Relay Attack applied to NFC Virtual Car Keys

  • Join the LiveStream
  • When: July 23, 2020 | 6 p.m. Central European Summer Time(UTC+02)

    Where: LiveStream

    Who: Enrico Pozzobon Penetration Tester at Ostbayerische Technische Hochschule

    Relay Attack applied to NFC Virtual Car Keys

    The NFC virtual key systems available on modern cars allow the users to share their cars without the necessity of multiple keys and to start them with their smartphones or cards. While these systems use state-of-the art cryptography and proprietary hardware and protocols, they are still vulnerable to the old relay attacks. Moreover, since their challenge-response algorithms allow high latencies due to the limitations of the underlying architecture, these relay attacks can be performed from a long distance and even over the internet. This talk will show the process of building from scratch an NFC relay that was proven to work on 3 different car manufacturers, starting with a black box reverse engineering of the protocol, continuing with the design of a low level NFC card emulator using the Chameleon Mini and finishing with the development of a small Android app which will relay the challenge to the victim's card.

    About the Presenter:

    Enrico completed his master in Telecommunication Engineering in the University of Padova in 2017. Since then, he has been working on automotive security focusing on reverse engineering, relay attacks, side channel attacks and glitching.

    Visit Speaker Profile