Story Details

  • Cars and Key Fobs: Attacks on Car Remotes

    Posted: 2025-04-24 09:53:22

    This Stanford article explores the vulnerabilities of car key fobs to relay attacks. These attacks exploit the limited range of key fob signals by using two relay devices: one near the car and one near the key fob. The relay devices capture and transmit the signals between the key fob and the car, effectively extending the key's range and allowing thieves to unlock and even start the car without physical possession of the key. The article details various attack scenarios, including rolling code exploitation and amplification attacks, and discusses potential countermeasures such as signal jamming, distance bounding, and cryptographic authentication improvements to enhance car security.

    Summary of Comments ( 93 )
    https://news.ycombinator.com/item?id=43780876

    The Hacker News comments discuss practical experiences and technical details related to car key fob vulnerabilities. Several users share anecdotes of relay attacks, highlighting their increasing prevalence and ease of execution with readily available hardware. Some commenters debate the effectiveness of various mitigation strategies like Faraday cages and rolling codes, acknowledging the limitations of each. Others delve into the technical aspects of the attacks, discussing signal amplification, frequency hopping, and the possibility of jamming vulnerabilities. The overall sentiment expresses concern over the security of these systems and the relative ease with which they can be compromised, with some advocating for greater industry attention to these vulnerabilities.