Author Topic: "Relay Attack" device for auto theft  (Read 2251 times)

0 Members and 1 Guest are viewing this topic.

Offline Homer J SimpsonTopic starter

  • Super Contributor
  • ***
  • Posts: 1240
  • Country: us
« Last Edit: December 11, 2016, 12:03:14 am by Homer J Simpson »
 
The following users thanked this post: SeanB

Online Halcyon

  • Global Moderator
  • *****
  • Posts: 6071
  • Country: au
Re: "Relay Attack" device for auto theft
« Reply #1 on: December 12, 2016, 10:04:25 am »
The crooks are getting crafty. Thankfully the "relay" attack has been known about for quite a number of years. Vulnerable cars are the ones with "keyless entry" where you touch the handle or push a button, the car itself initiates challenge-response authentication sequence with the nearby paired key and unlocks the doors/starts the engine. You'll find a lot of the vulnerable vehicles are in the low-to-mid range market (Nissan, Subaru, Hyundai etc...) although a lot of the Audi's were also vulnerable.

Cars like Volvo and Mercedes don't seem to be vulnerable. In a Volvo the key fob is inserted into a slot or kept very close to the receiver, such as in the drivers pocket. If the car can't detect the key, it's game over, but that's assuming you were even able to get into the car in the first place. Mercedes seem to use a infrared communications system between the car and key once it's inserted into the key barrel (to get into the car, it's RF).

Those vehicles which use a simple encrypted or rolling code from the key fob to the car aren't vulnerable to this type of attack either.

It also relies on the vehicle owner to keep their keys fairly close to the outside of the house (where a thief can get within a fairly close range, albeit a wall separating them). You'll find many people simply leave their keys at the front door, it's probably easier to break into the house and steal the keys.
 

Offline PointyOintment

  • Frequent Contributor
  • **
  • Posts: 327
  • Country: ca
  • ↑ I scanned my face
Re: "Relay Attack" device for auto theft
« Reply #2 on: December 15, 2016, 08:42:35 pm »
I don't feel like clicking on things right now, so I'm going to guess that this the same thing they were doing a few years ago, namely using a radio repeater to increase the signal strength so that the car thinks the key is nearby and unlocks. IIRC, the automakers quickly remedied that vulnerability by switching from signal strength to time-of-flight, so that they key actually has to be near the vehicle (or the thieves have to make the signal travel faster than the laws of physics allow) for it to unlock. Cars made before the switch to ToF are presumably still vulnerable—I haven't heard of any recalls to upgrade the keyless entry systems.
I refuse to use AD's LTspice or any other "free" software whose license agreement prohibits benchmarking it (which implies it's really bad) or publicly disclosing the existence of the agreement. Fortunately, I haven't agreed to that one, and those terms are public already.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf