car security remote keyless entry and go
play

Car security: remote keyless entry and go Dick Visser and Jarno van - PowerPoint PPT Presentation

Introduction Theory Results Conclusion Car security: remote keyless entry and go Dick Visser and Jarno van de Moosdijk June 2009 Dick Visser and Jarno van de Moosdijk Car security: remote keyless entry and go Introduction


  1. Introduction Theory Results Conclusion Car security: remote keyless “entry and go” Dick Visser and Jarno van de Moosdijk June 2009 Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  2. Introduction Theory Results Conclusion Mechanical key . ◮ Ignition locks since 1919 ◮ Door locks since late 1920s ◮ RFID immobiliser since 1993 . Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  3. Introduction Theory Results . Conclusion Remote keyless entry (RKE) ◮ Remote control for doors ◮ Since 1983 ◮ 315 / 433.92 / 868 MHz ◮ Keys have to be associated to the car ◮ Encryption . ◮ KeeLoq cipher Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  4. Introduction Theory Results Conclusion . Passive keyless entry (PKE) ◮ Doors open/close without user intervention ◮ Since 1990 ◮ Same frequencies ◮ Same encryption ◮ Often combined with “keyless go” . Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  5. Introduction Theory Results Conclusion . Future systems ◮ Lots of development ◮ Mostly flashy concept car stuff ◮ Integration is the “key” . ◮ Payment systems, multimedia, user prefs Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  6. Introduction Theory Results Conclusion Research questions ◮ What requirements should RKE/PKE adhere to? ◮ Which systems are available and do they meet these requirements? Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  7. Introduction Theory Results Conclusion Research questions ◮ What requirements should RKE/PKE adhere to? ◮ Which systems are available and do they meet these requirements? ◮ What requirements should the key order procedure adhere to? ◮ What are current order procedures and do they meet these requirements? Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  8. Introduction Theory Results Conclusion Method ◮ Defining requirements & threats analysis ◮ Interviewing car dealers, importers, key manufacturers ◮ Examining car key fobs ◮ Assessing current systems and procedures Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  9. Introduction Theory Results Conclusion System architecture Parts of the car access process Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  10. Introduction Theory Results Conclusion System architecture Parts of the new/spare key order procedure Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  11. Introduction Theory Results Conclusion CIA Triad Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  12. Introduction Theory Results Conclusion STRIDE threat model (Microsoft) ◮ S poofing identity ◮ T ampering with data ◮ R epudiation ◮ I nformation disclosure ◮ D enial of service ◮ E levation of privilege Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  13. Introduction Theory Results Conclusion CIA vs STRIDE y y y t t n t i i y o l i l a r i t i y b g i t i c t t a a e i n i l t s t t i e n i n b n r d i u e o a fi o h h l a i n a c t t t u u a o c v D C A A A A S poofing identity ✓ T ampering with data ✓ R epudiation ✓ I nformation disclosure ✓ D enial of service ✓ E levation of privilege ✓ Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  14. Introduction Theory Results Conclusion Threat demo Real world DoS demo Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  15. Introduction Theory Results Conclusion Establishing requirement sets Apply CIA/STRIDE to car access procedure items Examples: ◮ Key/car should use authentication (S car/key) ◮ Cars should log all lock status changes (R - car) ◮ Key-car communication should not leak information (I - medium) Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  16. Introduction Theory Results Conclusion Establishing requirement sets Applied CIA/STRIDE to key order procedure Examples: ◮ Keys should be shipped to static address (S) ◮ Four-eye principle (R) ◮ Online key learning (R,E) Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  17. Introduction Theory Results Conclusion Highlights General: ◮ Huge amount of different systems (brand/model/version/year...) ◮ Smaller set of chipset manufacturers ◮ Kerckhoffs‘ principle is used by no one Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  18. Introduction Theory Results Conclusion Highlights ”If everything, except the key, is known, a car would become unsecure very soon due to the fast growing computing power of IT technology compared to automotive technology and their life cycle.” Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  19. Introduction Theory Results Conclusion Highlights General: ◮ Huge amount of different systems (brand/model/version/year...) ◮ Smaller set of chipset manufacturers ◮ Kerckhoffs‘ principle is used by no one ◮ Investigating order procedures was less problematic Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  20. Introduction Theory Results Conclusion Highlights Car access process: ◮ All use proprietary black box systems ◮ No one uses key authentication/authorisation ◮ Majority of ECUs do not log which key changed lock status Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  21. Introduction Theory Results Conclusion Highlights Key order/learning procedure: ◮ All dealers require ID + proof of ownership ◮ None of them use four-eye principle ◮ Only few brands use online learning/logging ◮ Third party key manufacturers all use plain text HTTP Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  22. Introduction Theory Results Conclusion Recommendations 1. Car industry should honour Kerckhoffs‘ principle 2. Keys should use authentication 3. Cars and keys should use logging 4. All manufacturers should use online learning/logging 5. Third parties should use HTTPS Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  23. Introduction Theory Results Conclusion Further research 1. Relay attack PoC 2. Security certification 3. Cryptanalysis/reverse engineering 4. DoS/User awareness test Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

  24. Introduction Theory Results Conclusion Questions? Dick Visser and Jarno van de Moosdijk Car security: remote keyless “entry and go”

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend