Morgan, Danielle Melissa, juhendajaÕunaid, JaneTartu Ülikool. Loodus- ja täppisteaduste valdkondTartu Ülikool. Arvutiteaduse instituut2023-10-262023-10-262023https://hdl.handle.net/10062/93770Hackers have found different ways to exploit the vulnerabilities in remote keyless entry systems used in cars. This paper aims to give an overview of some of the attacks and assess whether some of Estonia’s most popular car models are vulnerable to various forms of replay attacks. As a result, this thesis will give an overview of which of the cars were vulnerable to the experiment attacks and why other cars were not vulnerable. Even though all cars tested used rolling code to thwart replay attacks, most of the cars were still vulnerable.engopenAccessAttribution-NonCommercial-NoDerivatives 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-nd/4.0/SDRGNU RadioHackRFURHReplay attackbakalaureusetöödinformaatikainfotehnoloogiainformaticsinfotechnologyInvestigating the Effect of Replay Attacks on Popular Car Models in EstoniaThesis