The fundamental flaws with this approach to keys is known since before 2015, but got a lot of international recognition when people found cheap ways to emulate keys through cheap software defined radios around that time.
I’m talking about the earliest cases. The earliest references depend on the particular standard of crypto. KeeLoq is a very famous rolling code standard where attacks go back to 2007 and earlier.
RollJam is known since 2014 [1]. It was popularized later through a custom device [2].