Questions tagged [vehicle]

27 questions
152
votes
3 answers

Does pressing a car remote many times offer denial of service attack for rolling codes?

My understanding of remote car key fobs, and similar security devices with rolling codes, is that the key device is a transmitter that, each time the button is pressed, sends the next secret in a known sequence that is unique to the key. It does not…
Oddthinking
  • 1,767
  • 3
  • 15
  • 17
78
votes
7 answers

How to patch "keyless entry" car keys?

The German automobile club ADAC did a test with several cars which open doors and start the engine with a "keyless entry" system. You don't have to push a button on your car key. If you get near your car, key and car will recognise each other. If…
honze
  • 1,106
  • 1
  • 8
  • 19
51
votes
1 answer

Vehicle remote key security

How secure are car remote keys? When you lock or unlock your car, can someone spoof or make another remote key? How do car remote keys work? Do they use some kind of private/public keys, encryption? Are aftermarket alarm remote keys less secure than…
Guntis
  • 745
  • 2
  • 7
  • 9
43
votes
2 answers

Why don't car keys use algorithms like RFC 4226?

I've been reading a bit into car security and all of the ways cars can be stolen through various alterations of replay attacks. Upon researching whether any of the more modern cars are using anything more secure than "new code after usage", I…
25
votes
6 answers

Would a CD drive on a driverless car pose a security risk?

Hackers are smart. Could they hack a self-driving car through its CD drive? From what I understand, malicious code could be uploaded to the driverless car via CD which could give them access to brakes, windscreen wipers, sensors, etc. (all of which…
Rob Dawson
  • 1,186
  • 1
  • 12
  • 16
24
votes
6 answers

Infecting a vehicle with a virus?

Referring to the security experts who demonstrated taking control of two popular vehicle models using a laptops connected to ECUs (http://www.bbc.co.uk/news/technology-23443215), what are the possibilities that there can be malware/trojans etc.…
BrownEyes
  • 436
  • 3
  • 10
24
votes
2 answers

Hacking a car "in real life"

There are lots of papers concerning car hacking. It is often done with physical access (by the OBD interface for example), sometimes without (Remote Exploitation of an Unaltered Passenger Vehicle). The only case of exploitation I've read about is…
Shan-x
  • 441
  • 5
  • 10
11
votes
1 answer

How do rolling code fobs and receivers synchronise?

This is a follow-up question to my earlier one: Does pressing a car remote many times offer denial of service attack for rolling codes? I want to emphasize that I am asking this question more to shore up holes in my academic (mis)understanding of…
Oddthinking
  • 1,767
  • 3
  • 15
  • 17
7
votes
1 answer

Car Key Security Questions

I am wondering how car key security works. Do cars keys just send a simple "lock" and "unlock" signal that works with any car from the manufacturer or any car of the same model? Or are specific keys registered to a car and then only those keys have…
Jay Schauer
  • 225
  • 2
  • 6
6
votes
1 answer

Are OBD-II "Connected Car" products (Automatic Pro, Hum) secure?

There is an emerging class of vehicle data devices known as "Connected Car" products. Two examples are Automatic Pro and Hum, which both plug into your car's OBD-II port and are able to log info such as one's location, or even the state of the…
Mike Nielsen
  • 163
  • 3
6
votes
1 answer

Does CAN bus communication need encryption?

I'm currently researching into CAN security for in-vehicle communication. I would like to know if anyone knows a reason why the CAN payloads of an ECU communication (between CAN nodes) should be encrypted when integrity, authenticity and protection…
enigma
  • 161
  • 1
  • 3
5
votes
0 answers

Forensic investigation of a vehicle infotainment system

As far as I know most vehicle infotainment systems are run on a customized Linux system built with Yocto. Forensic toolkits such as Berla iVe allows to extract information such as GPS data, call log, door events, gear changes, etc. (see…
5
votes
4 answers

Could technical controls prevent vehicle ramming attacks?

We've just seen another attack where a vehicle was used as a weapon. My thoughts are with all those affected by the tragedy. Many people are wondering how such attacks can be stopped. It's hard for intelligence to detect: a lone terrorist, no…
paj28
  • 32,736
  • 8
  • 92
  • 130
4
votes
2 answers

Car Remote App Security

Car manufactures like BMW, Audi or Mercedes-Benz all provide mobile applications to control your car. All apps share really critical functions like remote lock/unlock or the ability to find your car based on current GPS location. Can somebody…
Youleean
  • 105
  • 1
  • 4
2
votes
1 answer

What kind of monitoring system can we have for existing security systems in the vehicles?

The vehicles are fitted with a security system to track their movements and report it back to their owners if they are moved unauthorized. My question is: can we have an additional security system or any third party system to monitor the existing…
n9exorcist
  • 49
  • 3
1
2