When: July 23, 2020 | 6 p.m. Central European Summer Time(UTC+02)
Who: Enrico Pozzobon Penetration Tester at Ostbayerische Technische Hochschule
Relay Attack applied to NFC Virtual Car KeysThe NFC virtual key systems available on modern cars allow the users to share their cars without the necessity of multiple keys and to start them with their smartphones or cards. While these systems use state-of-the art cryptography and proprietary hardware and protocols, they are still vulnerable to the old relay attacks. Moreover, since their challenge-response algorithms allow high latencies due to the limitations of the underlying architecture, these relay attacks can be performed from a long distance and even over the internet. This talk will show the process of building from scratch an NFC relay that was proven to work on 3 different car manufacturers, starting with a black box reverse engineering of the protocol, continuing with the design of a low level NFC card emulator using the Chameleon Mini and finishing with the development of a small Android app which will relay the challenge to the victim's card.
About the Presenter:
Visit Speaker Profile