Vulnerabilities / Threats

11/3/2008
02:32 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Lock-Picking Made Easy: New Key Duplication Tool Demonstrates Physical Security Risk

UC-San Diego researchers show that a photograph is all you need to duplicate a key

It's a physical security nightmare: Computer scientists have created software that can duplicate the key to your office or house -- without having the key itself in hand. All it needs is a photo image of the key to duplicate it.

The University of California at San Diego (UCSD) scientists say the goal was to demonstrate how keys are not really secret, according to a post on the UCSD Website. "Technology trends in computer vision are at a point where we need to consider new risks for physical security systems," said Kai Wang, one of the UC San Diego researchers and a computer science graduate student.

The key duplication system use a key's "bitting code," which is based on the series of around six cuts in most U.S. residential locks. These patterns represent a numeric code that instructs how to open the lock. The system analyzes an image of the key, along with the brand and key type, to build a duplicate key. The researchers demonstrated how the system works using either a cell phone camera image, or even a five-inch telephoto lens shooting a key from the rooftop of a campus building.

"This idea should come as little surprise to locksmiths or lock vendors," said Stefan Savage, a computer science professor from UC San Diego's Jacobs School of Engineering, who headed up the research. "There are experts who have been able to copy keys by hand from high-resolution photographs for some time. However, we argue that the threat has turned a corner -- cheap image sensors have made digital cameras pervasive and basic computer vision techniques can automatically extract a key's information without requiring any expertise."

The UCSD researchers haven't released their software publicly. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14072
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, image_buffer_resize in fromsixel.c, and sixel_decode_raw in fromsixel.c.
CVE-2018-14073
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_allocator_new in allocator.c.
CVE-2018-14068
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add an admin account via admin.php?m=Admin&c=manager&a=add.
CVE-2018-14069
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add a user account via admin.php?m=Admin&c=member&a=add.
CVE-2018-14066
PUBLISHED: 2018-07-15
The content://wappush content provider in com.android.provider.telephony, as found in some custom ROMs for Android phones, allows SQL injection. One consequence is that an application without the READ_SMS permission can read SMS messages. This affects Infinix X571 phones, as well as various Lenovo p...