Locks restrict access to anyone lacking the correct key. As security
components, we depend on locks to secure our most valuable possessions.
Most attacks demonstrated in recent years involve manipulation of the
lock components with special picking tools, but what if we focused on
using incorrect or blank keys to make a variety of tools? Bumping is a
good example, but there are many other ways incorrect or modified keys
can be used to defeat locks. Like the cryptography world, physical
Keys are vulnerable to attack in even the highest security locks.
This talk focuses on using modified key blanks to open, decode, and
bypass modern lock designs, including many high security locks. We
demonstrate these attacks and discuss the security implications of
key-based attacks on modern lock designs.
Sign in to add slides, notes or videos to this session