My other car is your car: compromising the Tesla Model X keyless entry system
نویسندگان
چکیده
This paper documents a practical security evaluation of the Tesla Model X keyless entry system. In contrast to other works, system analysed in this employs secure symmetric-key and public-key cryptographic primitives implemented by Common Criteria certified Secure Element. We document internal workings system, covering key fob, body control module pairing protocol. Additionally, we detail our reverse engineering techniques several issues. The identified issues fob firmware update mechanism protocol allow us bypass all measures put place. To demonstrate impact research develop fully remote Proof-of-Concept attack that allows gain access vehicle’s interior matter minutes pair modified allowing drive off. Our is not relay attack, as new start car anytime anywhere. Finally, provide an analysis performed mitigate findings. work highlights how increased complexity connectivity vehicular systems can result larger easier exploit surface.
منابع مشابه
A Novel Method for Identifiying the Keyless Authentication Entry System using Mobile for Auto Mobiles (CAR)
Mobile technology plays a vital role in modern era. In the emerging trend of speech technologies, speech/non-speech detection is an unsolved problem, which affects numerous speech related applications. One of the major reasons for these thefts is the unauthenticated access to the car doors and engine. Recently the Remote keyless system emerged for users to operate their cars without keys. For i...
متن کاملOne Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited
Since 2006, many papers were devoted to the analysis of the security of the Hitag-2 algorithm in the context of vehicles access control. While this algorithm was proven to be cryptographically broken, it is still in use in the car industry. Recently, new vulnerabilities regarding Hitag-2 based Remote Keyless Entry systems have been exposed, leading to the design of an attack allowing to unlock ...
متن کاملWho Killed My Parked Car?
We find that the conventional belief of vehicle cyber attacks and their defenses—attacks are feasible and thus defenses are required only when the vehicle’s ignition is turned on—does not hold. We verify this fact by discovering and applying two new practical and important attacks: battery-drain and Denial-of-Body-control (DoB). The former can drain the vehicle battery while the latter can prev...
متن کاملMy Car Is Smarter Than Your Building: Building Controls in an Era of High-Performance Buildings
To meet the dual challenges of climate change and peak oil, high-performance (lowenergy) buildings must be the rule rather than the exception. Typical buildings today frequently do not deliver the energy performance predicted by designers or desired by the owner. One of the primary reasons for this failure to perform is that building control systems are not designed, installed and/or operated a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2021
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2021.i4.149-172