Entry Oren:2015:AIU from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Oren:2015:AIU,
  author =       "Yossef Oren and Angelos D. Keromytis",
  title =        "Attacking the {Internet} Using Broadcast Digital
                 Television",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "4",
  pages =        "16:1--16:??",
  month =        apr,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2723159",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 24 17:39:52 MDT 2015",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "In the attempt to bring modern broadband Internet
                 features to traditional broadcast television, the
                 Digital Video Broadcasting (DVB) consortium introduced
                 a specification called Hybrid Broadcast-Broadband
                 Television (HbbTV), which allows broadcast streams to
                 include embedded HTML content that is rendered by the
                 television. This system is already in very wide
                 deployment in Europe and has recently been adopted as
                 part of the American digital television standard. Our
                 analyses of the specifications, and of real systems
                 implementing them, show that the broadband and
                 broadcast systems are combined insecurely. This enables
                 a large-scale exploitation technique with a localized
                 geographical footprint based on Radio Frequency (RF)
                 injection, which requires a minimal budget and
                 infrastructure and is remarkably difficult to detect.
                 In this article, we present the attack methodology and
                 a number of follow-on exploitation techniques that
                 provide significant flexibility to attackers.
                 Furthermore, we demonstrate that the technical
                 complexity and required budget are low, making this
                 attack practical and realistic, especially in areas
                 with high population density: In a dense urban area, an
                 attacker with a budget of about 450 can target more
                 than 20,000 devices in a single attack. A unique aspect
                 of this attack is that, in contrast to most Internet of
                 Things/Cyber-Physical System threat scenarios, where
                 the attack comes from the data network side and affects
                 the physical world, our attack uses the physical
                 broadcast network to attack the data network.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries