Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Gone in 360 Seconds: Hijacking with Hitag2 (bham.ac.uk)

An anonymous reader writes: In this paper, we show a number of vulnerabilities in the Hitag2 transponders that enable an adversary to retrieve the secret key. We propose three attacks that extract the secret key under different scenarios. We have implemen- ted and successfully executed these attacks in practice on more than 20 vehicles of various make and model. On all these vehicles we were able to use an emulating device to bypass the immobilizer and start the vehicle.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Gone in 360 Seconds: Hijacking with Hitag2

Comments Filter:

Established technology tends to persist in the face of new technology. -- G. Blaauw, one of the designers of System 360

Working...