Researchers reveal electronic car lock hack after 2-year injunction by Volkswagen

HAL 9000

Honorary Master
Joined
May 27, 2008
Messages
17,306
Reaction score
18,885
Location
HAL Communications Corporation, Urbana, Illinois
In 2012, researchers at Radboud University in the Netherlands discovered a security flaw in a common automotive security chip used in theft prevention by Volkswagen, Audi, Fiat, Honda, and Volvo vehicles.

But after they disclosed their results to the auto manufacturers—a full nine months before they planned to publish them—the automakers sued to keep them quiet.

Today, that suppressed paper is finally being presented at the USENIX security conference in Washington, DC.

Entitled "Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer," the paper details how researchers Roel Verdult, Flavio Garcia, and Baris Ege uncovered weaknesses in the cryptography and authentication protocol used in the Megamos RFID transponder, used in car immobilizers in many luxury vehicles.

The list of impacted cars includes vehicles from Volkswagen's Porsche, Audi, Bentley, and Lamborghini brands.

There are a number of ways to bypass these systems, including the use of a radio amplifier to fool the transponder into believing the RFID chip is closer than it actually is.

But the Radboud researchers were able to go further, actually breaking the crypto system used by the Megamos transponder.

By eavesdropping on the radio exchange between the Megamos Crypto system and the key only twice, the researchers were able to dramatically reduce the size of the pool of potential matches to the system's 96-bit secret key.

Because the system allowed unlimited attempts to authenticate, Verdult, Garcia, and Ege were able to recover the secret key within "3 x 2^16" (196,607) tries with "negligible computational complexity." It all took less than 30 minutes.

Some car manufacturers used weaker keys, and the researchers were able to recover the secret key in just a few minutes with a laptop computer.


Read the full article here:

http://arstechnica.com/security/201...k-hack-after-2-year-injunction-by-volkswagen/
 
Good on the researchers - they offered 9 months for the car manufacturers to address the issue, and then get sued for their efforts?
So now that the car manufacturers have had 2 years to address the problem, what have they done?

I see a massive recall in the their future.....

But when Verdult and his colleagues brought their findings to Volkswagen and other automakers in February of 2012—again, nearly a year before any planned publication—Volkswagen filed a suit in the UK to block. Volkswagen initially won an injunction, forcing the paper to be withdrawn. But over a year of negotiations with Volkswagen after, the researchers gained permission to publish a redacted version of their paper. The edits? They deleted a single sentence from the report.
Lol :D
 
Last edited:
Bwahaha.

edit : it is probably in the manufacturer's interest to offer weak security - if the car gets stolen, then the customer will just buy a new car...
 
Great and here i was convinced that my audi will be more safe then my old citi golf
 
I wonder if using the key to lock makes a difference but then again its a hassle to get to the actual key of the Audi...
 
Great and here i was convinced that my audi will be more safe then my old citi golf

It will, think our crooks have the knowledge to do anything resembling this?I think not.They are only catching onto key jammers now...
 
I wonder if using the key to lock makes a difference but then again its a hassle to get to the actual key of the Audi...

Doesnt the small key fit inside the remote?
 
I wonder if using the key to lock makes a difference but then again its a hassle to get to the actual key of the Audi...

Shouldn't make a difference as it can probably still be unlocked via the RFID I don't think use of a physical key disengages the electronic mechanism
 
Top
Sign up to the MyBroadband newsletter