded systems
  3. remote keyless entry
  4. wireless attacks

Qualifiers

  • Invited-talk

Conference

CCS'16
Sponsor:

Acceptance Rates

TrustED '16 Paper Acceptance Rate 6 of 12 submissions, 50%;
Overall Acceptance Rate 24 of 49 submissions, 49%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)3
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Edge Computing Privacy and Security Threats and Their Countermeasures2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00093(484-489)Online publication date: 1-Jul-2024
  • (2024)Securing the Future: A Comprehensive Review of Security Challenges and Solutions in Advanced Driver Assistance SystemsIEEE Access10.1109/ACCESS.2023.334720012(643-678)Online publication date: 2024
  • (2023)RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry SystemsACM Transactions on Cyber-Physical Systems10.1145/36278278:1(1-25)Online publication date: 19-Oct-2023
  • (2023)Security and Privacy on 6G Network Edge: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.324467425:2(1095-1127)Online publication date: Oct-2024
  • (2022)CarTwin—Development of a Digital Twin for a Real-World In-Vehicle CAN NetworkApplied Sciences10.3390/app1301044513:1(445)Online publication date: 29-Dec-2022
  • (2022)Secure Wireless Smart Car Door Unlocking SystemIoT Based Control Networks and Intelligent Systems10.1007/978-981-19-5845-8_8(99-112)Online publication date: 12-Oct-2022
  • (2020)A Defense Mechanism against Replay Attack in Remote Keyless Entry Systems Using Timestamping and XOR LogicIEEE Consumer Electronics Magazine10.1109/MCE.2020.3012425(1-1)Online publication date: 2020
  • (2020)Timestamp-based Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems2020 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE46568.2020.9043039(1-4)Online publication date: Jan-2020
  • (2019)Vulnerabilities in the vehicle’s electronic network equipped with ADAS system2019 3rd School on Dynamics of Complex Networks and their Application in Intellectual Robotics (DCNAIR)10.1109/DCNAIR.2019.8875529(100-102)Online publication date: Sep-2019
  • (2019)Securing smart vehicles from relay attacks using machine learningThe Journal of Supercomputing10.1007/s11227-019-03049-4Online publication date: 30-Oct-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media