Hardware & Making

Replication Prohibited

3D printed key attacks
Hall 2
Eric Wustrow
Physical keys and locks are one of the oldest security mechanisms still employed today. In this talk, we will discuss how 3D printing keys enable attacks against many modern lock systems. We will describe projects researchers and hobbyists have done involving 3D printed keys, and present our own research on automating several of these attacks in order to demonstrate how easy they are to do. Ultimately, we hope to describe the current state of 3D printed keys, and their impact on the physical security systems we most often take for granted.
Physical keys and locks are one of the oldest security mechanisms still employed today. Despite their long-standing history, many still suffer from known attacks including bumping, impressioning, teleduplication, and rights amplification. To mitigate these attacks, many lock systems rely on restricted keyways and use blanks that are not sold to the general public, making it harder for attackers to obtain them. Often the key blank designs themselves are patented, further discouraging distribution or manufacture by even skilled machinists. In this talk, we will investigate how rapid prototyping and 3D printing tools can be used to attack modern lock systems. Even when manufactured on commodity machines, 3D printed keys are now good enough to be used in a variety of attacks. We demonstrate this by showing several example attacks against popular locks, from 3D printing the TSA master key, to our own attacks against restricted key systems. To test the strength of modern 3D printed keys, we present results from our paper of a controlled analysis on a range of printed materials from plastic to metal, and show that it is possible to cheaply make or purchase 3D printed keys that are practically as strong as real keys. We also present a tool that can automatically create a CAD model of a key blank, given only a single picture of the front of the corresponding lock. This tool makes the attacks that 3D printing enables against locks even easier and cheaper by no longer requiring skilled 3D design knowledge, and provides a warning to start looking for alternatives to secure physical goods. Lastly, we describe defenses that modern lock manufacturers can do to ensure their locks are not easily bypassed by 3D printing technology, including new lock designs, as well as putting more emphasis on existing designs that may resist 3D printing-enabled attacks for years to come. Website: https://keysforge.com/ Paper: https://keysforge.com/paper.html

Additional information

Type lecture

More sessions

12/27/15
Hardware & Making
Hall 2
News about the rad1o half a year later – cool stuff that happened, and why you need an SDR.
12/27/15
Hardware & Making
Clifford
Hall 1
Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and verification tool. Project IceStorm aims at reverse engineering and documenting the bit-stream format of Lattice iCE40 FPGAs and providing simple tools for analyzing and creating bit-stream files, including a tool that converts iCE40 bit-stream files into behavioral Verilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully documented and supported by the tools. Arachne-PNR is an Open Source place&route tool ...
12/27/15
Hardware & Making
rahra
Hall 6
The Amiga was one of the most powerful and wide srpead computers in the late 80's. This talk explains its hardware design and programming.
12/27/15
Hardware & Making
INCO
Hall 6
CubeSat are small standardized satellites typically flown as secondary and containerized payloads piggybacking on the launches of larger satellites. Their low entrance cost have been a revolution in opening access to space for a broad range of institutions. In this talk the basics of CubeSat standards, technology and development are going to be presented. The goal is to proliferate the knowledge of what it takes to successfully build, launch and operate a CubeSat within and beyond the hacker ...
12/27/15
Hardware & Making
Gianteye
Hall 6
In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take you through the process of turning a puddle of goo into a working soft robot. He will take you through the different mechanisms that can be created, simple processes for fabricating soft robots, and methods for joining elements together into sophisticated assemblies.
12/28/15
Hardware & Making
Miguel Chaves
Hall 6
There are two lines of research in the world about decreasing poverty in low-income communities: (1) to create solutions and share them with people living in low-income areas or (2) build the capacity of people from low-income areas to create their own solutions. Maker Spaces to BoP have showed great results to the strategy two. The lecture has the goal to expose all the experience we have learnt in the last three years to project, implement and manage a Maker Space in a favela in São Paulo - ...
12/28/15
Hardware & Making
fractalfox
Hall G
This talk is a brief recap into EEG / BCI for hackers, makers, researchers, and artists. It will give an overview of current consumer devices and their flaws, and subquently present fully open-source, high-quality hardware and software. Finally implications for the future of modern society are outlined, especially how commercial EEG consumer devices or services may be exploited by corporations to cloudsource market research, or spy on health conditions, brain states or even leak private ...