-
1
-
-
84859039890
-
The transport correspondent for the BBC, is recorded as stating that unless criminals can get their hands on the keys, new cars are all but impossible to steal, in Car industry declares victory in war on thieves
-
16 June
-
Richard Scott, the transport correspondent for the BBC, is recorded as stating that unless criminals can get their hands on the keys, new cars are all but impossible to steal, in Car industry declares victory in war on thieves, BBC News, 16 June 2011, available at http://www.bbc.co.uk/news/uk-13787442
-
(2011)
BBC News
-
-
Scott, R.1
-
3
-
-
79952271222
-
The effectiveness of vehicle security devices and their role in the crime drop
-
February
-
the evidence does not support these assertions, although the following article illustrates that vehicle security devices undoubtedly reduced the numbers of thefts until thieves worked out how to by-pass the systems put in place by manufacturers: Graham Farrell, Andromachi Tseloni and Nick Tilley, The effectiveness of vehicle security devices and their role in the crime drop, Criminology and Criminal Justice, February 2011, 11: 21-35. This article includes a number of references to a wide variety of relevant research in the field
-
(2011)
Criminology and Criminal Justice
, vol.11
, pp. 21-35
-
-
Farrell, G.1
Tseloni, A.2
Tilley, N.3
-
4
-
-
84859096059
-
-
ForbesAutos.com, 26 June
-
For an example of this problem, John Holl, High-tech thieves use laptops to steal cars, ForbesAutos.com, 26 June 2006, available at http://www.msnbc.msn. com/id/13507939/ns/business-autos/t/high-tech-thieves-use-laptops-steal-cars/
-
(2006)
High-tech Thieves Use Laptops to Steal Cars
-
-
Holl, J.1
-
5
-
-
84859039892
-
Thieves jam key-fob lock signals in mystery car thefts
-
21 September
-
John Leyden, Thieves jam key-fob lock signals in mystery car thefts, The Register, 21 September 2010, available at http://www.theregister.co.uk/2010/09/ 21/car-jammer-vehicle-theft-scam/
-
(2010)
The Register
-
-
Leyden, J.1
-
6
-
-
84859039894
-
Criminals find the key to car immobilizers
-
6 December
-
and Duncan Graham-Rowe, Criminals find the key to car immobilisers, New Scientist, 6 December 2011, Issue 2789, available at http://www.newscientist. com/article/mg20827894.500-criminals-find-the-key-to-car-immobilisers.html
-
(2011)
New Scientist
, Issue.2789
-
-
Graham-Rowe, D.1
-
7
-
-
84859039893
-
-
Council Directive 74/61/EEC of 17 December 1973 on the approximation of the laws of the Member States relating to devices to prevent the unauthorized use of motor vehicles 11.2
-
Council Directive 74/61/EEC of 17 December 1973 on the approximation of the laws of the Member States relating to devices to prevent the unauthorized use of motor vehicles, OJ L38, 11.2.1974, p. 22-28
-
(1974)
OJ L38
, pp. 22-28
-
-
-
8
-
-
84859098226
-
-
Commission Directive 95/56/EC, Euratom of 8 November 1995 adapting to technical progress Council Directive 74/61/EEC relating to devices to prevent the unauthorized use of motor vehicles 29.11
-
Commission Directive 95/56/EC, Euratom of 8 November 1995 adapting to technical progress Council Directive 74/61/EEC relating to devices to prevent the unauthorized use of motor vehicles, OJ L286, 29.11.1995, p. 1-44
-
(1995)
OJ L286
, pp. 1-44
-
-
-
11
-
-
84859020313
-
Embedded Cryptography: Side Channel Attacks
-
Kerstin Lemke, Christof Paar and Marko Wolf, editors Springer-Verlag, Berlin
-
and Kai Schramm, Kerstin Lemke and Christof Paar, Embedded Cryptography: Side Channel Attacks, pp 187-204 in Kerstin Lemke, Christof Paar and Marko Wolf, editors, Embedded Security in Cars (Springer-Verlag, Berlin, 2006)
-
(2006)
Embedded Security in Cars
, pp. 187-204
-
-
Schramm, K.1
Lemke, K.2
Paar, C.3
-
13
-
-
84859039900
-
-
Authorhouse
-
See Michael Bender, The Fast, The Fraudulent, & The Fatal: The Dangerous and Dark side of Illegal Street Racing, Drifting and Modified Cars, (Authorhouse, 2009) for a description of the remote keyless entry system at pp 79-93
-
(2009)
The Fast, the Fraudulent, & the Fatal: The Dangerous and Dark Side of Illegal Street Racing, Drifting and Modified Cars
, pp. 79-93
-
-
Bender, M.1
-
14
-
-
84889844346
-
Anti-theft Protection: Electronic Immobilizers
-
Kerstin Lemke, Christof Paar and Marko Wolf, editors Springer-Verlag, Berlin
-
Kerstin Lemke, Ahmad-Reza Sadeghi and Christian Stüble, Anti-theft Protection: Electronic Immobilizers in Kerstin Lemke, Christof Paar and Marko Wolf, editors, Embedded Security in Cars (Springer-Verlag, Berlin, 2006), pp 52-54
-
(2006)
Embedded Security in Cars
, pp. 52-54
-
-
Lemke, K.1
-
15
-
-
84980146115
-
Letter to the editor
-
April 9/April 10
-
note that a vehicles immobiliser system can be affected by the radio waves emanating frombuildings, thus requiring vehicles to be towed away, as occurs in Bern: Gunther B. Pamberg, letter to the editor, Financial Times, April 9/April 10, 2001, p 10
-
(2001)
Financial Times
, pp. 10
-
-
Pamberg, G.B.1
-
16
-
-
84859039898
-
Electronic car key fobs fail on Southampton street
-
(Hampshire and the Isle of Wight), 12 October
-
Electronic car key fobs fail on Southampton street, BBC News (Hampshire and the Isle of Wight), 12 October 2011, available on-line at http://www.bbc.co.uk/news/uk-england-hampshire-15278838
-
(2011)
BBC News
-
-
-
17
-
-
44449126213
-
A Practical Attack on KeeLoq
-
Nigel Smart, editor Springer-Verlag
-
For attacks on awell-known and widely used software systemfor garage doors and vehicles, see Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham and Bart Preneel, A Practical Attack on KeeLoq, in Nigel Smart, editor, Advances in Cryptology EUROCRYPT 2008, LectureNotes in Computer Science, Volume 4965, (Springer-Verlag, 2008) pp 1-18
-
(2008)
Advances in Cryptology EUROCRYPT 2008, Lecture Notes in Computer Science
, vol.4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
18
-
-
51849131973
-
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
-
David Wagner, editor Springer-Verlag
-
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, in David Wagner, editor, Advances in Cryptology - CRYPTO 2008 Proceedings of the 28th Annual International Cryptology Conference, Lecture Notes in Computer Science, Volume 5157, (Springer-Verlag, 2008), pp 203-220
-
(2008)
Advances in Cryptology - CRYPTO 2008 Proceedings of the 28th Annual International Cryptology Conference, Lecture Notes in Computer Science
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
19
-
-
84864230790
-
Cryptanalysis of Keeloq with COPACOBANA
-
9-10 September Lusanne, Switzerland
-
Martin Novotný and Timo Kasper, Cryptanalysis of Keeloq with COPACOBANA, in ECRYPT II (SHARCS 09), 9-10 September 2009, Lusanne, Switzerland, pp 159-164
-
(2009)
ECRYPT II (SHARCS 09)
, pp. 159-164
-
-
Novotný, M.1
Kasper, T.2
-
20
-
-
70350678744
-
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
-
Bart Preneel, editor Springer-Verlag
-
Markus Kasper, Timo Kasper, Amir Moradi and Christof Paar, Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed in Bart Preneel, editor, Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology (Springer-Verlag, 2009), pp 403-420
-
(2009)
Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
, pp. 403-420
-
-
Kasper, T.1
Kasper, A.2
Moradi, M.3
Paar, C.4
-
22
-
-
77955760404
-
-
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani, Physical Cryptanalysis of KeeLoq Code Hopping Applications, available at http://eprint.iacr.org/2008/058.pdf
-
Physical Cryptanalysis of KeeLoq Code Hopping Applications
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
23
-
-
77951013758
-
KeeLoq and Side-Channel Analysis-Evolutionof an Attack
-
Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald and Jean-Pierre Seifert, editors IEEEComputer Society
-
Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper and Amir Moradi, KeeLoq and Side-Channel Analysis-Evolutionof an Attack, in Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald and Jean-Pierre Seifert, editors, Workshop on Fault Diagnosis and Tolerance in Cryptography, Proceedings of the Sixth International Workshop, FDTC2009 (IEEEComputer Society, 2009), pp 65-69
-
(2009)
Workshop on Fault Diagnosis and Tolerance in Cryptography, Proceedings of the Sixth International Workshop, FDTC2009
, pp. 65-69
-
-
Paar, C.1
Eisenbarth, T.2
Kasper, M.3
Kasper, T.4
Moradi, A.5
-
26
-
-
84859045728
-
Digital car jacking - Researchers show how to unlock, start a car remotely
-
5 August
-
Digital car jacking - Researchers show how to unlock, start a car remotely, Homeland Security News Wire, 5 August 2011 http:// homelandsecuritynewswire.net/ researchersshow-how-unlock-start-car-remotely
-
(2011)
Homeland Security News Wire
-
-
-
27
-
-
84859056450
-
Texting, grand theft auto style; Alarms pose risk
-
Associated Press, 19 August
-
Texting, grand theft auto style; alarms pose risk, Associated Press, 19 August 2011; their presentation is available at War Texting: Identifying and Interacting with Devices on the. Telephone Network, http://www.isecpartners.com/ storage/docs/presentations/iSEC-BH2011-War-Texting.pdf
-
(2011)
War Texting: Identifying and Interacting with Devices on The. Telephone Network
-
-
-
28
-
-
84877887414
-
Security analysis of a cryptographically enabled RFID device
-
These methods are discussed and illustrated in Stephen C. Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin and Michael Szydlo, Security analysis of a cryptographically enabled RFID device, Proceeding SSYM05 Proceedings of the 14th conference on USENIX Security Symposium, Volume 14, pp 1-15
-
Proceeding SSYM05 Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 1-15
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
29
-
-
77955201139
-
Experimental Security Analysis of a Modern Automobile
-
for an introduction to some of the issues relating to vehicle security, see Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham and Stefan Savage, Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp 447-462
-
2010 IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
31
-
-
84859045730
-
-
21 July 2011, NPR
-
Smugglers of illegal drugs identify people crossing frequently between Mexico and the United States, acquire the vehicle identification number of the motor car from the dashboard, then obtain a duplicate key for the car from a corrupt lock smith with access to the relevant vehicle database (Ford vehicles were the vehicles mainly chosen); they then place the drugs into the boot of the vehicle, and the driver unwittingly drives the car across the border with the drugs: Jason Beaubien, At Border, Teacher Becomes Unwitting Drug Smuggler, 21 July 2011, NPR at http://www.npr.org/2011/07/21/138548294/ at-border-teacher- becomes-unwitting-drug-smuggler
-
At Border, Teacher Becomes Unwitting Drug Smuggler
-
-
Beaubien, J.1
-
33
-
-
80053040582
-
-
2nd edn, LexisNexis Butterworths Chapter 5
-
That is, despite the failure to provide a proper evidential foundation and the fact that digital evidence is far from perfect, for which see Stephen Mason, general editor, Electronic Evidence, (2nd edn, LexisNexis Butterworths, 2010), Chapter 5
-
(2010)
Electronic Evidence
-
-
Mason, S.1
-
34
-
-
84859096071
-
-
2009 DJDAR 2849 (Cal. Ct. App. Feb. 26)
-
For an instructive discussion about the merits of the evidence surrounding a similar case in the USA, albeit in the context of legal proceedings, see McCoy v Progressive West Insurance Company, No. B199978, 2009 DJDAR 2849 (Cal. Ct. App. Feb. 26, 2009) an appeal from a judgment of the Superior Court of Los Angeles County, available at http://law.justia.com/cases/ california/courtof-appeal/2009/b199978/
-
(2009)
McCoy v Progressive West Insurance Company, No. B199978
-
-
-
35
-
-
84859047969
-
Teething problems for McLaren - With knobs on
-
Saturday 12 November
-
This is changing, especially with high end motor vehicles. For instance, the McLaren MP4-12C is almost entirely controlled by software, which has caused serious problems. Ron Dennis has admitted that virtually every single problem has its root cause in software, and if customers wanted to take delivery of a vehicle immediately, they would have to do so without satellite nagivation or with a working in-car telephone: Teething problems for McLaren - with knobs on, The Times, Saturday 12 November 2011, 63
-
(2011)
The Times
, pp. 63
-
-
-
37
-
-
64149127847
-
Special Issue on Advanced Automobile Technologies
-
February
-
For just one early example of the research and development of software for motor vehicles, an entire issue (IE 30 Issue 2, May 1983) of IEEE Transactions on Industrial Electronics was given over to articles relating to the use of software in vehicles. For more recent articles, see H. Gharavi, K. V. Prasad and P. A. Ioannou, Special Issue on Advanced Automobile Technologies, Proceedings of the IEEE, February 2007, Volume 95, Issue 2, pp 325-327
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.2
, pp. 325-327
-
-
Gharavi, H.1
Prasad, K.V.2
Ioannou, P.A.3
-
38
-
-
34548723414
-
Engineering Automotive Software
-
February
-
M. Broy, I.H. Kruger, A. Pretschner, C. Salzmann, Engineering Automotive Software, Proceedings of the IEEE, February 2007, Volume 95, Issue 2, pp 356-373
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.2
, pp. 356-373
-
-
Broy, M.1
Kruger, I.H.2
Pretschner, A.3
Salzmann, C.4
-
39
-
-
84929562484
-
Hacker Disables More Than 100 Cars Remotely
-
17 March
-
Kevin Poulsen, Hacker Disables More Than 100 Cars Remotely Wired, 17 March 2010
-
(2010)
Wired
-
-
Poulsen, K.1
-
40
-
-
84859045732
-
TomTom satnav data used to set police speed traps
-
28 April
-
Charles Arthur, TomTom satnav data used to set police speed traps The Guardian, 28 April 2011
-
(2011)
The Guardian
-
-
Arthur, C.1
-
41
-
-
84859045734
-
Hacker pwns police cruiser and lives to tell tale the dark side of situational awareness
-
3 May
-
Dan Goodin, Hacker pwns police cruiser and lives to tell tale The dark side of situational awareness, The Register, 3 May 2011
-
(2011)
The Register
-
-
Goodin, D.1
-
43
-
-
84859047970
-
-
McAfee/Wind River
-
Stuart McClure, André Weimerskirch, Ph.D., Marko Wolf, Ph.D., Professor Christof Paar, Winfried Stephan and Stefan Goss, Ph.D., Caution: Malware Ahead An analysis of emerging risks in automotive system security (McAfee/Wind River, 2011) at http://www.mcafee.com/us/resources/reports/ rpcaution-malware-ahead.pdf
-
(2011)
Caution: Malware Ahead An Analysis of Emerging Risks in Automotive System Security
-
-
McClure, S.1
Weimerskirch, A.2
Wolf, M.3
Paar, C.4
Stephan, W.5
Goss, S.6
-
44
-
-
84859046277
-
Firmware forensic: Best practices in embedded software source code discovery
-
Michael Barr, Firmware forensic: best practices in embedded software source code discovery, Digital Evidence and Electronic Signature Law Review, 8 (2011), 148-151 for a discussion of the tests that should be carried out and those tests that were not carried out by the National Highway Traffic Safety Administration and the team from NASAs Engineering and Safety Center, thus undermining the conclusions in their joint report
-
(2011)
Digital Evidence and Electronic Signature Law Review
, vol.8
, pp. 148-151
-
-
Barr, M.1
-
45
-
-
84859067073
-
Tylers appliances are caught in a Bermuda triangle letter to the editor
-
April 9/April 10
-
Gunther B. Pamberg, Tylers appliances are caught in a Bermuda triangle letter to the editor, Financial Times, April 9/April 10, 2011, 10
-
(2011)
Financial Times
, pp. 10
-
-
Pamberg, G.B.1
-
46
-
-
84859045735
-
-
Commission Regulation (EC) No 1400/2002 of 31 July 2002 on the application of Article 81(3) of the Treaty to categories of vertical agreements and concerted practices in the motor vehicle sector 1.8
-
Commission Regulation (EC) No 1400/2002 of 31 July 2002 on the application of Article 81(3) of the Treaty to categories of vertical agreements and concerted practices in the motor vehicle sector, OJ L 203, 1.8.2002, p. 30-41
-
(2002)
OJ L 203
, pp. 30-41
-
-
-
47
-
-
84859062780
-
-
Commission Regulation (EU) No 461/2010 of 27 May 2010 on the application of Article 101(3) of the Treaty on the Functioning of the European Union to categories of vertical agreements and concerted practices in the motor vehicle sector (Text with EEA relevance) 28.5
-
Commission Regulation (EU) No 461/2010 of 27 May 2010 on the application of Article 101(3) of the Treaty on the Functioning of the European Union to categories of vertical agreements and concerted practices in the motor vehicle sector (Text with EEA relevance), OJ L129, 28.5.2010, p. 52-57
-
(2010)
OJ L129
, pp. 52-57
-
-
-
48
-
-
84859056455
-
-
Commission notice Supplementary guidelinesonvertical restraints inagreements for the sale and repair of motor vehicles and for the distribution of spare parts for motor vehicles (Text with EEA relevance) 28.5
-
Commission notice Supplementary guidelinesonvertical restraints inagreements for the sale and repair of motor vehicles and for the distribution of spare parts for motor vehicles (Text with EEA relevance), OJ C 138, 28.5.2010, p. 16-27
-
(2010)
OJ C 138
, pp. 16-27
-
-
-
49
-
-
84859056459
-
Security Risks and Business Opportunities in In-Car Entertainment
-
Kerstin Lemke, Christof Paar and Marko Wolf, editors
-
Marcus Heitman, Security Risks and Business Opportunities in In-Car Entertainment in Kerstin Lemke, Christof Paar and Marko Wolf, editors, Embedded Security in Cars, pp 242-244
-
Embedded Security in Cars
, pp. 242-244
-
-
Heitman, M.1
|