2018
DOI: 10.1007/s11416-018-0320-3
|View full text |Cite
|
Sign up to set email alerts
|

Smart-TV security: risk analysis and experiments on Smart-TV communication channels

Abstract: This paper focuses on the security threats related to smart-TV communication channels. A risk analysis is carried out to have a global view of potential risks that need to be addressed in the context of Smart-TV communication links. The feasibility of several identified risks is investigated experimentally. The experiments show some relevant security-related vulnerabilities on Smart-TV communications channels. Countermeasures to address these vulnerabilities are also investigated.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…In recent years, smart TV security became a widely studied issue, not only among scientists [28][29][30], but it also caught the attention of the groups in the hacking community (like OpenLGTV [31] or SamyGO [32]). One part of the activity of such groups is a modification of TV systems to allow all users to take full advantage of their devices.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, smart TV security became a widely studied issue, not only among scientists [28][29][30], but it also caught the attention of the groups in the hacking community (like OpenLGTV [31] or SamyGO [32]). One part of the activity of such groups is a modification of TV systems to allow all users to take full advantage of their devices.…”
Section: Related Workmentioning
confidence: 99%
“…M. Newlin [23] developed MouseJack, a tool able to sniff or inject keystrokes on wireless, non-Bluetooth mice and keyboards. Y. Bachy et al [3] discovered vulnerabilities on DVB-T communications used for smart TVs that allowed them to inject crafted messages and remotely take control of the smart TVs. A. Francillon et al [12] As several attacks (e.g.…”
Section: Iot Attacksmentioning
confidence: 99%
“…The diagnosis of the frequency of the anomalous radio activity is based on the evaluation of the 4-norm distance between each point of the reconstructed spectrogramŵ and the measured spectrogram w between the start date t s and the end date t e estimated by the anomaly time diagnosis component. A weight is associated with each frequency f , as stated in (3). The estimated frequency associated with the detected anomaly is the frequency with the maximum weight, as shown in (4).…”
Section: Frequential Diagnosismentioning
confidence: 99%
See 2 more Smart Citations