Unlike PCs and mobile devices, smart TVs don't allow consumers to confi gure privacy and security options. A review of Hybrid Broadcast Broadband TV, which delivers Web content to smart TVs and settop boxes, considers the implications of this limitation.S mart entertainment devices such as TVs, game consoles, and Blu-ray players are gaining popularity in households worldwide. Smart technology o ers users extra features and convenience by connecting to the Internet, with third parties providing real-time information and content directly to users' devices.In this article, we focus on Hybrid Broadcasting Broadband TV (HbbTV), a standardized technique for providing video on demand and information services to smart TVs and set-top boxes. According to a recent report, international interest in HbbTV is growing steadily; 1 in 2014, 92 percent of Germany's smart TVs had HbbTV functionality. 2 Essentially, HbbTV presents Web content as an overlay on regular TV programs. Although standard Web browsers on PCs and mobile devices support privacy and security options such as "private mode" and cookie preferences, smart TVs don't let consumers con gure such options. Here, we describe HbbTV and discuss its implications for consumers' privacy and security.
Security and Privacye evolution of smart TVs and set-top boxes has expanded the interactions possible between consumers and devices, with multiple consequences for security and privacy. We can split these interactive functionalities into vendor and HbbTV applications.Vendor applications aren't standardized that is, they di er from vendor to vendor and from device to device and therefore aren't generally assessable. As discussed in the "HbbTV Standard" sidebar, the Digital Video Broadcast (DVB) stream triggers HbbTV applications. A DVB-level a ack can manipulate an HbbTV URL or, if applications are transferred by a DSM-CC (Digital Storage Media Command and Control) object carousel, the entire application. Yossef Oren and Angelos Keromytis showed that an a ack on the DVB stream can cause multiple devices to receive malicious URLs or content. 3 Because the HbbTV standard supports overlays on currently running TV programs, it's possible for a phishing a ack to cover the entire screen with malicious content. Even large-scale a acks via so ware vulnerabilities in underlying components are plausible; for instance, Andrew Karpow and Benjamin Michéle demonstrated how an a ack can execute system commands on outdated media players via USB sticks. 4 In short, if an HbbTV application uses a vulnerable media player, other malicious applications can exploit it. 5 e rst devices with HbbTV 2.0 support are expected to appear in 2016. Because the HbbTV 2.0 standard will allow increased interaction between HbbTV applications and other devices such as tablets and smartphones, appropriate security measures must guarantee that the HbbTV device controls only authorized and approved devices.is increased device interaction poses security concerns. Malicious HbbTV applications could control devices conne...