Show simple item record

dc.contributor.authorGesteira-Miñarro, Roberto
dc.contributor.authorLópez, Gregorio
dc.contributor.authorPalacios, Rafael
dc.date.accessioned2025-06-10T18:29:45Z
dc.date.available2025-06-10T18:29:45Z
dc.date.issued2025-05-31
dc.identifier.urihttps://hdl.handle.net/1721.1/159387
dc.description.abstractThe automotive industry has been a target for cyber criminals for decades. New regulations have come into force in the automotive industry and manufacturers must take cybersecurity into account. One of the most interesting vehicle systems is the Remote Keyless Entry (RKE) system, which allows users to lock and unlock their cars, among other actions, with a remote control integrated in the car key. If this system is compromised, a malicious user could gain access to a vehicle remaining unnoticed. This paper presents the identification and analysis of a vulnerability in an RKE protocol that can be exploited to gain access to the car at any time, thus cloning the key fob. The reverse-engineering methodology used to uncover the vulnerability is outlined, along with other tested vehicles to show its applicability. A relevant aspect of the research is the fact that only open-source tools and available commercial hardware are needed to perform the analysis. This black-box approach is equally valid to learn RKE protocol features, without the need to extract and analyze ECU firmware, which is considerably more expensive. As a result, a detailed analysis of eight protocols from different manufacturers is shown and they are compared from a cybersecurity point of view, with one of them being totally broken.en_US
dc.publisherSpringer Berlin Heidelbergen_US
dc.relation.isversionofhttps://doi.org/10.1007/s10207-025-01063-7en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceSpringer Berlin Heidelbergen_US
dc.titleClonable key fobs: Analyzing and breaking RKE protocolsen_US
dc.typeArticleen_US
dc.identifier.citationGesteira-Miñarro, R., López, G. & Palacios, R. Clonable key fobs: Analyzing and breaking RKE protocols. Int. J. Inf. Secur. 24, 150 (2025).en_US
dc.contributor.departmentSloan School of Managementen_US
dc.relation.journalInternational Journal of Information Securityen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2025-06-01T03:28:19Z
dc.language.rfc3066en
dc.rights.holderThe Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature
dspace.embargo.termsY
dspace.date.submission2025-06-01T03:28:19Z
mit.journal.volume24en_US
mit.licensePUBLISHER_POLICY
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record