Advertisement

Digital Television and Smart TVs

  • Benjamin Michéle
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

With the introduction of digital television and Smart TVs, the TV landscape has changed radically. Smart TVs feature a variety of digital services, ranging from video-on-demand services to broadcast-related, interactive applications. This change has added a lot of complexity to the formerly rather isolated television system. As a side effect, these connected devices are becoming a target for criminals, threatening the security and privacy of consumers. This work gives insights into several practical attack vectors, together with experimental results and countermeasures.

Keywords

Random Access Memory Digital Right Management Block Cache Memory Layout Digital Right Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    F. Basse. Exploitation of Philips Smart TV. Blog post, Fred’s notes, Nov. 2014. http://www.fredericb.info/2014/11/exploitation-of-philips-smart-tv.html.
  2. 2.
    F. Basse. Sécurité des ordivisions: Exploitation de CVE-2012-5958. In Proceedings of the Symposium sur la sécurité des technologies de l’information et des communications, June 2014.Google Scholar
  3. 3.
    A. Dewdney and P. Ride. The Digital Media Handbook. Media Practice. Routledge, 2nd edition, 2014.Google Scholar
  4. 4.
    ETSI. Hybrid Broadcast Broadband TV (TS 102 796 V1.2.1). European Telecommunications Standards Institute, Nov. 2012.Google Scholar
  5. 5.
    Gumstix Inc. Overo Fire COM, Apr. 2009. https://store.gumstix.com/overo-fire-com.html.
  6. 6.
    HD Moore. Security flaws in universal plug and play: Unplug, don’t play. Whitepaper, Rapid7, Jan. 2013. https://community.rapid7.com/docs/DOC-2150.
  7. 7.
    IHS DisplaySearch. Quarterly global TV shipment and forecast report, Apr. 2015.Google Scholar
  8. 8.
    J. Jonsson and B. Kaliski. Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1, February 2003. RFC3447.Google Scholar
  9. 9.
    A. Karpow. Hardware and software security of modern Smart TVs. Master’s thesis, Technische Universität Berlin, June 2014.Google Scholar
  10. 10.
    Linux Programmer’s Manual. fork – create a child process (FORK(2)). http://man7.org/linux/man-pages/man2/fork.2.html.
  11. 11.
    Linux Programmer’s Manual. proc – process information pseudo-filesystem (PROC(5)). http://man7.org/linux/man-pages/man5/proc.5.html.
  12. 12.
    B. Michéle and A. Karpow. Watch and be watched: Compromising all Smart TV generations. In Proceedings of the 11th Consumer Communications and Networking Conference (CCNC), pages 351–356. IEEE, Jan. 2014.Google Scholar
  13. 13.
    C. Mulliner and B. Michéle. Read it twice! A mass-storage-based TOCTTOU attack. In Proceedings of the 6th Workshop on Offensive Technologies, WOOT ’12, pages 105–112. USENIX Association, 2012.Google Scholar
  14. 14.
    Samsung. Evolution Kit SEK-2000, Mar. 2014. http://www.samsung.com/us/video/tvs-accessories/SEK-2000/ZA.
  15. 15.
    SamyGO. SamyGO, Samsung firmware on the go. http://wiki.samygo.tv.
  16. 16.
    TNS Infratest. Digitalisierungsbericht 2014: Daten und Fakten. Technical report, Die Medienanstalten, July 2014. http://www.die-medienanstalten.de/publikationen/digitalisierungsbericht.html.

Copyright information

© The Author(s) 2015

Authors and Affiliations

  1. 1.Security in TelecommunicationsTechnische Universität BerlinBerlinGermany

Personalised recommendations