Skip to main content

Millions of cars at risk due to flaw in keyless entry systems, say researchers

Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key
August 15, 2016 Read time: 3 mins
Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models.

The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods.

Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key fob and then employ those signals to clone the key.

Though most automotive immobiliser systems have been shown to be insecure in the last few years, the security of remote keyless entry systems to lock and unlock a car based on rolling codes has received less attention.

The team, Flavio D. Garcia, David Oswald and Pierre Pavlidès, from the School of Computer Science at the University of Birmingham and Timo Kasper of Kasper & Oswald, found that the security of the keyless entry systems of most VW Group vehicles manufactured between 1995 and today relies on a few global master keys.  

By recovering the cryptographic algorithms and keys from electronic control units, a thief would be able to clone a VW Group remote control and gain unauthorised access to a wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Škoda, by eavesdropping a single signal sent by the original remote.

A second case study outlines an attack that could affect millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel/Vauxhall, Renault, and Peugeot.

The researchers devised a correlation-based attack on Hitag2, which allows recovery of the cryptographic key and thus cloning of the remote control with four to eight rolling codes and a few minutes of computation on a laptop.

Oswald explained, “You only need to eavesdrop once. From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want. Manufacturers really need to take heed and review their security systems.”

Garcia added, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change. Unfortunately the fix won’t be easy, as there is quite a slow software development cycle, new designs will be quite a long time in the making.”

The researchers suggest that car owners with affected vehicles avoid leaving any valuables in their car, and consider giving up on wireless key fobs altogether and open and lock their car doors the ‘old-fashioned’, mechanical way.

Related Content

  • November 27, 2015
    Car-sharing operators move to smartphone-based car access systems
    New analysis from Frost & Sullivan, Strategic Analysis of the Vehicle-sharing Technologies Market, finds that the global car-sharing user base will reach 26 million members by 2020. Car-sharing operators (CSOs) in North America will lead the way in terms of technology deployments, followed by Europe. To meet the growing demand, partnerships among CSOs, technology companies and original equipment manufacturers will gather pace. Over the years, vehicle-sharing technologies have evolved from simple manual
  • March 1, 2013
    Connected Car offers plug-and-play remote vehicle access
    Connected Car, Delphi’s plug-and-play connectivity device, connects into an OBDII port on any vehicle sold in the US from 1996 onwards and allows consumers to quickly lock and unlock their vehicle’s doors, as well as locate, track and even monitor their vehicles through a smartphone app or the internet. Delphi has teamed up with Verizon Wireless to ensure data transmitted through the device and via the internet remains secure and encrypted, allowing users to safely lock their vehicles remotely, track their
  • January 30, 2012
    In-vehicle systems as enforcement enablers?
    From an enforcement perspective at least, Toyota's recent recalls over problems with accelerator pedal assemblies had a positive outcome in that for the first time a major motor manufacturer outside of the US acknowledged publicly what many have known or suspected for quite a while: that the capability exists within certain car companies to extract data from a vehicle onboard unit which can be used to help ascertain, if not prove outright, just what was happening in the vital seconds up to an accident or cr
  • August 5, 2016
    Michigan researchers show how easy it is to hack trucks
    Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across