GithubHelp home page GithubHelp logo

rolling_code_attack_challenge_response_solution's Introduction

rolling_code_attack_challenge_response_solution

Is a project divided into two different parts: a first attack part, where an attack theorised by Samy Kamkar at DefCon is implemented, and a second part where a defensive solution capable of countering the attack is implemented.

Abstract

The automotive industry is constantly evolving, driven by technological innovations that make vehicles ever more advanced. From the race towards autonomous driving to the creation of cars completely based on electronic and intelligent components, the automotive sector is undergoing an unprecedented transformation. However, with this evolution also comes the need to address crucial security issues, particularly in the field of cybersecurity.

In the modern automotive context, digital security has become a key pillar. Today's cars are equipped with complex, interconnected systems, ranging from engine management to infotainment systems and assisted driving capabilities. While this interconnectedness offers unprecedented advantages in terms of comfort and safety, it also brings significant challenges from a cyber security perspective.

It is important to emphasise that, despite the growing understanding of cyber attacks, radio attacks, especially those operating at sub-GHz frequencies, tend to be underestimated. In fact, they are incredibly powerful and can have a significant impact on the security of devices operating in these frequencies. It is crucial to realise that such attacks are not limited to the automotive sector; they can be performed on a wide range of devices operating at Sub-GHz frequencies, including alarms, gates and other technologies.

Within this thesis project, such an attack will be explored, highlighting its applicability in the automotive world and in other areas, such as alarm and gate devices. The practical example will demonstrate how Sub-GHz radio attacks pose a significant risk, which will require in-depth understanding and appropriate security measures to mitigate the negative effects on the security of affected devices and systems.

Subsequently, the project will endeavour to propose an innovative solution aimed at enhancing the security of the access protocol. This solution will be based on the design and implementation of a secure and robust communication protocol.

Folders

Rolling_Jamming_Attack

rolljam

Challenge_Response_Security

def

rolling_code_attack_challenge_response_solution's People

Contributors

filippoveronesi avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.