Assignment 5: Cars and Key Fobs (2021)

Hands-on RF and key-fob hacking

  • Low-cost SDRs make RF jamming/relay/replay experiments accessible; people replicate the assignment’s attacks as student/hobby projects.
  • Some note that legacy automotive ciphers (HiTag2, Megamos) were weak hand-rolled designs; modern hardware could run AES, but protocol design (replay, relay) is still the hard part.

Smartphone / “Apple-style” car keys

  • One side imagines an “iPhone on wheels”: FaceID, secure enclave, MFA, easy digital key sharing, Express Mode, and backup tokens (PIN, card, fob).
  • Others worry about usability and edge cases: loaning the car when far away, phone dead, car battery dead, being injured or drunk, or non-technical relatives.
  • There’s skepticism that automakers/app developers won’t “enshittify” flows with roles/permissions and cloud dependencies.

Remote override and government control

  • A speculative idea: authorities could remotely unlock and route a car to a hospital.
  • Strong pushback: any remote hijack channel is seen as dangerous and ripe for abuse by police, insiders, or attackers.

UWB, distance-bounding, and relay attacks

  • BMW-style UWB keys measure distance via very short pulses, addressing “mafia fraud” relay attacks.
  • Commenters say UWB digital key standards now exist and some new cars require the fob to be within centimeters to start.
  • Others note this is largely for passive keyless systems; older designs only checked liveness, not distance.

Mechanical keys, immobilizers, and easy physical attacks

  • Traditional car locks are often trivial to rake; some brands historically reused key cuts across many vehicles.
  • Immobilizers and OBD/CAN “emergency start devices” shifted theft to electronics rather than pure mechanical entry.
  • Stories highlight alarms sometimes (but not always) ignoring mechanical key unlocks.

Owner workarounds: Faraday cages and “sleeping” keys

  • People use Dutch ovens, microwaves, Faraday pouches, or tins to block RF when keys are at home.
  • Some manufacturers implement motion-triggered key sleep or manual “disable keyless entry” sequences, which are appreciated but depend on user diligence.

Aftermarket hardening and tracking

  • A “gold standard” stack mentioned: CAN-bus lock (IGLA), hidden fuel-pump kill switch, and hidden GPS tracker with backup battery.
  • Others counter that tow trucks, onboard Faraday cages, and cheap GPS jammers can defeat trackers; determined thieves strip cars quickly.

Convenience vs reliability: keyless and phone-as-key

  • Pro-keyless commenters rave about never touching keys: walk up, grab handle, press start; ideally just carry a phone.
  • Critics see it as a Rube Goldberg answer to a minor inconvenience, and dislike adding the phone as another single point of failure.
  • Debate centers on trade-offs between everyday friction (bulky keys, gloves in winter, lockouts) and rare but severe failures (lost/broken phone, dead batteries).

Why isn’t this “solved” with simple crypto?

  • Several propose straightforward challenge–response with shared secrets and hashes.
  • Others explain complications:
    • Many fobs are transmit-only for power/cost reasons.
    • Relay attacks still work if the car doesn’t verify distance/time-of-flight.
    • Key provisioning, replacement without an original, and keeping complexity aligned with the car’s inherently low physical security all matter.
    • Early systems were more secure when you had to press a button; passive keyless flipped the initiation and opened new attack surfaces.

Insurance, theft patterns, and manufacturer responsibility

  • Some models (e.g., certain luxury SUVs) are reportedly stolen so often that insurers raise rates sharply; there’s a suggestion manufacturers should subsidize or fully cover insurance until they fix vulnerabilities.
  • Others note operating costs (including insurance) should be part of purchase decisions, but acknowledge that new vulnerabilities and rate hikes often appear after purchase.
  • Commenters point out that simple physical theft (windows, tow trucks, opportunistic “Kia Boys”-style attacks) still dominates, so “good enough to stop crackheads” may be sufficient for many buyers.

Cost, lock-in, and dealer monopolies on fobs

  • Modern encrypted fobs are expensive to replace; examples include ~$550 for a single replacement at a dealer.
  • Manufacturers often restrict programming to dealers; independent locksmiths rely on gray-market tooling and play cat-and-mouse with new immobilizer systems.
  • Some hope security research and protocol exposure will eventually reduce monopolistic pricing without weakening defenses.

Misc course-related notes

  • A few past students praise the Stanford class; one wonders why only two slide decks are posted, speculating the instructor stopped uploading material.