BMW M3 Forum (E90 E92)

BMW Garage BMW Meets Register Today's Posts


Go Back   M3Post - BMW M3 Forum > M3 (E90 / E92 / E93) > General M3 Forum (E90 + E92 + E93)
 
Mporium BMW
Post Reply
 
Thread Tools Search this Thread
      12-30-2009, 12:31 PM   #1
smiwi
Smiwi
smiwi's Avatar
United_States
10
Rep
62
Posts

Drives: 2009 M3 Convertible
Join Date: Oct 2007
Location: Lakeway, TX

iTrader: (0)

Garage List
2009 e93 M3  [0.00]
Anyone heard of a Universal Chip for Starting BMWs with Push-Start Buttons???

My daughter's boyfriend bought a 335 a little over a week ago and had it stolen on Monday. They caught the guy and supposedly he had a key fob with a chip that will allow you to start any BMW with a push-start button.

I seems incredible to me that this would be true. If so, this would be a significant security hole that is being exploited by chop shops.

Unfortunately, the car was immediately disassembled and sold to local part shops so there is no recovering the car.

This makes me very concerned that my M3 is at high risk of being stolen. I thought the security on these cars was really good...

Has anyone else heard of this?
__________________

2009 E93, Every option...
Appreciate 0
      12-30-2009, 12:44 PM   #2
JCtx
Major General
258
Rep
5,012
Posts

Drives: No BMW yet
Join Date: May 2008
Location: El Paso TX

iTrader: (0)

Read a long thread about that issue a while ago but didn't happen in the US... if memory serves me right. Remember it was inconclusive, since nobody saw the car being driven off.

This one is more disturbing for sure, as it happened here in the US, and comes from a member of this board. Are you sure car was driven off and not towed or something?

This is the perfect opportunity to say this one more time: Why in the world we don't get a freaking key like Porsches, and even Ferraris ? It's cheaper and safer. Please keep us posted.
Appreciate 0
      12-30-2009, 12:57 PM   #3
808MGuy
Colonel
808MGuy's Avatar
220
Rep
2,339
Posts

Drives: 2009 E90 M3
Join Date: Jun 2008
Location: Oahu, Hawaii

iTrader: (3)

Quote:
Originally Posted by elp_jc View Post
Read a long thread about that issue a while ago but didn't happen in the US... if memory serves me right. Remember it was inconclusive, since nobody saw the car being driven off.

This one is more disturbing for sure, as it happened here in the US, and comes from a member of this board. Are you sure car was driven off and not towed or something?

This is the perfect opportunity to say this one more time: Why in the world we don't get a freaking key like Porsches, and even Ferraris ? It's cheaper and safer. Please keep us posted.
I wouldn't exactly say its safer as a key is probably easier to bypass than an electronic security countermeasure.
__________________
2016 Porsche Cayman GTS - Sapphire Blue / Black Full Leather Interior / Carrera S Wheels
Appreciate 0
      12-30-2009, 01:26 PM   #4
Memphis1
Lieutenant Colonel
Memphis1's Avatar
United_States
91
Rep
1,838
Posts

Drives: Z4 SDrive 35i
Join Date: Oct 2009
Location: CT

iTrader: (0)

http://news.cnet.com/Gone-in-60-seco...3-6069287.html
__________________
Appreciate 0
      12-30-2009, 01:32 PM   #5
smiwi
Smiwi
smiwi's Avatar
United_States
10
Rep
62
Posts

Drives: 2009 M3 Convertible
Join Date: Oct 2007
Location: Lakeway, TX

iTrader: (0)

Garage List
2009 e93 M3  [0.00]
They caught the guy on video - he drove it away...
__________________

2009 E93, Every option...
Appreciate 0
      12-30-2009, 01:51 PM   #6
bills742
Second Lieutenant
bills742's Avatar
33
Rep
285
Posts

Drives: '21 M2C, '08 M3, '20 323Ci
Join Date: Jan 2008
Location: Ellicott City, MD

iTrader: (2)

Very scary if this is possible
__________________
'08 M3 JB DCT Coupe /// DTEC Cree LED Angel Eyes / Mtech Super White Cornering Lights / Matte Black Kidneys & Gilles / 35-40% FormulaOne Pinnacle / VRS Boot / VRS II Diffuser / AA exhaust / Fabspeed HFC & X-pipe / Eibach Springs / RDSport Front Bumper / 19" Satin Charcoal HRE P40 / RPI Scoops / PSW (Non-electronic) / BMW Stainless Steel Pedals / LeatherZ Alcantara Boots
Appreciate 0
      12-30-2009, 02:13 PM   #7
novablackm3
Captain
125
Rep
813
Posts

Drives: Performante, G05 M50i, RR SVR
Join Date: Mar 2009
Location: Northern VA

iTrader: (3)

40 bit security ain't shit!
__________________
Huracán Performante 18- Novitec Springs | RR SVR 19 | G05 X5 M50i | E70 11 X5M retired |
Jerez Black E92 10 m3 RE SSK | AFE Filter | Fabspeed XFC / Xpipe | AA ECU 1.5v | BMW PSW | Envy Charger | Megan Exhaust
Appreciate 0
      12-30-2009, 02:58 PM   #8
Finnegan
Dog Listener
Finnegan's Avatar
United_States
703
Rep
7,850
Posts

Drives: Z4M/. Z3M, E36/46 M3
Join Date: Oct 2008
Location: Teaching the dog to slalom

iTrader: (22)

Quote:
Originally Posted by memphis2012 View Post
Like someone already said, 40 bit encryption is pretty much useless. I had no idea BMW and others were using this. 128 bit is probably minimal these days; 256 even better.

If I'm reading the article above and results from the Czech thief's methods correctly once a car-hacker has several working keys (scanned from fobs) breaking into cars becomes pretty easy. I'm guessing the actual keys aren't that much different car to car and probably have the same basic value (I'm no encryption expert but that stands to reason given this seems to be possible).

So the only "additional protection" offered is to wrap the keyfob in tin foil? "The authors also suggest that car owners wrap their keyless ignition fobs in tin foil when not in use to prevent active scanning attacks...." So I need to put a tinfoil hat on my keyfob--slick!

But if all it takes is just a laptop with a set of "good" keys then keyfob scans wouldn't be needed after reading several and successfully hacking several cars. If that's the case the tin foil isn't going to do a thing.

And the point about limiting the ignition's fob reading range isn't something that's as easy as tinfoil hat on the keyfob isn't going to do a thing.

I hope some of our tech-experts can weigh in on the actual threat level presented and some tips (if any are possible) for improving security. Based on the Hopkins study it looks like this is an issue and will just get worse with time.
Appreciate 0
      12-30-2009, 03:23 PM   #9
asheesh88
Private
5
Rep
60
Posts

Drives: 2010 Space Gray E90 M3
Join Date: Dec 2009
Location: Chicago, IL

iTrader: (0)

Hi all,

I wonder if the factory anti-theft option would serve as a second line of defense against this type of attack, or would it simply be disabled by the false signal sent from the clone.

Thanks,

Asheesh
Appreciate 0
      12-30-2009, 03:23 PM   #10
mkoesel
Moderator
United_States
7515
Rep
19,368
Posts

Drives: No BMW for now
Join Date: Jun 2006
Location: Canton, MI

iTrader: (1)

It sucks, and is basically a failure on the OEMs. However, until this become a rampant problem, I am not too concerned. Not to sound overly aloof but if this were really a huge issue, then the top stolen cars definitely would not be such common every day cars. They'd be expensive cars that the thieves can break into with this magic key.
Appreciate 0
      12-30-2009, 03:56 PM   #11
JCtx
Major General
258
Rep
5,012
Posts

Drives: No BMW yet
Join Date: May 2008
Location: El Paso TX

iTrader: (0)

Quote:
Originally Posted by 808MGuy View Post
I wouldn't exactly say its safer as a key is probably easier to bypass than an electronic security countermeasure.
I'm talking a modern key, with a chip inside, which doesn't transmit crap over the air, like a wireless 'key' like ours. And yes, nothing will stop a determined thief with time to spare, but stealing a car with a coded key is definitely harder than a keyless one.

Just to understand this issue, I have 2 questions: First, most modern garage door openers have 'rolling codes', where you can transmit the same frequency with the 2nd remote, but if not 'coded', it won't open the door, making them supposedly 100% safe. Is this what our M3s have? If so, what's the level of encryption on modern garage door openers? And is ours 64bits for sure? Just want to compare it to something we all are familiar with. Thx.
Appreciate 0
      12-30-2009, 03:59 PM   #12
jrlee53
Captain
jrlee53's Avatar
United_States
157
Rep
838
Posts

Drives: 2010 E90 M3
Join Date: Sep 2009
Location: Queens, NY

iTrader: (0)

I'm getting me one of these, fully armed

__________________


2003 Cobra -> 2010 BMW e90 M3 - Space Grey - Black on Carbon Leather Int. - BRILLIANT CAR!!
Appreciate 0
      12-31-2009, 03:55 AM   #13
mexicanmike
Captain
United_States
18
Rep
636
Posts

Drives: 09 E93 Jerez Black
Join Date: Dec 2009
Location: Morgan Hill, CA

iTrader: (0)

The article linked to is almost 3 years old, can BMW really still only be using 40 bit encryption? 40 bit is useless!!! But anyway, kinda scary........However wouldn't a good experiment be to crack the code, then write an iphone app to start your car. Hmm,found a new project.
Appreciate 0
      12-31-2009, 07:59 AM   #14
kmarei
Major General
kmarei's Avatar
Egypt
687
Rep
6,845
Posts

Drives: 2018 Audi RS5 coupe
Join Date: Jul 2008
Location: Reston, VA

iTrader: (34)

Garage List
2018 Audi RS5  [0.00]
doesn't this only apply to cars that have comfort access?
on my car (No CA) the key has to be inserted into the ignition slot for the start button to work
Appreciate 0
      12-31-2009, 08:47 AM   #15
Fanta
C
Fanta's Avatar
Canada
51
Rep
722
Posts

Drives: 740iL, M3, Carrera
Join Date: Jan 2009
Location: Ottawa

iTrader: (1)

User key and On board computer are paired. What will happen swapping both device?
Appreciate 0
      12-31-2009, 08:56 AM   #16
ihyln
Banned
United_States
85
Rep
3,384
Posts

Drives: M3post sucks
Join Date: Apr 2008
Location: M3post sucks

iTrader: (1)

Garage List
2008 M3  [0.00]
2002 530i  [0.00]
There was a video posted on the M forums of an E92 being stolen. They broke in, popped the hood, replaced the ECU, and drove off. I'd be better off putting a boot on my car instead of an alarm.
Appreciate 0
      12-31-2009, 12:36 PM   #17
Finnegan
Dog Listener
Finnegan's Avatar
United_States
703
Rep
7,850
Posts

Drives: Z4M/. Z3M, E36/46 M3
Join Date: Oct 2008
Location: Teaching the dog to slalom

iTrader: (22)

Quote:
Originally Posted by kmarei View Post
doesn't this only apply to cars that have comfort access?
on my car (No CA) the key has to be inserted into the ignition slot for the start button to work
That would make it more difficult. But thieves could unlock the car and defeat the alarm. I don't see how they could drive it off however. So they'd probably move on to another target. Thieves want fast/easy access.

I've been thinking about this a bit. Aside from the crummy 40 bit encryption, the method of gaining access may provide an answer in beefing up security. Feel free to read on (or not) re: my musings on this topic. Feel free to shoot holes in it as well....I'm just thinking out loud.

The Czech thief as well as the guys in the US study (one of the links above) seemed to have procured access to several [encryption] keys, and since he had a basis to start with he'd just run though a brute force attack (rolling though code after code) until he hit the right one. The stolen "keys" didn't give instant access if I understand correctly; he still had to go through a lot of attempts (albeit quickly) to gain access.

It occurs to me that the system should have a lock-out feature. If you fail to enter the right key sequence several times the system should just shut down for a period, say an hour or so, or stay locked out until the owner calls BWM Assist. This is similar to what happens if you fail on login to most systems secure systems--they don't allow you to keep hacking away. This approach might defeat the brute force attacker who is just rolling through the codes trying to find one that works (it wouldn't work if your fob were "sniffed" though).

Since this doesn't require a change to hardware (fob, reader, etc.) it might be possible to add this feature via programming. Note I say "might" as I have no idea what can/can't be done with our ECU and/or the reader/encryption modules. If this were possible to "fix" with a programming change BWM or an enterprising vendor could come up with a marketable solution...

The "flaw" in this thinking is how to prevent the thing from shutting down inappropriately. The system must reject a fair number of codes given a number of BMW and other fobs on the market in a normal day as folks pass by the car, etc.--it wouldn't be a good idea to shut things down due to these "normal" failed attempts....I'm sure there's a pretty good way to set a threshold though between failed attempts per time period (10 seconds, 15 seconds, etc.) to discern "normal" vs. "attack" status. Another flaw may be that the 40 bit encryption is so weak that it doesn't take much "brute" or "force" to find the next key sequence if you've got a good database of stolen data on hand....

Fire away folks!
Appreciate 0
      12-31-2009, 01:02 PM   #18
808MGuy
Colonel
808MGuy's Avatar
220
Rep
2,339
Posts

Drives: 2009 E90 M3
Join Date: Jun 2008
Location: Oahu, Hawaii

iTrader: (3)

Quote:
Originally Posted by Finnegan View Post
That would make it more difficult. But thieves could unlock the car and defeat the alarm. I don't see how they could drive it off however. So they'd probably move on to another target. Thieves want fast/easy access.

I've been thinking about this a bit. Aside from the crummy 40 bit encryption, the method of gaining access may provide an answer in beefing up security. Feel free to read on (or not) re: my musings on this topic. Feel free to shoot holes in it as well....I'm just thinking out loud.

The Czech thief as well as the guys in the US study (one of the links above) seemed to have procured access to several [encryption] keys, and since he had a basis to start with he'd just run though a brute force attack (rolling though code after code) until he hit the right one. The stolen "keys" didn't give instant access if I understand correctly; he still had to go through a lot of attempts (albeit quickly) to gain access.

It occurs to me that the system should have a lock-out feature. If you fail to enter the right key sequence several times the system should just shut down for a period, say an hour or so, or stay locked out until the owner calls BWM Assist. This is similar to what happens if you fail on login to most systems secure systems--they don't allow you to keep hacking away. This approach might defeat the brute force attacker who is just rolling through the codes trying to find one that works (it wouldn't work if your fob were "sniffed" though).

Since this doesn't require a change to hardware (fob, reader, etc.) it might be possible to add this feature via programming. Note I say "might" as I have no idea what can/can't be done with our ECU and/or the reader/encryption modules. If this were possible to "fix" with a programming change BWM or an enterprising vendor could come up with a marketable solution...

The "flaw" in this thinking is how to prevent the thing from shutting down inappropriately. The system must reject a fair number of codes given a number of BMW and other fobs on the market in a normal day as folks pass by the car, etc.--it wouldn't be a good idea to shut things down due to these "normal" failed attempts....I'm sure there's a pretty good way to set a threshold though between failed attempts per time period (10 seconds, 15 seconds, etc.) to discern "normal" vs. "attack" status. Another flaw may be that the 40 bit encryption is so weak that it doesn't take much "brute" or "force" to find the next key sequence if you've got a good database of stolen data on hand....

Fire away folks!
Modern aftermarket car alarms and garage door openers use the same type of rolling code technology but I'm not sure what they do to counter a mass of codes thrown at it as an attack. The issue with the rolling code technology is that it uses a pre-determined algorithm for the receiver to calculate what code to expect next and what code the trasmitter will send next. If you press the transmitter while you're out of range from the receiver, the two will be out of sync. But the technology does have the ability to resync based on the code transmitted and the code expected. The algorithm can be confirmed and the transmitter and receiver will then resync to a common code. This is how it works for aftermarket car alarms and garage door openers. Now if the system is constantly transmitting like in the case of the OEM fob, I'm not sure how that works and when the code changes. But lets say somehow the code changes when the transmitter is out of range frrom the receiver, you will have to resync again. There will have to be a way for the receiver to know the difference between a random out of sync code and a full blown attack.

It seems that its not so much the code that needs to be guarded but the method of changing and recognizing the code. Better encryption could help that but encryptions are relatively easy to break unless they are constantly updated. Maybe we should just go to biometrics at this point.
__________________
2016 Porsche Cayman GTS - Sapphire Blue / Black Full Leather Interior / Carrera S Wheels

Last edited by 808MGuy; 12-31-2009 at 02:07 PM..
Appreciate 0
      12-31-2009, 01:32 PM   #19
Finnegan
Dog Listener
Finnegan's Avatar
United_States
703
Rep
7,850
Posts

Drives: Z4M/. Z3M, E36/46 M3
Join Date: Oct 2008
Location: Teaching the dog to slalom

iTrader: (22)

Interesting. So thumb print scanner or something along those lines?

Thanks for the details on how this/garage systems work. I learned something today. Cool!
Appreciate 0
      12-31-2009, 02:08 PM   #20
808MGuy
Colonel
808MGuy's Avatar
220
Rep
2,339
Posts

Drives: 2009 E90 M3
Join Date: Jun 2008
Location: Oahu, Hawaii

iTrader: (3)

Quote:
Originally Posted by Finnegan View Post
Interesting. So thumb print scanner or something along those lines?
Yup. But if you watch Mythbusters, you know that can be broken too!
__________________
2016 Porsche Cayman GTS - Sapphire Blue / Black Full Leather Interior / Carrera S Wheels
Appreciate 0
      12-31-2009, 02:16 PM   #21
driverwannabe
Private
0
Rep
50
Posts

Drives: 2008 E90 M3
Join Date: Jun 2009
Location: Columbus, OH

iTrader: (0)

I put a steering wheel lock on with the tires turned in to the curb - I did this on my mustang vert for years and left the car open. Thieves just pick another car
Appreciate 0
      12-31-2009, 02:33 PM   #22
MN M3
Private First Class
5
Rep
133
Posts

Drives: 2009 E92 M3
Join Date: Oct 2009
Location: Southern MN, USA

iTrader: (0)

From what I have read and learned, there is a lot of misinformation going on here.

The keyless entry system used by BMW is not 40-bit encoded, as stated earlier. It is currently 256-bit, so I've read. And, it does use rolling code technology. You cannot simply sit somewhere with a "scanner," grab the code, program a replacement key, and drive off in the car. What IS happening, especially in Europe, is that someone will break into the car, pop the hood, and replace the ECU with one that is keyed to a set of replacement keys that they already have. This isn't a "Gone in 60 Seconds" kind of theft - it takes time, a lot of computer skill, and a crew to do it. The average thug isn't doing this kind of theft - it is being done by professional crews, mostly on cars left out in the open. I haven't heard of a case here in the US, but it is happening in Europe, probably because replacement parts (like the kind needed to pull this off) are more readily available on the market than they are here. Plus, the M3 is such a low volume car in the US that it isn't very likely to happen. You have a much larger chance of being car jacked than this happening.

Bottom line - if a pro REALLY wants your car, he'll get it. There is nothing that is 100% effective against a theft attempt except for an armed owner blowing the brains out of whomever is making the try.
__________________
2009 E92 M3 - Jerez Black/Black w/ black carbon leather interior, 6 spd., Cold, Premium, Technology, 19" OZ Racing wheels (black), iPod/USB. Mods: aPe air filter, Borla exhaust, H&R sport springs, UUC Evo3 SS w/ DSSR, Power Pulley Kit, carbon kidney grills, Vorsteiner front air dam, carbon side gills, smoked side markers
Appreciate 0
Post Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



All times are GMT -5. The time now is 04:58 AM.




m3post
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
1Addicts.com, BIMMERPOST.com, E90Post.com, F30Post.com, M3Post.com, ZPost.com, 5Post.com, 6Post.com, 7Post.com, XBimmers.com logo and trademark are properties of BIMMERPOST