Investigating the Effect of Replay Attacks on Popular Car Models in Estonia
| dc.contributor.advisor | Morgan, Danielle Melissa, juhendaja | |
| dc.contributor.author | Õunaid, Jane | |
| dc.contributor.other | Tartu Ülikool. Loodus- ja täppisteaduste valdkond | et |
| dc.contributor.other | Tartu Ülikool. Arvutiteaduse instituut | et |
| dc.date.accessioned | 2023-10-26T08:12:16Z | |
| dc.date.available | 2023-10-26T08:12:16Z | |
| dc.date.issued | 2023 | |
| dc.description.abstract | Hackers have found different ways to exploit the vulnerabilities in remote keyless entry systems used in cars. This paper aims to give an overview of some of the attacks and assess whether some of Estonia’s most popular car models are vulnerable to various forms of replay attacks. As a result, this thesis will give an overview of which of the cars were vulnerable to the experiment attacks and why other cars were not vulnerable. Even though all cars tested used rolling code to thwart replay attacks, most of the cars were still vulnerable. | et |
| dc.identifier.uri | https://hdl.handle.net/10062/93770 | |
| dc.language.iso | eng | et |
| dc.publisher | Tartu Ülikool | et |
| dc.rights | openAccess | et |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.subject | SDR | et |
| dc.subject | GNU Radio | et |
| dc.subject | HackRF | et |
| dc.subject | URH | et |
| dc.subject | Replay attack | et |
| dc.subject.other | bakalaureusetööd | et |
| dc.subject.other | informaatika | et |
| dc.subject.other | infotehnoloogia | et |
| dc.subject.other | informatics | et |
| dc.subject.other | infotechnology | et |
| dc.title | Investigating the Effect of Replay Attacks on Popular Car Models in Estonia | et |
| dc.type | Thesis | et |