Acid attacks on pin-tumbler locks

被引:0
|
作者
Meisel, Lars Oliver [1 ]
Weber, Matthias [2 ]
机构
[1] Bundeskriminalamt, KT 22 Formspuren, D-65173 Wiesbaden, Germany
[2] Landeskriminalamt Nordrhein Westfalen, Dept 55, Dusseldorf, Germany
关键词
burglary; EDX; lock picking; nitric acid; pin-tumbler lock; SEM;
D O I
10.1111/1556-4029.15647
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
Recently, an unusual method of home burglary has emerged in several European countries. Nitric acid is used to attack the tumbler lock of the front door. The aim of this study is to gain insights into the technical functioning of this method and to evaluate the advantages and disadvantages of this modus operandi. For this purpose, four pin-tumbler locks were attached to a custom-made holder and 65% nitric acid was successively injected into the key channel using a syringe. The locks were checked manually and using a CT scanner to see whether the lock was overcome and how the acid did affect the pins and springs. In three out of four cases the lock was overcome. The shortest time was 22 min until the pin pairs could be removed and it was possible to turn the core with a screwdriver. Overall, the results show that the modus operandi works with standard locks. According to the authors, the long duration and the high health risk are significant disadvantages in relation to other overcoming methods.
引用
收藏
页码:340 / 348
页数:9
相关论文
共 50 条
  • [1] Research on Pin Tumbler Locks and the Characteristics of Surface Traces Formed by Unlocking Guns
    Gao Yi
    Jin Yifeng
    Bai Yanping
    Mei Hongcheng
    Xu Zhen
    INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND APPLIED COMPOSITE MATERIALS, 2018, 307
  • [2] Innovative Design of Pin Tumbler Lock based On TRIZ
    Wang, Fei
    Yu, De Ping
    Yao, Jin
    MANUFACTURING ENGINEERING AND AUTOMATION II, PTS 1-3, 2012, 591-593 : 71 - 76
  • [3] Pin Tumbler Lock: A Shift based Encryption Mechanism for Racetrack Memory
    Zhang, Hongbin
    Zhang, Chao
    Zhang, Xian
    Sun, Guangyu
    Shu, Jiwu
    2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 354 - 359
  • [4] Formal analysis of PIN block attacks
    Steel, Graham
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 257 - 270
  • [5] Timing Attacks on PIN Input Devices
    Kune, Denis Foo
    Kim, Yongdae
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 678 - 680
  • [6] PUSH-PIN CARRIER LOCKS ICS TO PRINTED-CIRCUIT POSTS
    不详
    MACHINE DESIGN, 1978, 50 (09) : 30 - 30
  • [7] Blunting Differential Attacks on PIN Processing APIs
    Focardi, Riccardo
    Luccio, Flaminia L.
    Steel, Graham
    IDENTITY AND PRIVACY IN THE INTERNET AGE, PROCEEDINGS, 2009, 5838 : 88 - +
  • [8] Timing Attacks on PIN Input in VoIP Networks
    Zhang, Ge
    Fischer-Huebner, Simone
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 75 - 84
  • [9] DragPIN: A Secured PIN Entry Scheme to Avert Attacks
    Srinivasan, Rajarajan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (02) : 213 - 223
  • [10] Advanced Pin Entry Method By Resisting Shoulder Surfing Attacks
    Mali, Yogesh Kisan
    Mohanpurkar, Arti
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 37 - 42