Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • January 20, 2012
    Sound synthesis makes hybrid and electric vehicles safer
    The growing popularity of hybrids and electric vehicles gives rise to new safety issues in urban environments, as many of the aural cues associated with engine noise can be missing. The solution is to intelligently make vehicles noisier. The rise in popularity of hybrids and Electric Vehicles (EVs) is a result of environmental pressures, shifts in taxation and emerging technologies for batteries and motors. Competition among the car manufacturers means these vehicles need to be cost effective to buy and ope
  • January 14, 2016
    Autonomous car data released
    California’s Autonomous Vehicle Testing Regulations require every manufacturer authorised to test autonomous vehicles (AV) on public roads to submit an annual report summarising the disengagements, or deactivation of the autonomous mode, of the technology during testing. Eleven manufacturers are currently testing autonomous vehicles on the state’s roads, seven of which (VW/Audi, Mercedes Benz, Google, Delphi Automotive, Tesla Motors, Bosch, and Nissan) were required to submit their first disengagement re
  • June 8, 2018
    SafeRide and Irdeto partner on cybersecurity for C/AVs
    Cybersecurity company SafeRide Technologies Ltd and Dutch firm Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks. Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehi
  • August 8, 2016
    France gives the go ahead for autonomous vehicle testing
    The French government has given the go ahead for autonomous vehicle testing on public roads as part of its ‘New Industrial France’ plan to rejuvenate industry in the country. It sees autonomous vehicles as the future of the automotive industry, saying they are an indispensable step towards making mobility, regulation and security of traffic and transport more efficient and more environmentally friendly. The government also views autonomous cars as a way to improve road safety, saying that the cars sh