View Single Post
      03-16-2016, 04:12 AM   #161
Zooks527
Captain
310
Rep
886
Posts

Drives: 2015 M235xi / 2005 Tacoma 4x4
Join Date: Jul 2009
Location: Mansfield, MA

iTrader: (0)

Quote:
Originally Posted by scottomfg View Post
But the data is encrypted. You can't reverse engineer software to get the encryption key.
Typically, the encryption key is negotiated as part of the pairing. I'd assume the path of attack would be to reverse engineer the software linking routine to negotiate your own encryption key when you connect. An attack doesn't want to listen to the datastream while the adapter is connected to your phone, it wants to negotiate its own link.

Again, low probability event, as many of the BT OBD plugs don't do any of it at all, so it's easier to go after the low hanging fruit before chasing a unit with a custom security scheme. And since I haven't spent any time looking at the Automatic adapter, it's implementation of security might be far higher than I am assuming. Still, if there isn't a hardware "pair now" button, the dongle is vulnerable to a brute force attack on the pairing PIN. Pushes it to an even lower probability - first you need to be found by an attacker looking for that type of adapter, then the attacker needs enough time to brute force a large number of codes, all while the adapter remains active on the ECU.
__________________
2015 M235xi coupe, Black Sapphire Metallic, Black Leather, Fineline Stream trim, Steptronic, xDrive, ZPP, ZTP, ZCW, ZDA, ZDB, 5DP, hk w/BimmerTech amp, Enhanced BT

Prior 40 years: 67 BelAir wagon / 68 LeMans Tempest / 70 Mustang Mach 1 / 72 El Dorado / 78 Corvette / 81 Subaru GL wagon 4WD / 83 s10 Blazer 4x4 / 85 Bronco 4x4 / 96 Bronco 4x4 / 04 Passat 4mo / 09 BMW 335xi

Last edited by Zooks527; 03-16-2016 at 04:55 AM..
Appreciate 0