Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Gone in 360 Seconds: Hijacking with Hitag2->

Submitted by Anonymous Coward
An anonymous reader writes "In this paper, we show a number of vulnerabilities in the Hitag2 transponders that enable an adversary to retrieve the secret key. We propose three attacks that extract the secret key under different scenarios. We have implemen- ted and successfully executed these attacks in practice on more than 20 vehicles of various make and model. On all these vehicles we were able to use an emulating device to bypass the immobilizer and start the vehicle."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Gone in 360 Seconds: Hijacking with Hitag2

Comments Filter:

No line available at 300 baud.

Working...