论文标题

回滚:针对汽车远程无钥匙进入系统的新的时间不足的重播攻击

RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems

论文作者

Csikor, Levente, Lim, Hoon Wei, Wong, Jun Wen, Ramesh, Soundarya, Parameswarath, Rohini Poolat, Chan, Mun Choon

论文摘要

当今的RKE系统实现了一次性滚动代码,使每个关键的FOB按钮都独特,可以有效防止简单的重播攻击。但是,事实证明,先前的称为Rolljam的攻击通常会打破所有基于滚动代码的系统。通过仔细的信号干扰,捕获和重播,攻击者可以意识到随后尚未使用的有效解锁信号。但是,rolljam需要无限期地进行连续部署,直到被利用为止。否则,如果在没有滚动的情况下再次使用键FOB,则捕获的信号将无效。我们介绍了Rollback,这是对当今大多数RKE系统的新重播和同步攻击。特别是,我们表明,即使一次性代码在滚动代码系统中变得无效,但以前连续捕获的一些信号可以触发RKE系统中的类似回滚机制。换句话说,滚动代码将重新同步回到过去使用的先前代码,从后来尚未使用的信号再次工作。此外,受害者仍然可以在袭击之前和之后注意到任何差异,而可以使用钥匙。与Rolljam不同,回滚根本不需要堵塞。此外,它需要信号仅捕获一次,并且可以根据需要的多次被利用。这种时间不足的物业对攻击者特别有吸引力,尤其是在访问密钥FOB的汽车共享/租赁场景中。但是,尽管Rolljam几乎击败了任何基于滚动代码的系统,但车辆可能会采取其他防盗措施,以防止关键的钥匙发生故障,因此反对回滚。我们正在进行的分析(暂时涵盖亚洲车辆制造商)对不同的车辆制造,模型表明,其中约有70%的人容易回滚。

Today's RKE systems implement disposable rolling codes, making every key fob button press unique, effectively preventing simple replay attacks. However, a prior attack called RollJam was proven to break all rolling code-based systems in general. By a careful sequence of signal jamming, capturing, and replaying, an attacker can become aware of the subsequent valid unlock signal that has not been used yet. RollJam, however, requires continuous deployment indefinitely until it is exploited. Otherwise, the captured signals become invalid if the key fob is used again without RollJam in place. We introduce RollBack, a new replay-and-resynchronize attack against most of today's RKE systems. In particular, we show that even though the one-time code becomes invalid in rolling code systems, replaying a few previously captured signals consecutively can trigger a rollback-like mechanism in the RKE system. Put differently, the rolling codes become resynchronized back to a previous code used in the past from where all subsequent yet already used signals work again. Moreover, the victim can still use the key fob without noticing any difference before and after the attack. Unlike RollJam, RollBack does not necessitate jamming at all. Furthermore, it requires signal capturing only once and can be exploited at any time in the future as many times as desired. This time-agnostic property is particularly attractive to attackers, especially in car-sharing/renting scenarios where accessing the key fob is straightforward. However, while RollJam defeats virtually any rolling code-based system, vehicles might have additional anti-theft measures against malfunctioning key fobs, hence against RollBack. Our ongoing analysis (covering Asian vehicle manufacturers for the time being) against different vehicle makes and models has revealed that ~70% of them are vulnerable to RollBack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源