Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Gone in 360 Seconds: Hijacking with Hitag2 (bham.ac.uk)

An anonymous reader writes: In this paper, we show a number of vulnerabilities in the Hitag2 transponders that enable an adversary to retrieve the secret key. We propose three attacks that extract the secret key under different scenarios. We have implemen- ted and successfully executed these attacks in practice on more than 20 vehicles of various make and model. On all these vehicles we were able to use an emulating device to bypass the immobilizer and start the vehicle.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Gone in 360 Seconds: Hijacking with Hitag2

Comments Filter:

"This is lemma 1.1. We start a new chapter so the numbers all go back to one." -- Prof. Seager, C&O 351

Working...