We have already developed some products directly as a result of this work and future products will continue to reflect added protection for this threat. "This includes testing various scanning and printing devices available on the market, from highest quality to lowest. "Medeco and ASSA ABLOY have been researching this topic and have been actively pursuing improvements in our technology to help minimize this threat," Roberson wrote in an email. Schlage responded, saying it wasn't ready to comment before publication.Ī Medeco spokesperson Clyde Roberson called the Michigan researchers' work "important and informative." He added that the company has been working to create locks with electronic and mechanical components that can't be 3-D printed. WIRED reached out to some of the lock companies whose restricted keys could be duplicated with Keysforge, including Medeco, Yale, Schlage, EVVA and BEST. ![]() "This reopens those attacks."Īttackers and criminals, especially the high end ones, will learn these attacks. "One of the biggest defenses for these methods was restricted keyways," says Burgess. Medeco also employs some of the best methods and technology to prevent their locks from being bypassed. Their locks protect assets across the globe and can be found guarding all types of buildings, from homes and businesses to military facilities. Using Keysforge to build a series of 3-D printed keys would make that trial-and-error process vastly easier. Medeco is a U.S based lock manufacturer that has been an industry leader for nearly 50 years. Blazed showed that in a building or facility that uses master keys, a key holder can create a series of keys with small variations on his or her regular key and eventually create a master key that opens many more doors. Or it could even allow what the researchers call "privilege escalation" attacks, like what University of Pennsylvania computer scientist Matt Blaze has demonstrated. Like the earlier, unreleased Photobump software, the publicly accessible Keysforge software could enable the easy creation of bump keys for restricted key profiles. Researchers showed in 2009 they could find the measurements of a key's cuts from a photograph taken from as far as 200 feet away and at an angle. Replicating restricted keys allows for more than the unlimited copying of a key by, say, a rogue employee: It could also make it possible to duplicate a high-security key from a photograph taken from a distance with a high-powered lens.
0 Comments
Leave a Reply. |