DocumentCode
136302
Title
Demo: Using malicious media files to compromise the security and privacy of smart TVs
Author
Michele, Benjamin ; Karpow, Andrew
Author_Institution
Berlin Inst. of Technol., Security in Telecommun., Berlin, Germany
fYear
2014
fDate
10-13 Jan. 2014
Firstpage
1144
Lastpage
1145
Abstract
In t his demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being played back as expected. Furthermore, we show how to stealthily tap into the built-in camera and microphone. The captured audio and video stream is sent to the attacker over the Internet, enabling real-time surveillance. Again, the victim is unaware of the attack, because the TV´s camera and microphone remain fully functional.
Keywords
Internet; audio streaming; data privacy; microphones; security of data; surveillance; television; television cameras; video streaming; Internet; TV camera; TV microphone; built-in media player feature; captured audio stream; captured video stream; malicious media files; real-time surveillance; remote attacker; smart TV privacy; smart TV security; Cameras; Internet; Media; Microphones; Motion pictures; Security; TV;
fLanguage
English
Publisher
ieee
Conference_Titel
Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th
Conference_Location
Las Vegas, NV
Print_ISBN
978-1-4799-2356-4
Type
conf
DOI
10.1109/CCNC.2014.6940494
Filename
6940494
Link To Document