Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • March 31, 2017
    Cybersecurity in the connected car
    A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
  • February 3, 2012
    Connecting people and mobility
    Stéphane Petti, Business Development Manager - Automotive, at Orange Business Services' International M2M Center, says that the ITS industry can no longer afford to ignore the telecommunications industry's role in connecting people and mobility services. To telephone companies (telcos), the Machine-to-Machine (M2M) sector is nothing new. Worldwide, they have been focusing considerable attention on M2M in all its sub-segments for several years now. It is the migration of M2M from fixed to wireless connectivi
  • October 26, 2012
    Heathrow set to trial electric vehicles
    London’s Heathrow airport is to trial a fleet of electric vehicles, including the Nissan LEAF, Peugeot iOn, Vauxhall Ampera and the Renault Kangoo ZE, to test the viability of electric power-trains used in the highly demanding context of daily airport operations. Heathrow Airport, which supports a potential switch to zero-emission ground based vehicles, British Airways, LSG SkyChefs and Gate Gourmet will be using the electric vehicles within their normal fleet to better understand the suitability or otherwi
  • November 3, 2014
    CARTES examines the pros and cons of Bitcoin
    Money is changing. Despite some widely-publicised recent problems, the Bitcoin system is now worth around €7 billion ($8.9 billion) and other ‘crypto-currencies’ such as Ripple are gaining momentum. The success of these pioneers shows that customers are increasingly ready to consider payment systems that are different from traditional dollars, euros and yen.