Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Gone in 360 Seconds: Hijacking with Hitag2 (bham.ac.uk)

An anonymous reader writes: In this paper, we show a number of vulnerabilities in the Hitag2 transponders that enable an adversary to retrieve the secret key. We propose three attacks that extract the secret key under different scenarios. We have implemen- ted and successfully executed these attacks in practice on more than 20 vehicles of various make and model. On all these vehicles we were able to use an emulating device to bypass the immobilizer and start the vehicle.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Gone in 360 Seconds: Hijacking with Hitag2

Comments Filter:

The longer the title, the less important the job.

Working...