Benjamin Michéle

  • Citations Per Year
Learn More
Conventional approaches providing anonymous Internet access to end users rely on chains of proxy servers called Mix-nets [82], that are based on a small set of static mixes. Some disadvantages of these approaches are, for example, weak resistance against blocking by government-level firewalls, poor scalability, and issues related to traffic analysis. The(More)
Smart TVs are slowly becoming ubiquitous in households and offices, offering an ever-growing number of features such as Internet access, media players, and built-in cameras and microphones. They are physically placed in sensitive locations and connected to trusted home and business networks. These TVs use the same operating systems and software stacks as(More)
In this demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being(More)
  • 1