Skip to main content

Security & Privacy Implications

  • Chapter
  • First Online:
Smart TV Security

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 648 Accesses

Abstract

An insecure Smart TV ecosystem has implications for all of the involved parties: Consumers, content providers, vendors, and broadcasters. Implications include severe privacy and even safety issues for consumers, compromised DRM systems for content providers, as well as a lack of trust in vendors and broadcasters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    nc -l -p 5000 | aplay -c 2 -r 16000 -f S16_LE -.

References

  1. ARD Digital. HbbTV – Datenschutz ARD Startapplikation. http://www.ard-digital.de/hbbtv/hbbtv-datenschutz.

  2. ARD plusminus. Smart TV – Sicherheitslücken bei Internet-Betrieb, Apr. 2015. http://www.daserste.de/information/wirtschaft-boerse/plusminus/sendung/swr/smart-tv-22042015-100.html.

  3. M. B. Barcena and C. Wueest. Insecurity in the Internet of Things. Whitepaper, Symantec, Mar. 2015. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/insecurity-in-the-internet-of-things.pdf.

  4. D. Carrington. Strictly come dancing: National grid prepares for biggest surge of the year. The Guardian, Dec. 2013. http://www.theguardian.com/environment/2013/dec/20/strictly-come-dancing-bbc-national-grid.

  5. S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS ’10, pages 559–572, NY, USA, 2010. ACM.

    Google Scholar 

  6. CyanogenMod. Android community operating system. http://www.cyanogenmod.org.

  7. E. Diehl. Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012.

    Google Scholar 

  8. Digital TV Research. Connected TV forecasts. Sept. 2014.

    Google Scholar 

  9. Ericsson. Mediaroom is now part of Ericsson. http://www.ericsson.com/ourportfolio/mediaroom-landingpage.

  10. FFmpeg. The libavformat library. http://www.ffmpeg.org/libavformat.html.

  11. IHS DisplaySearch. Global TV replacement study, June 2014.

    Google Scholar 

  12. A. Karpow. Hardware and software security of modern Smart TVs. Master’s thesis, Technische Universität Berlin, June 2014.

    Google Scholar 

  13. T. Klein. A Bug Hunter’s Diary. A Guided Tour Through the Wilds of Software Security. No Starch Press, 1st edition, Nov. 2011.

    Google Scholar 

  14. C. Maier et al. t-hack.com – X300T / X301T. http://www.t-hack.com/forum.

  15. B. Michéle and A. Karpow. Demo: Using malicious media files to compromise the security and privacy of Smart TVs. In Proceedings of the 11th Consumer Communications and Networking Conference (CCNC), pages 1144–1145. IEEE, Jan. 2014.

    Google Scholar 

  16. B. Michéle and A. Karpow. Watch and be watched: Compromising all Smart TV generations. In Proceedings of the 11th Consumer Communications and Networking Conference (CCNC), pages 351–356. IEEE, Jan. 2014.

    Google Scholar 

  17. B. Michéle, J. Krämer, and J.-P. Seifert. Structure-based RSA fault attacks. In Proceedings of the 8th International Conference on Information Security Practice and Experience (ISPEC’12), volume 7232 of Lecture Notes in Computer Science, pages 301–318. Springer, 2012.

    Google Scholar 

  18. OpenWRT. A GNU/Linux based firmware program for embedded devices such as residential gateways and routers. https://www.openwrt.org.

  19. SamyGO. SamyGO, Samsung firmware on the go. http://wiki.samygo.tv.

  20. H. Schmundt. Smart-TV. Glotze glotzt zurück. Der Spiegel, 8/2014. http://www.spiegel.de/spiegel/print/d-125080841.html.

  21. L. SeungJin and S. Kim. Smart TV security - #1984 century. In Troopers, March 2013. https://www.troopers.de/wp-content/uploads/2012/12/TROOPERS13-Smart_TV_Security-Lee_beist_SeungJin.pdf.

  22. Sigma Designs. Set-Top Box IPTV and Hybrid SoCs. http://www.sigmadesigns.com/set-top-box-iptv-hybrid-socs/.

  23. R. Stinder and A. Görbing. App Architecture on Smart TVs: Analysis of a Video-on-Demand App. Bachelor’s thesis, Technische Universität Berlin, June 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benjamin Michéle .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 The Author(s)

About this chapter

Cite this chapter

Michéle, B. (2015). Security & Privacy Implications. In: Smart TV Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-20994-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20994-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20993-7

  • Online ISBN: 978-3-319-20994-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics