Authors: Benjamin Michele, Ivan Pena, Pablo Angueira
Published on: February 07, 2024
Impact Score: 8.12
Arxiv code: Arxiv:2402.05159
Summary
- What is new: Proof-of-concept attack on STVs using a malicious HbbTV app and automated, low-cost methods for CCPR determination and non-disruptive attack range measurements.
- Why this is important: The DVB standard’s lack of mandated authentication and integrity for transport streams, allowing malicious broadcasts to exploit STVs.
- What the research proposes: Developed methods for detecting and measuring the limitations of these attacks based on CCPRs, including a malicious app attack proof-of-concept.
- Results: Evidence of the attacks’ limited range through lab experiments, simulations, and field measurements, contradicting previous publications.
Technical Details
Technological frameworks used: Automated, low-cost CCPR determination and attack range measurement using gap fillers and channel impulse response analysis.
Models used: Hybrid Broadcast Broadband TV (HbbTV) app for system-level access to STVs.
Data used: Laboratory experiments, extensive simulations, and field measurements.
Potential Impact
Smart TV manufacturers, broadcast companies, and digital security solutions could be affected or could benefit from these findings.
Want to implement this idea in a business?
We have generated a startup concept here: SecureStreamGuard.
Leave a Reply