Fast, Furious and Insecure
Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs and Bart Preneel Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs and Bart Preneel
COSIC
an imec research group at KU Leuven
COSIC Ashur, Benedikt Gierlichs and Bart Preneel an imec research - - PowerPoint PPT Presentation
Fast, Furious and Insecure Lennert Wouters , Eduard Marin, Tomer COSIC Ashur, Benedikt Gierlichs and Bart Preneel an imec research group at KU Leuven Lennert Wouters , Eduard Marin, Tomer Ashur, Benedikt Gierlichs and Bart Preneel Passive
Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs and Bart Preneel Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs and Bart Preneel
an imec research group at KU Leuven
COSIC
2
COSIC
3
TI TMS37F128 (X-Ray) MSP430 (MCU) TMS37126 (transponder) SPI PCB front PCB back UHF antenna 3D LF antenna MicRF112 transmitter IC
COSIC
4
Source: http://www.ti.com/lit/ds/symlink/tms37f128.pdf
COSIC
5
COSIC
Slave Master
6
COSIC
7
Source: http://www.ti.com/lit/an/spna147/spna147.pdf
COSIC
period
correct number of bytes (LEN) has been sent
8
COSIC
Action LEN CMD WA DST40(C, K1) 0x06 0x84 NA DST_UNK(C, K1) 0x06 0x85 NA DST40(C, K2) 0x06 0x86 NA DST_UNK(C, K2) 0x06 0x87 NA Change K1 0x07 0x01 0x11 Change K2 0x07 0x01 0x12
9
COSIC
10
COSIC
11
More info: POC||GTFO 0x11: A TOURIST'S GUIDE TO MSP430
COSIC
12
COSIC
13
COSIC
14
Key schedule is executed every 3rd round starting in the 2nd Challenge register Key register
COSIC
15
COSIC
16
COSIC
17
COSIC
18
COSIC
19
COSIC
20
COSIC
21
COSIC
23
COSIC
24
COSIC
25
Yard Stick One (UHF) Proxmark 3 (LF)
COSIC
26
COSIC
challenge response pair
28
COSIC
29
COSIC
30
COSIC
as long as the car ID is correct
31
challenge = 0x636f736963 for key in range (0, 240): response = DST40(challenge, key) responseFile.append(key)
COSIC
32
for key in TMTO_File: resp = DST40(challenge2, key) if resp == response2: return key
COSIC
33
COSIC
34
COSIC
35
COSIC
36
COSIC
38 Source: https://cars.mclaren.com/ownership/recalls-1
COSIC
“We have been alerted to a potential new security risk that may affect McLaren as well as the products of several other luxury automotive brands. The “relay attack” that has previously been reported in the media suggested that a car key could be scanned if left within range of the vehicle and the car driven
39
Source: https://cars.mclaren.com/ownership/recalls-1
COSIC
“A second potential method involves the vehicle being scanned by custom equipment left in close-proximity and decoded in ~100 days. A cloned key can be produced as above.” To reassure you, the method is currently considered as a low-risk by experts because the custom equipment required for such a breach, while feasible, requires skilled assembly and use.”
40
Source: https://cars.mclaren.com/ownership/recalls-1
COSIC
“The equipment also needs to be in very close proximity to a key. To further reassure you, the vulnerability has not been proven to affect our vehicles and we know of no McLaren that has been compromised in such a way.”
41
Source: https://cars.mclaren.com/ownership/recalls-1
COSIC
42
Source: https://cars.mclaren.com/ownership/recalls-1
COSIC
43
COSIC
44
COSIC
45
COSIC
46
COSIC
an imec research group at
47
@LennertWo @CosicBe lennert.wouters@esat.kuleuven.be