Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • August 4, 2016
    Jeep hackers return to remotely hack Cherokee’s digital systems
    Just a year after they caused Chrysler to recall 1.4 million Jeep Cherokee vehicles after showing how they could remotely hijack a jeep’s digital systems over the internet, Charlie Miller and Chris Valasek are back to show how it could get worse. In the 2015 attack, they first toyed with the vehicle’s air conditioning, entertainment system and windscreen wipers, before cutting the transmission and causing the jeep to slowly come to a halt. At the Black Hat USA 2016 conference this week the two automot
  • February 3, 2012
    Cooperative infrastructure systems waiting for the go ahead
    Despite much research and technological promise, progress towards cooperative infrastructure system deployment is still slow. Here, Robert Cone and John Miles take a considered look at how and when it might come about. From a systems engineering viewpoint it looks logical and inevitable that vehicles should be communicating between themselves and with the road infrastructure. But seen from a business viewpoint the case is not proven.
  • February 29, 2016
    Will driverless cars increase reliance on roads?
    Researchers warn that driverless vehicles could intensify car use, reducing or even eliminating promised energy savings and environmental benefits. Development of autonomous driving systems has accelerated rapidly since the unveiling of Google’s driverless car in 2012, and energy efficiency due to improved traffic flow has been touted as one of the technology’s key advantages. However, new research by scientists from the University of Leeds, University of Washington and Oak Ridge National Laboratory,
  • June 10, 2015
    EVR and how best to do it
    Kapsch TrafficCom’s Christoph Amlacher explains that the key to successful Electronic Vehicle Registration is to consider a deployment in its entirety — including enforcement. Electronic Vehicle Registration (EVR) shares much in common with large-scale city congestion charging, in that its benefits are numerous and obvious, and it has been a topic of lively discussion for a decade and more. Despite such manifest advantages and widespread interest, this has failed to translate into numerous large-scale deplo