Abstract
While most automotive immobilizer systems have been shown to be insecure in the last few years, the security of remote keyless entry systems (to lock and unlock a car) based on rolling codes has received less attention. In this paper, we close this gap and present vulnerabilities in keyless entry schemes used by major manufacturers. In our first case study, we show that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few, global master keys. We show that by recovering the cryptographic algorithms and keys from electronic control units, an adversary is able to clone a VW Group remote control and gain unauthorized access to a vehicle by eavesdropping a single signal sent by the original remote. Secondly, we describe the Hitag2 rolling code scheme (used in vehicles made by Alfa Romeo, Chevrolet, Peugeot, Lancia, Opel, Renault, and Ford among others) in full detail. We present a novel correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop. Our findings affect millions of vehicles worldwide and could explain unsolved insurance cases of theft from allegedly locked vehicles.
Original language | English |
---|---|
Title of host publication | Proceedings of the 25th USENIX Security Symposium |
Publisher | USENIX Association |
Pages | 929-944 |
ISBN (Print) | 9781931971324 |
DOIs | |
Publication status | Published - 12 Aug 2016 |
Event | 25th USENIX Security Symposium - Austin, Texas, United States Duration: 10 Aug 2016 → 12 Aug 2016 |
Conference
Conference | 25th USENIX Security Symposium |
---|---|
Country/Territory | United States |
City | Austin, Texas |
Period | 10/08/16 → 12/08/16 |