DocumentCode :
136302
Title :
Demo: Using malicious media files to compromise the security and privacy of smart TVs
Author :
Michele, Benjamin ; Karpow, Andrew
Author_Institution :
Berlin Inst. of Technol., Security in Telecommun., Berlin, Germany
fYear :
2014
fDate :
10-13 Jan. 2014
Firstpage :
1144
Lastpage :
1145
Abstract :
In t his demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being played back as expected. Furthermore, we show how to stealthily tap into the built-in camera and microphone. The captured audio and video stream is sent to the attacker over the Internet, enabling real-time surveillance. Again, the victim is unaware of the attack, because the TV´s camera and microphone remain fully functional.
Keywords :
Internet; audio streaming; data privacy; microphones; security of data; surveillance; television; television cameras; video streaming; Internet; TV camera; TV microphone; built-in media player feature; captured audio stream; captured video stream; malicious media files; real-time surveillance; remote attacker; smart TV privacy; smart TV security; Cameras; Internet; Media; Microphones; Motion pictures; Security; TV;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4799-2356-4
Type :
conf
DOI :
10.1109/CCNC.2014.6940494
Filename :
6940494
Link To Document :
بازگشت