Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • December 14, 2012
    Car to car communications a step closer
    Vehicle manufacturers have targeted 2015 for the first cars to roll off European assembly lines fitted with operational V2X technology. They and their partners in the Car 2 Car Communications Consortium are confident of meeting the target, reports Jon Masters. Around three years from now vehicles should be appearing in showrooms boasting the capability of communicating with each other. Manufacturers will have started fitting the first proprietary car-to-car driver-aid safety devices and deployment of ‘vehic
  • November 10, 2017
    Keeping cyber criminals from your website
    If a hacker can penetrate your website, they can do business as you. Joe Dysart explains how you and your customers may not discover the fraud for some time. In the latest twist on identity theft, hackers are clandestinely taking over business websites - and then brazenly billing visiting customers as if the sites are their own.
  • August 8, 2017
    Asecap Days delves beneath the surface of tolling
    Colin Sowman picks his highlights from Asecap’s 45th annual Study and Information Days in Paris. European tolling association Asecap holds annual Study & Information Days, provides delegates with updates on the latest moves and thinking in the tolling sector and is a key meeting place for concessionaires from 22 countries. The importance of road transport to the French economy was highlighted by the country’s director general of transport infrastructures, François Poupard, in the opening session. He told th
  • February 18, 2013
    Oxford University develops self-driving car
    Oxford University scientists have developed a self-driving car system that can be installed in existing cars and can cope with snow, rain and other weather conditions. Developed by a team led by Professor Paul Newman at Oxford University, the new system has been installed in a Nissan Leaf electric car and tested on private roads around the university. The car will halt for pedestrians, and could take over the tedious parts of driving such as negotiating traffic jams or regular commutes. The car alerts the