Browse > Article
http://dx.doi.org/10.14400/JDPM.2014.12.1.313

Hacking and Countermeasure on Smart TV  

Hong, Sunghyuck (Baekseok University, Division of Information and Communication)
Publication Information
Journal of Digital Convergence / v.12, no.1, 2014 , pp. 313-317 More about this Journal
Abstract
Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.
Keywords
Smart TV; Hacking; Analysis; ATP Attack; Send-Box; proxy; Repackaging;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Boyd, J., "Samsung's plasma displays barred from Japanese market," Spectrum, IEEE, vol. 41, no. 6, pp. 20-22, 2004
2 Lee Dong-hoon, "HTML5 Standards-Based 스마트 TV Platform", TTA Exam certification Just Senior Researcher Shows
3 Hwang Jung-Yeon, "Visited By App Users' Personal Information Infringement Analysis System", Korea Information Security Agency, 2008
4 Bak Yun-Su, Heo Gi-Taek, Jeong Seung-Mun, " 스마트TV-based Smart Home Network Service Model", Dongshin University Industry-Academic Cooperation Foundation
5 Se-Ho Park; Yong-Suk Park; Saet-Byeol Yu; Jun-rim Choi, "Implementation of ATSC mobile DTV broadcasting for N-screen smart devices," Consumer Electronics (ICCE), 2012 IEEE International Conference on , vol., no., pp. 331-332, 2012
6 Albano, P.; Castiglione, A.; Cattaneo, G.; De Santis, A., "A Novel Anti-forensics Technique for the Android OS," Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on, vol., no., pp. 380-385, 2011
7 Lin Sun; ShuTao Huang; YunWu Wang; Meimei Huo, "Application Policy Security Mechanisms of Android System," High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, vol., no., pp. 1722-1725, 2012
8 Zhi-Yong Li; Ran Tao; Zhen-He Cai; Hao Zhang, "A Web Page Malicious Code Detect Approach Based on Script Execution," Natural Computation, 2009. ICNC '09. Fifth International Conference on , vol. 6, no., pp. 308-312, 2009
9 Mustafa, T., "Malicious Data Leak Prevention and Purposeful Evasion Attacks: An approach to Advanced Persistent Threat (APT) management," Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International, vol., no., pp. 1-5, 2013
10 Lee Hyun-Woo Sim Sung Jae, Learn Hacking Incident Analysis And Response To Cases, Unix, 2004
11 Yun-Juho, Im Hyeon Suk, Kim, Yong Ho, Security Guide - Web Hacking Incident Analysis, 2009
12 Mike Shema, Hacking For Beginners Web Attack And Defense, 2011