Smart TVs are slowly becoming ubiquitous in households and offices, offering an ever-growing number of features such as Internet access, media players, and built-in cameras and microphones. They are physically placed in sensitive locations and connected to trusted home and business networks. These TVs use the same operating systems and software stacks as… (More)
Consumer electronics and embedded devices often allow the installation of applications and firmware upgrades from user-provided mass-storage devices. To protect the integrity of these devices and the associated electronic markets, the software packages are protected by cryptographic signatures. The software installation code assumes that files on attached… (More)
In this demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being… (More)
The document that should appear here is not currently available.
Fault attacks against cryptographic schemes as used in tamper resistant devices have led to a vibrant research activity in the past. This area was recently augmented by the discovery of attacks even on the public key parts of asymmetric cryptographic schemes like RSA, DSA, and ECC. While being very powerful in principle, all existing attacks until now… (More)