Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore critical security vulnerabilities in Shimano's Di2 wireless gear-shifting technology through this 17-minute conference talk presented at USENIX WOOT '24. Discover how researchers from Northeastern University and UC San Diego conducted blackbox analysis of the proprietary wireless protocol, revealing three major security flaws: vulnerability to replay attacks, susceptibility to targeted jamming, and information leakage through ANT+ communication. Learn about successful experimental demonstrations of replay attacks executed from up to 10 meters away using software-defined radios, allowing attackers to control gear shifting without cryptographic keys. Understand how targeted jamming attacks can disable specific bikes' gear shifting systems without affecting nearby equipment. Examine proposed countermeasures and their implications for improving wireless communication security in cycling equipment.