Following the theft of my brother's car (a modern Audi Q-something), I got interested in how contemporary cars are protected.
The authentication of the key to the car is dreadful (I work in information security and how certificates are handled is painful to read) but even if that part was done right, an amplification attack would be possible.
The idea is that someone triggers on the car a request for the key presence (by pulling the handle for instance) and that request is amplified so that it reaches the key which is in the nearby house. That way the car is tricked into believing that the key is close and the doors / ignition are unlocked).
The paper Are We Really Close? Verifying Proximity in Wireless Systems from 2016 explains the attack quite well. The basic approach to protection is to measure the time the signal traveled to compute the real distance.
Let's say that the appropriate range for a key to be "close" to the car is 0 to 1 meter. 2 meters and above is "away". This means that the electronics of the car needs to distinguish a round trip for a key close to the the car of
$$t_{close}=2 \times \frac{1}{3 \times 10^{8}} \approx 6 \text{ns}$$
from a "far away" one
$$t_{away}=2 \times \frac{2}{3 \times 10^{8}} \approx 12 \text{ns}$$
This is about 5 to 10 nanoseconds of difference minimum.
Is this a realistic timing for consumer devices? (consumer in the sense that they are mass produced in cars and need to be accurate within this timeframe)
The calculation is done in the car, so miniaturization and power does not matter.