Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/11531/101279
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorGesteira Miñarro, Robertoes-ES
dc.contributor.authorLópez López, Gregorioes-ES
dc.contributor.authorPalacios Hielscher, Rafaeles-ES
dc.date.accessioned2025-07-16T12:23:17Z-
dc.date.available2025-07-16T12:23:17Z-
dc.date.issued2025-06-01es_ES
dc.identifier.issn1615-5262es_ES
dc.identifier.urihttps:doi.org10.1007s10207-025-01063-7es_ES
dc.identifier.urihttp://hdl.handle.net/11531/101279-
dc.descriptionArtículos en revistases_ES
dc.description.abstractes-ES
dc.description.abstractThe automotive industry has been a target for cyber criminals for decades. New regulations have come into force in the automotive industry and manufacturers must take cybersecurity into account. One of the most interesting vehicle systems is the Remote Keyless Entry (RKE) system, which allows users to lock and unlock their cars, among other actions, with a remote control integrated in the car key. If this system is compromised, a malicious user could gain access to a vehicle remaining unnoticed. This paper presents the identification and analysis of a vulnerability in an RKE protocol that can be exploited to gain access to the car at any time, thus cloning the key fob. The reverse-engineering methodology used to uncover the vulnerability is outlined, along with other tested vehicles to show its applicability. A relevant aspect of the research is the fact that only open-source tools and available commercial hardware are needed to perform the analysis. This black-box approach is equally valid to learn RKE protocol features, without the need to extract and analyze ECU firmware, which is considerably more expensive. As a result, a detailed analysis of eight protocols from different manufacturers is shown and they are compared from a cybersecurity point of view, with one of them being totally broken.en-GB
dc.format.mimetypeapplication/octet-streames_ES
dc.language.isoen-GBes_ES
dc.sourceRevista: International Journal of Information Security, Periodo: 1, Volumen: online, Número: 3, Página inicial: 150-1, Página final: 150-15es_ES
dc.subject.otherInstituto de Investigación Tecnológica (IIT)es_ES
dc.titleClonable key fobs: Analyzing and breaking RKE protocolses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordses-ES
dc.keywordsRemote keyless entry; Radio frequency; Reverse engineering; Cybersecurity; Vehicleen-GB
Aparece en las colecciones: Artículos

Ficheros en este ítem:
Fichero Tamaño Formato  
IIT-25-164R_preview3,09 kBUnknownVisualizar/Abrir


Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.