Vulnerabilities / Threats

11/3/2008
02:32 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Lock-Picking Made Easy: New Key Duplication Tool Demonstrates Physical Security Risk

UC-San Diego researchers show that a photograph is all you need to duplicate a key

It's a physical security nightmare: Computer scientists have created software that can duplicate the key to your office or house -- without having the key itself in hand. All it needs is a photo image of the key to duplicate it.

The University of California at San Diego (UCSD) scientists say the goal was to demonstrate how keys are not really secret, according to a post on the UCSD Website. "Technology trends in computer vision are at a point where we need to consider new risks for physical security systems," said Kai Wang, one of the UC San Diego researchers and a computer science graduate student.

The key duplication system use a key's "bitting code," which is based on the series of around six cuts in most U.S. residential locks. These patterns represent a numeric code that instructs how to open the lock. The system analyzes an image of the key, along with the brand and key type, to build a duplicate key. The researchers demonstrated how the system works using either a cell phone camera image, or even a five-inch telephoto lens shooting a key from the rooftop of a campus building.

"This idea should come as little surprise to locksmiths or lock vendors," said Stefan Savage, a computer science professor from UC San Diego's Jacobs School of Engineering, who headed up the research. "There are experts who have been able to copy keys by hand from high-resolution photographs for some time. However, we argue that the threat has turned a corner -- cheap image sensors have made digital cameras pervasive and basic computer vision techniques can automatically extract a key's information without requiring any expertise."

The UCSD researchers haven't released their software publicly. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19186
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the route.php paymentMethod parameter.
CVE-2018-19187
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via an arbitrary parameter name or value that is mishandled in a success.php echo statement.
CVE-2018-19188
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the success.php fort_id parameter.
CVE-2018-19189
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via an arbitrary parameter name or value that is mishandled in an error.php echo statement.
CVE-2018-19190
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the error.php error_msg parameter.