Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
Google, IBM & Microsoft Certificates — All in One Plan
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore critical security vulnerabilities in Shimano's Di2 wireless gear-shifting technology through this 17-minute conference talk presented at USENIX WOOT '24. Discover how researchers from Northeastern University and UC San Diego conducted blackbox analysis of the proprietary wireless protocol, revealing three major security flaws: vulnerability to replay attacks, susceptibility to targeted jamming, and information leakage through ANT+ communication. Learn about successful experimental demonstrations of replay attacks executed from up to 10 meters away using software-defined radios, allowing attackers to control gear shifting without cryptographic keys. Understand how targeted jamming attacks can disable specific bikes' gear shifting systems without affecting nearby equipment. Examine proposed countermeasures and their implications for improving wireless communication security in cycling equipment.
Syllabus
WOOT '24 - MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
Taught by
USENIX