Wireless Attacks on Automotive Remote Keyless Entry Systems

David F. Oswald
{"title":"Wireless Attacks on Automotive Remote Keyless Entry Systems","authors":"David F. Oswald","doi":"10.1145/2995289.2995297","DOIUrl":null,"url":null,"abstract":"Modern vehicles rely on a variety of electronic systems and components. One of those components is the vehicle key. Today, a key typically implements at least three functions: mechanical locking with a key blade, the electronic immobilizer to autorise the start of the engine, and the remote keyless entry (RKE) system that allows to wirelessly (un)lock the doors and disable the alarm system. These main components of a vehicle key are shown in Figure 1. For the mechanical part of the vehicle key, it is well known that the key blade can be easily copied and that the locking cylinder can be bypassed with other means (using so-called \"decoders\" or simply a screwdriver). In contrast, immobilizer and RKE rely on wireless protocols to cryptographically authenticate the vehicle key to the car. Immobilizers employ radio frequency identification (RFID) transponders to carry out a challenge-response protocol over a low-range bidirectional link at a frequency of 125 kHz. In the past, researchers have revealed severe aws in the cryptography and protocols used by immobilizers, leading to the break of the major systems Megamos, Hitag2, and DST40 [7, 6, 1]. In contrast to the immobilizer, the RKE part uses unidirectional communication (the vehicle only receives, the key fob only transmits) over a high-range wireless link with operating distances of tens to one hundred meters. These systems are based on rolling codes, which essentially transmit a counter (that is incremented on each button press) in a cryptographically authenticated manner. Until recently, the security of automotive RKE had been scrutinized to a lesser degree than that of immobilizers, even though vulnerabilities in similar systems have been known since 2008 with the attacks on KeeLoq [3]. Other results reported in the literature include an analytical attack on a single, outdated vehicle [2] and the so-called \"RollJam\" technique [5], which is based on a combination of replay and selective jamming. In 2016, it was shown that severe aws exist in the RKE systems of major automotive manufacturers [4]. On the one hand, the VWgroup (Volkswagen, Seat, Skoda, Audi) based the security of their RKE system on a few global cryptographic keys, potentially affecting hundreds of million vehicles world-wide. By extracting these global keys from the firmware of electronic controls units (ECUs) once, an adversary is able to create a duplicate of the owner's RKE fob by eavesdropping a single rolling code. The second case study in [4] exposes new cryptographic weaknesses in the Hitag2 cipher when used for RKE. Applying a correlation-based attack, an adversary can recover the 48-bit cryptographic key by eavesdropping four to eight rolling codes and performing a one-minute computation on a standard laptop. Again, this attack affects millions of vehicle world-wide. Manufacturers that used Hitag2 in their RKE system include Alfa Romeo, Peugeot, Lancia, Opel, Renault, and Ford among others. In this keynote talk, we will present the results of [4] and put them in into a broader context by revisiting the history of attacks on RKE systems and automotive electronics.","PeriodicalId":130056,"journal":{"name":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Workshop on Trustworthy Embedded Devices","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2995289.2995297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Modern vehicles rely on a variety of electronic systems and components. One of those components is the vehicle key. Today, a key typically implements at least three functions: mechanical locking with a key blade, the electronic immobilizer to autorise the start of the engine, and the remote keyless entry (RKE) system that allows to wirelessly (un)lock the doors and disable the alarm system. These main components of a vehicle key are shown in Figure 1. For the mechanical part of the vehicle key, it is well known that the key blade can be easily copied and that the locking cylinder can be bypassed with other means (using so-called "decoders" or simply a screwdriver). In contrast, immobilizer and RKE rely on wireless protocols to cryptographically authenticate the vehicle key to the car. Immobilizers employ radio frequency identification (RFID) transponders to carry out a challenge-response protocol over a low-range bidirectional link at a frequency of 125 kHz. In the past, researchers have revealed severe aws in the cryptography and protocols used by immobilizers, leading to the break of the major systems Megamos, Hitag2, and DST40 [7, 6, 1]. In contrast to the immobilizer, the RKE part uses unidirectional communication (the vehicle only receives, the key fob only transmits) over a high-range wireless link with operating distances of tens to one hundred meters. These systems are based on rolling codes, which essentially transmit a counter (that is incremented on each button press) in a cryptographically authenticated manner. Until recently, the security of automotive RKE had been scrutinized to a lesser degree than that of immobilizers, even though vulnerabilities in similar systems have been known since 2008 with the attacks on KeeLoq [3]. Other results reported in the literature include an analytical attack on a single, outdated vehicle [2] and the so-called "RollJam" technique [5], which is based on a combination of replay and selective jamming. In 2016, it was shown that severe aws exist in the RKE systems of major automotive manufacturers [4]. On the one hand, the VWgroup (Volkswagen, Seat, Skoda, Audi) based the security of their RKE system on a few global cryptographic keys, potentially affecting hundreds of million vehicles world-wide. By extracting these global keys from the firmware of electronic controls units (ECUs) once, an adversary is able to create a duplicate of the owner's RKE fob by eavesdropping a single rolling code. The second case study in [4] exposes new cryptographic weaknesses in the Hitag2 cipher when used for RKE. Applying a correlation-based attack, an adversary can recover the 48-bit cryptographic key by eavesdropping four to eight rolling codes and performing a one-minute computation on a standard laptop. Again, this attack affects millions of vehicle world-wide. Manufacturers that used Hitag2 in their RKE system include Alfa Romeo, Peugeot, Lancia, Opel, Renault, and Ford among others. In this keynote talk, we will present the results of [4] and put them in into a broader context by revisiting the history of attacks on RKE systems and automotive electronics.
汽车远程无钥匙进入系统的无线攻击
现代车辆依靠各种各样的电子系统和元件。其中一个部件是车辆钥匙。如今,一把钥匙通常至少具有三种功能:带钥匙刀片的机械锁定、自动启动发动机的电子防盗器,以及远程无钥匙进入(RKE)系统,该系统可以无线(un)锁门并禁用警报系统。车辆钥匙的这些主要部件如图1所示。对于车辆钥匙的机械部分,众所周知,钥匙刀片可以很容易地复制,锁定气缸可以通过其他手段绕过(使用所谓的“解码器”或简单的螺丝刀)。相比之下,immobilizer和RKE依靠无线协议对车辆密钥进行加密认证。固定装置采用射频识别(RFID)应答器,在125 kHz的低范围双向链路上执行挑战响应协议。在过去,研究人员已经揭示了锁定者使用的密码和协议中的严重规律,导致主要系统Megamos, Hitag2和DST40被攻破[7,6,1]。与锁止器相比,RKE部分使用单向通信(车辆只接收,密钥卡只发送),通过远距离无线链路,操作距离为几十到一百米。这些系统基于滚动代码,其本质上是以加密身份验证的方式传输计数器(每次按下按钮增加)。直到最近,尽管自2008年KeeLoq攻击以来已经知道了类似系统的漏洞,但对汽车RKE的安全性的审查程度低于固定装置[3]。文献中报道的其他结果包括对单个过时车辆的分析攻击[2]和所谓的“RollJam”技术[5],该技术基于重播和选择性干扰的结合。2016年的研究表明,各大汽车制造商的RKE系统存在严重的法律问题[4]。一方面,大众(Volkswagen)、西雅特(Seat)、斯柯达(Skoda)、奥迪(Audi)等大众集团将其RKE系统的安全性建立在几个全球加密密钥上,这可能会影响全球数亿辆汽车。通过一次从电子控制单元(ecu)的固件中提取这些全局密钥,攻击者能够通过窃听单个滚动代码来创建所有者RKE密钥卡的副本。[4]中的第二个案例研究暴露了用于RKE时Hitag2密码的新加密弱点。应用基于相关性的攻击,攻击者可以通过窃听4到8个滚动代码并在标准笔记本电脑上执行一分钟的计算来恢复48位加密密钥。同样,这种攻击影响了全球数百万辆汽车。在其RKE系统中使用Hitag2的制造商包括阿尔法罗密欧、标致、蓝旗亚、欧宝、雷诺和福特等。在这次主题演讲中,我们将展示[4]的结果,并通过回顾对RKE系统和汽车电子设备的攻击历史,将它们置于更广泛的背景下。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信