Volkswagen and other cars stored stolen software vulnerabilities to hide consumers for two years
sina science and technology news on the morning of August 17, Beijing time, CNN reported over the weekend that information security researchers found more than two years ago that a technology used in 126 cars made them vulnerable to hacker attacks. However, the public has not made this discovery public for two years through legal channels
three European computer scientists discovered these vulnerabilities in 2012 and informed the auto manufacturers. However, due to legal measures taken by the public, this discovery has been kept confidential. Until now, these documents have been released through a legal settlement agreement
this vulnerability is related to the smart key currently used in cars. In the past, thieves needed to start the car manually. At present, computer chips are used in car keys and ignition switches. Only after the two chips are close to each other and send the correct code can the car start
this technology makes the diversity of thief ring stiffness testing machine unable to steal cars. Even if they can copy physical keys, the car cannot start without chips
however, information security researchers have found that there are loopholes in these chips. The chip uses outdated encryption technology. If someone monitors the communication process of the chip only twice, then the mode can be recognized by the computer, and then copy the key and chip
the UK exhibition focuses on new processes and utilization based on thermosetting and thermoplastic matrix materials. "It's like you use the word 'password' as a password," said Flavio Garcia, a researcher at the University of Birmingham Therefore, the valet driver may steal the car, and the user may also steal the car after renting it and returning it
researchers pointed out that more powerful encryption technology will make it more difficult to steal code. But to their surprise, even the most luxurious cars are still using outdated encryption technology. Roel verdut of the University of nemegen in the Netherlands said: "you might have thought that more expensive cars used better options."
the affected cars are from Audi, Fiat, Honda, Kia, Volkswagen, Volvo and other brands. These models use chips made by Swiss EM microelectronic
The research paper was published last week. The researchers presented their findings last Wednesday at the USENIX conference in Washington, D.Cthis discovery was postponed for more than two years. Working environment humidity: 20% ⑼ 0% (no condensation); The release was mainly due to public resistance. Researchers said that they told em microelectronic at the end of 2012 that they would give the company nine months to fix the problem, and then make this vulnerability public. However, in 2013, the public filed a lawsuit against these universities and researchers to prevent them from publishing this discovery publicly. A British court initially supported Volkswagen for the safety of car users, and the two sides recently reached a settlement
Volkswagen admitted in an announcement that there were technical loopholes in the company's cars. However, the public pointed out that such an attack is very complex, and non professional technicians are unlikely to use this attack. In addition, these vulnerabilities do not exist in Volkswagen's latest Golf 7 and Passat B8. The company did not comment on efforts to prevent researchers from disclosing their findings
verdut said: "we believe that the owners of these cars should know that their cars are not protected as they imagined. We are surprised that the judge does not allow us to disclose these facts." Audi, Fiat, Honda, Kia and Volvo also did not comment on the news. (sail stretching ◆ real time experimental curve analysis)
Copyright © 2011 JIN SHI