Publications
2024
Csikor, L.; Lim, H. W.; Wong, J. W.; Ramesh, S.; Parameswarath, R. P.; Chan, M. C.
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems Journal Article
In: ACM Transactions on Cyber-Physical Systems, vol. 8, iss. 1, no. 5, pp. 1-25, 2024, ISSN: 2378-962X, (Open Access).
Abstract | Links | BibTeX | Tags: attack, black hat, keyfob, replay, security
@article{10.1145/3627827,
title = {RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems},
author = {L. Csikor and H. W. Lim and J. W. Wong and S. Ramesh and R. P. Parameswarath and M. C. Chan},
url = {https://doi.org/10.1145/3627827
https://cslev.vip/wp-content/uploads/2024/03/rollback_acm_tcps_journal.pdf},
doi = {10.1145/3627827},
issn = {2378-962X},
year = {2024},
date = {2024-01-14},
urldate = {2024-01-14},
journal = {ACM Transactions on Cyber-Physical Systems},
volume = {8},
number = {5},
issue = {1},
pages = {1-25},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
abstract = {Automotive Keyless Entry (RKE) systems provide car owners with a degree of convenience, allowing them to lock and unlock their car without using a mechanical key. Today’s RKE systems implement disposable rolling codes, making every key fob button press unique, effectively preventing simple replay attacks. However, a prior attack called RollJam was proven to break all rolling code–based systems in general. By a careful sequence of signal jamming, capturing, and replaying, an attacker can become aware of the subsequent valid unlock signal that has not been used yet. RollJam, however, requires continuous deployment indefinitely until it is exploited. Otherwise, the captured signals become invalid if the key fob is used again without RollJam in place.We introduce RollBack, a new replay-and-resynchronize attack against most of today’s RKE systems. In particular, we show that even though the one-time code becomes invalid in rolling code systems, replaying a few previously captured signals consecutively can trigger a rollback-like mechanism in the RKE system. Put differently, the rolling codes become resynchronized back to a previous code used in the past from where all subsequent yet already used signals work again. Moreover, the victim can still use the key fob without noticing any difference before and after the attack.Unlike RollJam, RollBack does not necessitate jamming at all. In fact, it requires signal capturing only once and can be exploited at any time in the future as many times as desired. This time-agnostic property is particularly attractive to attackers, especially in car-sharing/renting scenarios in which accessing the key fob is straightforward. However, while RollJam defeats virtually any rolling code–based system, vehicles might have additional anti-theft measures against malfunctioning key fobs, hence against RollBack. Our ongoing analysis (with crowd-sourced data) against different vehicle makes and models has revealed that ∼ 50% of the examined vehicles in the Asian region are vulnerable to RollBack, whereas the impact tends to be smaller in other regions, such as Europe and North America.},
note = {Open Access},
keywords = {attack, black hat, keyfob, replay, security},
pubstate = {published},
tppubtype = {article}
}
2022
Csikor, L.; W.Lim, H.; Ramesh, S.; Wong, J. W.; Parameswarath, R. P.; Choon, C. M.
RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems Proceedings Article
In: BlackHat USA Briefings, 2022.
Links | BibTeX | Tags: attack, black hat, keyfob, replay, rollback
@inproceedings{csikor2022blackhat,
title = {RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems},
author = {L. Csikor and H. W.Lim and S. Ramesh and J. W. Wong and R. P. Parameswarath and C. M. Choon},
url = {https://cslev.vip/wp-content/uploads/2023/12/Vulnerability__Assessment_in_Keyless_Entry_in_Cars__BH_whitepaper_-4.pdf},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
booktitle = {BlackHat USA Briefings},
keywords = {attack, black hat, keyfob, replay, rollback},
pubstate = {published},
tppubtype = {inproceedings}
}
2020
Khooi, X. Z.; Csikor, L.; Kang, M. S.; Divakaran, D. M.
In-Network Defense Against AR-DDoS Attacks Proceedings Article
In: Proceedings of the ACM SIGCOMM 2020 Conference on Posters and Demos, ACM, New York, USA, 2020.
Links | BibTeX | Tags: attack, denial-of-service, in-network, p4
@inproceedings{csikor2020dida_demo,
title = {In-Network Defense Against AR-DDoS Attacks},
author = {X.Z. Khooi and L. Csikor and M. S. Kang and D. M. Divakaran},
url = {https://cslev.vip/wp-content/uploads/2023/12/csikor2020dida_demo.pdf},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
booktitle = {Proceedings of the ACM SIGCOMM 2020 Conference on Posters and Demos},
publisher = {ACM},
address = {New York, USA},
series = {SIGCOMM '20},
keywords = {attack, denial-of-service, in-network, p4},
pubstate = {published},
tppubtype = {inproceedings}
}
Csikor, L.; Ujawane, V.; Divakaran, D. M.
On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch Journal Article
In: CoRR, vol. abs/2011.09107, 2020.
Links | BibTeX | Tags: attack, denial-of-service, openflow, ovs, sdn
@article{DBLP:journals/corr/abs-2011-09107,
title = {On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch},
author = {L. Csikor and V. Ujawane and D. M. Divakaran},
url = {https://arxiv.org/abs/2011.09107},
year = {2020},
date = {2020-01-01},
urldate = {2020-01-01},
journal = {CoRR},
volume = {abs/2011.09107},
keywords = {attack, denial-of-service, openflow, ovs, sdn},
pubstate = {published},
tppubtype = {article}
}
2019
Csikor, L.; Divakaran, D. M.; Kang, M. S.; Kőrösi, A.; Sonkoly, B.; Haja, D.; Pezaros, D. P.; Schmid, S.; Rétvári, G.
Tuple Space Explosion: A Denial-of-Service Attack against a Software Packet Classifier Proceedings Article
In: Proc. International Conference on Emerging Networking Experiments And Technologies, pp. 292–304, Association for Computing Machinery, Orlando, Florida, 2019, ISBN: 9781450369985.
Links | BibTeX | Tags: attack, denial-of-service, detection, mitigation, openflow, ovs, sdn, security
@inproceedings{csikor2019tse,
title = {Tuple Space Explosion: A Denial-of-Service Attack against a Software Packet Classifier},
author = {L. Csikor and D. M. Divakaran and M. S. Kang and A. Kőrösi and B. Sonkoly and D. Haja and D. P. Pezaros and S. Schmid and G. Rétvári},
url = {https://cslev.vip/wp-content/uploads/2023/12/csikor2019tse.pdf},
doi = {10.1145/3359989.3365431},
isbn = {9781450369985},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
booktitle = {Proc. International Conference on Emerging Networking Experiments And Technologies},
pages = {292–304},
publisher = {Association for Computing Machinery},
address = {Orlando, Florida},
series = {CoNEXT '19},
keywords = {attack, denial-of-service, detection, mitigation, openflow, ovs, sdn, security},
pubstate = {published},
tppubtype = {inproceedings}
}
2018
Csikor, L.; Rétvári, G.
The Discrepancy of the Megaflow Cache in OVS Proceedings Article
In: Open vSwitch Fall Conference, Club Auto Sport, Santa Clara, CA, 2018.
Links | BibTeX | Tags: attack, denial-of-service, openflow, ovs, sdn
@inproceedings{csikor_ovs,
title = {The Discrepancy of the Megaflow Cache in OVS},
author = {L. Csikor and G. Rétvári},
url = {https://cslev.vip/wp-content/uploads/2023/12/csikor_ovs.pdf},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
booktitle = {Open vSwitch Fall Conference},
address = {Club Auto Sport, Santa Clara, CA},
keywords = {attack, denial-of-service, openflow, ovs, sdn},
pubstate = {published},
tppubtype = {inproceedings}
}
Csikor, L.; Rothenberg, C. E.; Pezaros, D. P.; Schmid, S.; Toka, L.; Rétvári, G.
Policy Injection: A Cloud Dataplane DoS Attack Proceedings Article
In: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, pp. 147–149, ACM, Budapest, Hungary, 2018, ISBN: 978-1-4503-5915-3.
Links | BibTeX | Tags: attack, denial-of-service, ovs, sdn
@inproceedings{csikor2018sigcomm2,
title = {Policy Injection: A Cloud Dataplane DoS Attack},
author = {L. Csikor and C. E. Rothenberg and D. P. Pezaros and S. Schmid and L. Toka and G. Rétvári},
doi = {10.1145/3234200.3234250},
isbn = {978-1-4503-5915-3},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
booktitle = {Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos},
pages = {147–149},
publisher = {ACM},
address = {Budapest, Hungary},
series = {SIGCOMM '18},
keywords = {attack, denial-of-service, ovs, sdn},
pubstate = {published},
tppubtype = {inproceedings}
}