{"id":15360,"date":"2020-02-11T00:35:54","date_gmt":"2020-02-10T20:35:54","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/36c3-immobilizers\/15360\/"},"modified":"2020-02-11T00:36:04","modified_gmt":"2020-02-10T20:36:04","slug":"36c3-immobilizers","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/36c3-immobilizers\/15360\/","title":{"rendered":"Will an immobilizer save your car from being stolen?"},"content":{"rendered":"<p>Automobiles are getting ever smarter, and cracking them with a crowbar and a screwdriver is getting ever more difficult. Statistics back up that assumption: According to <a href=\"https:\/\/conference.nber.org\/conferences\/2011\/SI2011\/CRI\/van_Ours_Vollaard.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">research<\/a> from Jan C. van Ours and Ben Vollaard highlighting car theft and recovery data, vehicle theft decreased by 70% between 1995 and 2008 in the Netherlands and by as much as 80% in Great Britain.<\/p>\n<p>One of the causes of the decrease is the ubiquitous introduction of so-called \u201cimmobilizers.\u201d Immobilizers, however, are just as susceptible to cracking as any other relatively complex technology. Cybersecurity researcher Wouter Bokslag chose this as the subject of his <a href=\"https:\/\/pure.tue.nl\/ws\/portalfiles\/portal\/88384352\/0638781_Bokslag_Wouter_thesis.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Master\u2019s thesis<\/a> and presented the results of his research at the <a href=\"https:\/\/media.ccc.de\/v\/36c3-11020-vehicle_immobilization_revisited\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">36th Chaos Communication Congress (36\u04213)<\/a>.<\/p>\n<h2>What an immobilizer is<\/h2>\n<p>In a nutshell, an immobilizer tries to ascertain if the person behind the wheel is a rightful owner. If it cannot be sure, it simply will not let the car start. The recognition process is imperceptible to the lawful owner; it happens within a fraction of a second, with no user participation.<\/p>\n<p>The world\u2019s first-ever immobilizer was <a href=\"https:\/\/patents.google.com\/patent\/US1300150\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">patented<\/a> as early as 1919. At the time, the driver needed to connect contacts in a certain order, and if the order was wrong when the car was started, an alarm went off.<\/p>\n<div id=\"attachment_32423\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/11003559\/36c3-hacking-immobilizers-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-32423\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/11003559\/36c3-hacking-immobilizers-1.jpg\" alt=\"An antitheft system for cars was first patented in 1919\" width=\"1460\" height=\"1300\" class=\"size-full wp-image-15361\"><\/a><p id=\"caption-attachment-32423\" class=\"wp-caption-text\">An antitheft system for cars was first patented in 1919<\/p><\/div>\n<p>Today\u2019s immobilizer consists of two key parts: a transponder in the ignition key and a receiver in the car itself. When someone attempts to start the engine, the vehicle sends a request to the key. If the key returns the correct predefined signal, the immobilizer sends a command to the engine control unit to start. Without the right signal, you can\u2019t start the car.<\/p>\n<p>Hitag2, DST40, and Megamos Crypto were some of the first transponders. Having been scrutinized over the years, they are now considered insecure. You can read about the shortcomings of Hitag2 <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity12\/sec12-final95.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>, and those of Megamos Crypto <a href=\"http:\/\/www.cs.ru.nl\/~rverdult\/Dismantling_Megamos_Crypto_Wirelessly_Lockpicking_a_Vehicle_Immobilizer_Hash.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>.<\/p>\n<p>In the final decade of the 20th century, immobilizers proliferated. They became mandatory in the EU states in the late nineties, and other countries gradually followed suit. If we can believe those countries\u2019 reports, immobilizers contributed to a significant decrease in auto theft.<\/p>\n<div id=\"attachment_32424\" style=\"width: 683px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/11003603\/36c3-hacking-immobilizers-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-32424\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/02\/11003603\/36c3-hacking-immobilizers-2.jpg\" alt=\"Car theft statistics for Great Britain, the Netherlands, Sweden, the United States, Canada, Australia, 1981\u20132013\" width=\"673\" height=\"430\" class=\"size-full wp-image-15363\"><\/a><p id=\"caption-attachment-32424\" class=\"wp-caption-text\">Relative car theft statistics for Great Britain, the Netherlands, Sweden, the United States, Canada, and Australia, 1981\u20132013, with the year 2000 used as the baseline. <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/489097\/horr87.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<h2>Carjackers strike back<\/h2>\n<p>Car theft certainly did not stop there, though. Following a familiar pattern, once immobilizers went mainstream, an arms race between criminals and car brands ensued. As cars got smarter, offenders kept up, and immobilizers proved fairly easy to trick. Successful cracking attempts became frequent, and car theft\u2019s long-standing, steady downward trend reversed <a href=\"https:\/\/www.newscientist.com\/article\/mg20827894-500-criminals-find-the-key-to-car-immobilisers\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">around 2010<\/a>. Great Britain\u2019s car theft rate <a href=\"https:\/\/www.express.co.uk\/life-style\/cars\/1182351\/keyless-car-theft-stolen-vehicles-uk\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">reached an eight-year high<\/a> in 2018, and many other countries saw a similar trend: a plunge until 2010 followed by a slight rebound or a plateau.<\/p>\n<p>Expensive luxury brands persisted as the most frequently hijacked cars. Cybersecurity researchers focused on those brands as well, but despite huge budgets, their studies were disappointing.<\/p>\n<p>If an expensive luxury car can be stealthily <a href=\"https:\/\/www.bbc.com\/news\/business-49273028\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cracked within ten seconds<\/a>, what does that say about higher-volume models that most people drive, you might reasonably ask.<\/p>\n<h2>Studying immobilizer security<\/h2>\n<p>In his study, Bokslag tried cracking three cars by popular brands. None of the cars was new; they all dated back to around 2009. The models were inexpensive B-class hatchbacks \u2014 the aforementioned higher-volume models. According to the authors of the study, many newer cars use similar antitheft systems.<\/p>\n<p>Bokslag used the following approach:<\/p>\n<ol>\n<li>Gain access to CAN bus traffic. The CAN bus is what the internals of most current cars use for communication.<\/li>\n<li>Read messages that the immobilizer components exchange.<\/li>\n<li>Get a hold of the engine control module (ECM) or body control module (BCM) firmware.<\/li>\n<li>Identify the algorithm used in the messaging.<\/li>\n<li>Use the previously obtained data to prove that you can start the car without an original key.<\/li>\n<\/ol>\n<p>Step one is fairly easy: Access to the bus is available through the standard OBD II port. All cars from after the year 2000 have it, and it serves the purpose of diagnostics. Once inside a car, you have access to the interface.<\/p>\n<p>One could get the firmware in a hundred ways, from fairly complex techniques to a simple Internet download. That\u2019s right: The firmware for many cars is available online; manufacturers provide it for diagnostics or maintenance.<\/p>\n<p>Well, that\u2019s fine as long as all traffic is reliably encrypted. But herein lies the biggest disappointment: The first two immobilizers were using very week encryption. On the first car, it took only seconds to retrieve vehicle security code, which allows for the authorization of a new key and subsequently disables immobilization. Obtaining the second test car\u2019s security code took as many as 4,000 attempts, or about 15 minutes.<\/p>\n<p>The third specimen was actually tougher \u2014 its immobilizer protocol did not have any obvious flaws and was not broken. However, the researcher determined that the key\u2019s chip emulates the PCF7935 transponder, which is similar to the one used in the Hitag2. Using Hitag2\u2019s known weaknesses, you can start the car in just 6 minutes without any need to mess with cryptography.<\/p>\n<p>All three systems are still around, and installed in some cars built in 2019.<\/p>\n<h2>What do we do?<\/h2>\n<p>Immobilizers are really effective against more conservative offenders who are still using mechanical techniques. They are, however, no match for the more sophisticated among carjackers \u2014 in the mass-produced segment anyway.<\/p>\n<p>Therefore, odd as it may seem, a possible recommendation for automobile owners is to remember their roots and not to discard technologies from the eighties and nineties. To break into an electronic security system supplemented with a mechanical steering wheel lock, a carjacker needs the skills to crack both electronics and mechanics.<\/p>\n<p>You still might cross paths with a skilled \u201ctwo-in-one\u201d carjacker, but at a minimum, doubling up on your security will make stealing your car a little harder than the one next to it. As they say, you don\u2019t have to outrun the bear\u00a0\u2014 just be faster than the other guy.<\/p>\n<p>That said, car manufacturers remain carjackers\u2019 key adversaries, but they are cybersecurity beginners in many ways. Unfortunately, they use proprietary\u00a0\u2014 and often unsophisticated\u00a0\u2014 encryption algorithms that disregard industry standards, and antitheft systems become hopelessly obsolete by the time the cars they protect hit the market.<\/p>\n<p>Despite that, we and others have taken some initial steps to improve automobile security. For some years, we have partnered with AVL, the largest independent manufacturer of automotive systems to make modern connected cars much more secure. You can learn more about our vision of a secure car in the post <a href=\"https:\/\/www.kaspersky.com\/blog\/connected-cars-secure-by-design\/16947\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Connected cars: Secure by design<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.<\/p>\n","protected":false},"author":2548,"featured_media":15365,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2211,1618,1619,2232],"class_list":{"0":"post-15360","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-36c3","10":"tag-ccc","11":"tag-chaos-communication-congress","12":"tag-immobilizer"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/36c3-immobilizers\/15360\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/36c3-immobilizers\/18484\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/36c3-immobilizers\/7511\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/36c3-immobilizers\/20264\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/36c3-immobilizers\/18577\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/36c3-immobilizers\/17096\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/36c3-immobilizers\/21076\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/36c3-immobilizers-2\/19914\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/36c3-immobilizers\/7658\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/36c3-immobilizers\/32419\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/36c3-immobilizers\/13716\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/36c3-immobilizers\/14038\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/36c3-immobilizers\/12765\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/36c3-immobilizers\/22172\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/36c3-immobilizers\/10730\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/36c3-immobilizers\/26873\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/36c3-immobilizers\/24968\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/36c3-immobilizers\/25765\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/36c3-immobilizers\/25597\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/36c3\/","name":"36c3"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2548"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15360"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15360\/revisions"}],"predecessor-version":[{"id":15364,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15360\/revisions\/15364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15365"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}