keyless systems of many vw group cars can be hacked: researchers - car immobilizer

by:Kingcobra     2019-11-18
keyless systems of many vw group cars can be hacked: researchers  -  car immobilizer
FRANKFURT (Reuters)-
Tens of millions of vehicles sold by mass companies (VOWG_p. DE)
According to European researchers, in the past 20 years, as well as some current models, it is easy to be stolen because keyless access systems can be hacked using cheap technical equipment.
Computer security experts at the University of Birmingham published a paper outlining how drivers can clone Volkswagen's remote keyless access control system by tapping when they press key fobs to turn on or lock the car.
The researchers say vulnerable vehicles include most Audi, Volkswagen, Seat and Skoda models sold since 1995, and about 100 million Volkswagen Group vehicles on the road since then.
They said the flaw appeared in the Audi Q3 model in 2016.
"It is conceivable that the mass group (
Except for some Audi)
Cars made in the past and today depend in part on "constant"
"The key' plan is therefore vulnerable," the newspaper said . ".
The only exception is the car produced on Volkswagen's latest MQB production platform, which is used in its best-selling model, Golf VII, which researchers have found to be defect-free.
"There are still some Volkswagen models on sale that are not on the latest platform and are still vulnerable to attack," Flavio Garcia, co-
The author of the report and a senior lecturer in computer security at the University of Birmingham told Reuters.
A spokesman for the public said that the current golf, touguan, Touan and Passat models are not at risk of attack.
Volkswagen spokesman Peter Weisheit said in a statement: "The current generation of cars has not been plagued by the problems described . " He did not comment on the risks of other models.
In their paper, the researchers did not identify auto parts subcontractors who manufacture affected keyless systems for the general public and potential other automakers.
Volkswagen declined to comment on its supplier relationship. Garcia and co-
Writer David Oswald, also a lecturer at the University of Birmingham, plans to publish their paper at the Usenix security conference in Austin, Texas, on Friday.
These disclosures are the biggest car manufacturers in Europe trying to overcome their biggest
After the company admitted to manipulating diesel emissions tests in about 11 million cars around the world, the company has been in constant scandal.
Attackers can use cheap and widely available tools to obtain radio signals, according to three researchers at the University of Birmingham in central England and the fourth German Kasper & Oswald GmbH security adviser.
Other manufacturers may also have these defects in their cars, including some of Ford's model years (F. N)
The researchers said the Milky Way.
"We are aware of this security gap and have incorporated this knowledge into the enhancements of existing and future systems.
"We are no longer using the said system in any new car," Ford European spokesman John Gardner said . ".
The authors of the report say they are concerned about the public.
No detailed analysis of Volkswagen luxury brands including Porsche, Bentley, Lamborghini and Bugatti.
They disclosed their findings to the Volkswagen group for the first time in November, and met with the company and participating subcontractors on February, and said that Volkswagen had acknowledged the loopholes. The Wolfsburg-
The US-based automaker confirmed that it had engaged in constructive communication with researchers and that the authors agreed to hide details in their reports that savvy criminals could use to break into cars.
In 2013, the public received a restraining order from a group of researchers, including Garcia, to prevent the publication of a detailed description of certain objections.
Car theft is vulnerable to hacking.
The study was published in 2015, when the author agreed that the public would remove a detail that would allow the thief to figure out how to carry out the attack.
Garcia, Osvald, and their colleagues.
The author also describes the second attack that can be used to attack Hitag2 (HT2)
Remote keyless access systems used in older models of other automakers, running on circuits produced in the Netherlands
NXP, US chip manufacturer (NXPI. O).
A nxp spokesman said that the first HT2 chip launched in 1998 since 2006 has gradually been replaced by a car manufacturer who suggested that they replace the HT2 chip in a new car because of the 2012 reported in 2009.
Custom message
Chat Online 编辑模式下无法使用
Chat Online inputting...