BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:2a34f68e-15bf-4270-9c2f-0edacd0b957a
DTSTAMP:20260520T195311Z
SUMMARY:Hacking TESLA Model 3 - NFC Relay Revisited
DESCRIPTION:NFC technology is widely developed in payment\; ticketing and a
 ccess control systems. In the automobiles key fob field\, Tesla Model 3 is
  one of the modern vehicles using an NFC tag as a digital car key. By impl
 ementing such a system\, allows owners driving experience much convenientl
 y.\n\nHowever\, on the other hand\, attacking methods against the NFC syst
 em also emerge endlessly. The NFC Relay attack is one of the top methods. 
 In this talk\, we will reveal the research and attack methods for Tesla Mo
 del 3 NFC key tag system. By investigating how this feature works\, and ho
 w to exploit the protocol by a design flaw. By the end of this talk\, we w
 ill demonstrate the security limitations of such a system. And the attende
 es will not only understand how to exploit Tesla's NFC key tag system. But
  can also apply the same research methods for other brands of vehicles wit
 h similar NFC technology.\n\nSpeaker(s): Huajiang "Kevin2600" Chen\, Yucha
 o (Alex) Zhang\n\nLocation: Car Hacking Vlg\n\nDiscord: https://discord.co
 m/channels/708208267699945503/735651343007744051\n\nEvent starts: 2020-08-
 08 10:00 (10:00 AM) PDT (UTC -07:00)\n\nEvent ends: 2020-08-08 11:00 (11:0
 0 AM) PDT (UTC -07:00)\n\nFor the most up-to-date information\, please eit
 her visit https://info.defcon.org\, or use HackerTracker\, which is availa
 ble for iOS and Android. This is an automated message\, and this data was 
 last modified 2020-07-31T23:59 (UTC).
URL:https://forum.defcon.org/node/234141
DTSTART:20200808T180000Z
DTEND:20200808T190001Z
LOCATION:Car Hacking Vlg
END:VEVENT
END:VCALENDAR
