RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems

Author:

Csikor Levente1ORCID,Lim Hoon Wei2ORCID,Wong Jun Wen3ORCID,Ramesh Soundarya4ORCID,Parameswarath Rohini Poolat5ORCID,Chan Mun Choon4ORCID

Affiliation:

1. Institute for Infocomm Research (I2R), A*STAR, Singapore

2. NCS Group, Singapore

3. DSBJ Pte. Ltd., Singapore

4. School of Computing, National University of Singapore, Singapore

5. Department of Electrical and Computer Engineering, College of Design and Engineering, National University of Singapore, Singapore

Abstract

Automotive Keyless Entry (RKE) systems provide car owners with a degree of convenience, allowing them to lock and unlock their car without using a mechanical key. Today’s RKE systems implement disposable rolling codes, making every key fob button press unique, effectively preventing simple replay attacks. However, a prior attack called RollJam was proven to break all rolling code–based systems in general. By a careful sequence of signal jamming, capturing, and replaying, an attacker can become aware of the subsequent valid unlock signal that has not been used yet. RollJam, however, requires continuous deployment indefinitely until it is exploited. Otherwise, the captured signals become invalid if the key fob is used again without RollJam in place. We introduce RollBack, a new replay-and-resynchronize attack against most of today’s RKE systems. In particular, we show that even though the one-time code becomes invalid in rolling code systems, replaying a few previously captured signals consecutively can trigger a rollback-like mechanism in the RKE system. Put differently, the rolling codes become resynchronized back to a previous code used in the past from where all subsequent yet already used signals work again. Moreover, the victim can still use the key fob without noticing any difference before and after the attack. Unlike RollJam, RollBack does not necessitate jamming at all. In fact, it requires signal capturing only once and can be exploited at any time in the future as many times as desired. This time-agnostic property is particularly attractive to attackers, especially in car-sharing/renting scenarios in which accessing the key fob is straightforward. However, while RollJam defeats virtually any rolling code–based system, vehicles might have additional anti-theft measures against malfunctioning key fobs, hence against RollBack. Our ongoing analysis (with crowd-sourced data) against different vehicle makes and models has revealed that ∼ 50% of the examined vehicles in the Asian region are vulnerable to RollBack, whereas the impact tends to be smaller in other regions, such as Europe and North America.

Funder

National University of Singapore

NCS Group

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference46 articles.

1. A Practical Attack on KeeLoq

2. Honda key fob hack could leave all vehicle models since 2012 vulnerable: reports;Barrabi Thomas;New York Post [Online],2022

3. Andrey Bogdanov. 2007. Attacks on the KeeLoq Block Cipher and Authentication Systems. (2007) 13 pages.

4. Bosch. 2022. Electronic Power Steering (EPS). https://bit.ly/2ZJNI7k Accessed: July 2022.

5. RollBack — A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems;Csikor Levente;Presentation at BlackHat,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3