메뉴 건너뛰기




Volumn , Issue , 2016, Pages 929-944

Lock it and still lose it – on the (in)security of automotive remote keyless entry systems

Author keywords

[No Author keywords available]

Indexed keywords

CLONE CELLS; CLONING; CODES (SYMBOLS); CRYPTOGRAPHY; LOCKS (FASTENERS); REMOTE CONTROL; TELECONTROL EQUIPMENT; VEHICLES;

EID: 85076496014     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (133)

References (35)
  • 1
    • 85076467318 scopus 로고    scopus 로고
    • abc7news. Key fob car thefts, 2013. http://abc7news.com/archive/9079852.
    • (2013) Key Fob Car Thefts
  • 7
    • 44449137280 scopus 로고    scopus 로고
    • Attacks on the Keeloq block cipher and authentication systems
    • rfidsec07
    • Bogdanov, A. Attacks on the KeeLoq Block Cipher and Authentication Systems. In Workshop on RFID Security (RFID-Sec’08)(2007). rfidsec07.etsit.uma.es/ slides/papers/paper-22.pdf.
    • (2007) Workshop on RFID Security (RFID-Sec’08)
    • Bogdanov, A.1
  • 9
    • 85064838175 scopus 로고    scopus 로고
    • Breaking the security of physical devices
    • August
    • Cesare, S. Breaking the security of physical devices. Presentation at Blackhat’14, August 2014.
    • (2014) Presentation at Blackhat’14
    • Cesare, S.1
  • 11
    • 70350431832 scopus 로고    scopus 로고
    • Practical algebraic attacks on the Hitag2 stream cipher
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Courtois, N. T., O’Neil, S., and Quisquater, J.-J. Practical algebraic attacks on the Hitag2 stream cipher. In 12th Information Security Conference (ISC 2009) (2009), vol. 5735 of Lecture Notes in Computer Science, Springer-Verlag, pp. 167–176.
    • (2009) 12th Information Security Conference (ISC 2009) , vol.5735 , pp. 167-176
    • Courtois, N.T.1    O’Neil, S.2    Quisquater, J.-J.3
  • 12
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme
    • of LNCS, Springer
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M. T. M. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology – CRYPTO’08 (2008), vol. 5157 of LNCS, Springer, pp. 203–220.
    • (2008) Advances in Cryptology – CRYPTO’08 , vol.5157 , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.T.M.6
  • 13
    • 85076461441 scopus 로고    scopus 로고
    • European Automobile Manufacturers Associaction. New passenger car registrations, 2015. available at http://www.acea.be/uploads/press_releases_files/ 20151016_PRPC_1509_FINAL.pdf.
    • (2015) New Passenger Car Registrations
  • 16
    • 85020218056 scopus 로고    scopus 로고
    • Drive it like you hacked it: New attacks and tools to wirelessly steal cars
    • August
    • Kamkar, S. Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars. Presentation at DEFCON 23, August 2015.
    • (2015) Presentation at DEFCON , vol.23
    • Kamkar, S.1
  • 17
    • 70350678744 scopus 로고    scopus 로고
    • Breaking keeloq in a flash: On extracting keys at lightning speed
    • B. Preneel, Ed.,. of LNCS, Springer
    • Kasper, M., Kasper, T., Moradi, A., and Paar, C. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. In Progress in Cryptology - AFRICACRYPT’09 (2009), B. Preneel, Ed., vol. 5580 of LNCS, Springer, pp. 403–420.
    • (2009) Progress in Cryptology - AFRICACRYPT’09 , vol.5580 , pp. 403-420
    • Kasper, M.1    Kasper, T.2    Moradi, A.3    Paar, C.4
  • 19
    • 85076468722 scopus 로고    scopus 로고
    • Keyline S.p.A. RK60 guide, 2015. available at http://www.keyline.it/files/teste-elettroniche/electronic_ heads_guide_13316.pdf.
    • (2015) A. RK60 Guide
    • Keyline, S.1
  • 22
    • 58949086800 scopus 로고    scopus 로고
    • Related-key rectangle attack on 36 rounds of the XTEA block cipher
    • Lu, J. Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8, 1 (2008), 1–11.
    • (2008) International Journal of Information Security , vol.8 , Issue.1 , pp. 1-11
    • Lu, J.1
  • 24
    • 15744395962 scopus 로고    scopus 로고
    • Technical Report, Cambridge University, UK
    • Needham, R. M., and Wheeler, D. J. TEA extensions. Technical Report, Cambridge University, UK (1997).
    • (1997) TEA Extensions
    • Needham, R.M.1    Wheeler, D.J.2
  • 30
    • 84954096438 scopus 로고    scopus 로고
    • PhD thesis, Radboud University, The Netherlands and KU Leuven, Belgium, April
    • Verdult, R. The (in)security of proprietary cryptography. PhD thesis, Radboud University, The Netherlands and KU Leuven, Belgium, April 2015.
    • (2015) The (in)Security of Proprietary Cryptography
    • Verdult, R.1
  • 31
    • 84990827825 scopus 로고    scopus 로고
    • Cryptanalysis of the Megamos Crypto automotive immobilizer
    • login
    • Verdult, R., and Garcia, F. D. Cryptanalysis of the Megamos Crypto automotive immobilizer. USENIX;login: 40, 6 (2015), pp. 17–22.
    • (2015) USENIX , vol.40 , Issue.6 , pp. 17-22
    • Verdult, R.1    Garcia, F.D.2
  • 32
    • 84966893349 scopus 로고    scopus 로고
    • Gone in 360 seconds: Hijacking with Hitag2
    • August USENIX Association
    • Verdult, R., Garcia, F. D., and Balasch, J. Gone in 360 seconds: Hijacking with Hitag2. In USENIX Security Symposium (August 2012), USENIX Association, pp. 237–252. https://www.usenix.org/system/ files/conference/usenixsecurity12/ sec12-final95.pdf.
    • (2012) USENIX Security Symposium , pp. 237-252
    • Verdult, R.1    Garcia, F.D.2    Balasch, J.3
  • 33
    • 84979836592 scopus 로고    scopus 로고
    • Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
    • USENIX Association
    • Verdult, R., Garcia, F. D., and Ege, B. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. In 22nd USENIX Security Symposium (USENIX Security 2013) (2015), USENIX Association, pp. 703–718.
    • (2015) 22nd USENIX Security Symposium (USENIX Security 2013) , pp. 703-718
    • Verdult, R.1    Garcia, F.D.2    Ege, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.