Reverse Engineering a Car Immobilizer

dc.contributor.authorLaks, Jürgen
dc.contributor.otherTartu Ülikool. Loodus- ja täppisteaduste valdkondet
dc.contributor.otherTartu Ülikool. Tehnoloogiainstituutet
dc.date.accessioned2023-10-09T13:39:58Z
dc.date.available2023-10-09T13:39:58Z
dc.date.issued2023
dc.description.abstractCar immobilizers are devices that prevent car thefts by immobilizing cars if a specific token, usually carried by the intended driver, is not in proximity to the car. This work documents the steps taken to reverse engineer the Skybrake DD2+ immobilizer in order to discover its security weaknesses. These steps include capturing the data that is transferred between the components of the immobilizer and analyzing the captured data. The firmware image of the immobilizer was dumped and analyzed. This work presents multiple possible attack vectors that this immobilizer is vulnerable to. Most notably this work demonstrates methods for bypassing the layer of security the immobilizer is supposed to provide.et
dc.identifier.urihttps://hdl.handle.net/10062/93438
dc.language.isoenget
dc.publisherTartu Ülikoolet
dc.rightsembargoedAccesset
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectimmobilizers, reverse engineering, firmware analysiset
dc.subject.othermagistritöödet
dc.titleReverse Engineering a Car Immobilizeret
dc.typeThesiset

Files