Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - Gone in 360 Seconds: Hijacking with Hitag2 (bham.ac.uk)

An anonymous reader writes: In this paper, we show a number of vulnerabilities in the Hitag2 transponders that enable an adversary to retrieve the secret key. We propose three attacks that extract the secret key under different scenarios. We have implemen- ted and successfully executed these attacks in practice on more than 20 vehicles of various make and model. On all these vehicles we were able to use an emulating device to bypass the immobilizer and start the vehicle.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Gone in 360 Seconds: Hijacking with Hitag2

Comments Filter:

It is not for me to attempt to fathom the inscrutable workings of Providence. -- The Earl of Birkenhead

Working...