Kamkar explains that it's the companies that make the keyless entry computer chips, not the automakers themselves, that have ignored this vulnerability for so long. The problem is no one has really demonstrated it, which is funny because the solution to this problem has been known about for more than 20 years online and has been written about many times, but again no one has demonstrated it." This is not by any means brand new or a big surprise. "This has been sort of a theoretical attack for many, many years. But as he explained to TechInsider, it's nothing new: Kamkar hasn't given away all the details of the device-he's saving that for a talk on Friday at the Defcon hacking convention in Las Vegas. You can see a photo of the device over at TechInsider. #Defcon powersports codeThe car is unlocked, but the device has a stolen second code that never reached the car-one that can be used at a later date by the bad guys to unlock the car. The RollJam device records the second code, and sends the first code to the car. Since the car hasn't unlocked, the owner pushes the Unlock button a second time. When the owner pushes the remote unlock button, the device detects the remote signal and jams it, preventing the car from hearing the signal. Named RollJam, the wallet-sized gizmo can be hidden on or underneath the target car. That's where Kamkar's little device comes in. While a single code can't be used twice, if a code never reaches the car in the first place, it's still valid. Most remote garage door openers operate on the same principle.īut there's a catch: Most automakers don't set an expiration date for the previously-used codes. This is meant to prevent bad guys from copying the remote's code to create a dummy remote. Most remotes use rolling codes to communicate with the car-meaning that the remote sends a different coded signal every time you push the button. Now, he's showing off something even more sinister: A $30 device that can copy the coded signal from just about any car's remote key fob, allowing him to lock or unlock the car at whim.Īs TechInsider reports, Kamkar's latest toy takes advantage of a rather old vulnerability in car keyless entry systems. Last week, he revealed a homebuilt device that can intercept signals from the OnStar smartphone app to track, unlock, and remote-start a car connected to the app. Digital security research Samy Kamkar has been on a car-hacking kick lately.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |