For many years, the keyless start-up systems that car owners have become accustomed to have been repeatedly exposed to safety hazards – thieves can use malicious devices to effortlessly open the door in seconds. The Prius of the former New York Times technical columnist Nick Bilton was repeatedly stolen, and "experienced" said that the thief needed to use the signal amplification device to transfer his car key in the front hall to the keyless start system of the vehicle. . He finally came up with a solution – keep the keys in the fridge. Now the vehicle safety research team from Germany has released new results. The wireless intrusion scheme they found may force thousands of drivers to develop a "good habit" to put the keys in the refrigerator. The ADAC Auto Club in Munich released its research results last week. They conducted wireless “amplification attack†tests on dozens of cars in the process, and smoothly opened the door with their wireless remote control keys without the driver’s knowledge. Even successfully ignited. ADAC researchers point out that 24 models from 19 manufacturers are currently affected. These models not only receive the command to open the door, but also start smoothly. "This vehicle security vulnerability makes it easy for thieves to achieve evil purposes," an article reviewing the results of the ADAC study pointed out. “The wireless connection between the key and the vehicle can easily be extended to hundreds of meters, no matter where the original key is located – for example in your home or in the owner's pocket.†The hacking of vehicle keys has long been nothing new: Swiss researchers published a paper in 2011 that elaborated on such amplified attacks. But ADAC researchers say the cost of implementing such attacks has fallen dramatically: compared to the software-defined wireless attacks that thousands of dollars are discovered by Swiss researchers, today's attack equipment costs only $225. In addition, ADAC has expanded the scope of vehicles under test and released specific vehicle brands and models that are vulnerable to attack; they concluded that hundreds of thousands of mainstream models currently parked on roadsides and parking lots may be subject to The impact of wireless theft. High-risk vehicle brands and models Let's look at the high-risk model statistics given by the survey results, mainly focusing on models sold in the European market: Audi A3, A4 and A6, BMW 730D, Citroen DS4 CrossBack, Ford Galaxy and Wingbo, Honda HR-V, Hyundai Santa Fe CRDi, Kia Optima, Lexus RX 450h, Mazda CX-5, MINI Clubman, Mitsubishi Outlander, Nissan Hacker and Lee, Opel Ampera, Land Rover Range Rover, Renault Traffic, Ssangyong TIvoli XDi, Subaru Levorg, Toyota RAV4, Volkswagen Golf GTD And Touran 5T. At present, only the BMW i3 can resist the attack of researchers, but the thief can still successfully complete the engine ignition. In addition, the researchers concluded that – although not yet proven – such attacks could affect many other models, including those that are more common in the US market. A video released by ADAC shows real-life theft cases suspected of using the technology, as well as internal research images. How intrusion works ADAC researchers first designed two wireless devices, one foot away from the victim's vehicle and two near the victim's key placement. The former is used to impersonate the vehicle key and access its keyless activation system, thereby triggering the vehicle to signal to search for the wireless response of the peripheral key. After that, the information is transmitted between the attacker's two 300-foot wireless devices—including passing the request to the key and returning the correct response to the vehicle. The entire attack process only requires the use of a few cheap chips, batteries, wireless transmitters and antennas, the ADAC researchers explained. However, they are not planning to announce a complete technical solution to prevent the design from being used directly by malicious thieves. "We don't want to publish exact wiring drawings, otherwise even young people who are not familiar with technology may be able to copy equipment out of curiosity," said ANC researcher Arnulf Thiemel. In fact, this kind of equipment is very simple. "Ordinary sophomore electronics students can complete the construction without guidance." battery pack current sensor,battery current sensor function,battery current sensor test,allegro current sensor Shanghai Zhilong Electronic Technology Co.,Ltd , https://www.zhilongsensor.com