Analysis of Tizen Security Model and Ways of Bypassing It on Smart TV Platform

被引:1
|
作者
Majchrowicz, Michal [1 ]
Duch, Piotr [1 ]
机构
[1] Lodz Univ Technol, Inst Appl Comp Sci, Ul Stefanowskiego 18, PL-90537 Lodz, Poland
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 24期
关键词
tizen; smart TV; security;
D O I
10.3390/app112412031
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The smart TV market is growing at an ever faster pace every year. Smart TVs are equipped with many advanced functions, allow users to search, chat, browse, share, update, and download different content. That is one of the reason why smart TVs became a target for the hacker community. In this article, we decided to test security of Tizen operating system, which is one of the most popular smart TV operating systems. Tizen is used on many different devices including smartphones, notebooks, wearables, infotainment systems, and smart TVs. By now, there are articles which present security mechanisms of Tizen OS, and sometimes with a way to bypass them; however, none of them are applicable to the smart TVs. In the article, we focused on developing an algorithm that will allow us to gain root access to the smart TV. The proposed attack scenario uses CVE-2014-1303 and CVE-2015-1805 bugs to bypass or disable security mechanisms in Tizen OS and finally gain root access.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] IoT Connectivity Interface in Tizen: Smart TV Scenarios
    Lee, Gaeun
    Rho, Minjin
    [J]. DESIGN, USER EXPERIENCE, AND USABILITY: TECHNOLOGICAL CONTEXTS, PT III, 2016, 9748 : 357 - 364
  • [2] Smart-TV security: risk analysis and experiments on Smart-TV communication channels
    Bachy, Yann
    Nicomette, Vincent
    Kaaniche, Mohamed
    Alata, Eric
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) : 61 - 76
  • [3] Smart-TV security: risk analysis and experiments on Smart-TV communication channels
    Yann Bachy
    Vincent Nicomette
    Mohamed Kaâniche
    Eric Alata
    [J]. Journal of Computer Virology and Hacking Techniques, 2019, 15 : 61 - 76
  • [4] Smart-TV security analysis: practical experiments
    Bachy, Yann
    Basse, Frederic
    Nicomette, Vincent
    Alata, Eric
    Kaaniche, Mohamed
    Courrege, Jean-Christophe
    Lukjanenko, Pierre
    [J]. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 497 - 504
  • [5] INFORMATION ARCHITECTURE IN THE SMART TV ENVIROMENT. FOR LG SMART TV PLATFORM
    Martinez Giles, Angel
    Nuno Moral, Ma Victoria
    [J]. INDEX COMUNICACION, 2015, 5 (03): : 59 - 77
  • [6] Security Tool for UPnP protocol on Smart TV
    Nava-Lopez, Ismael
    Prudente-Tixteco, Lidia
    Olivares-Mercado, Jesus
    Sanchez-Perez, Gabriel
    Toscano-Medina, Karim
    Carlos Castro-Madrid, Luis
    [J]. 2019 IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC 2019), 2019,
  • [7] A bypassing security model for anonymous Bluetooth peers
    Kim, H
    Dabbous, W
    Afifi, H
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 310 - 315
  • [8] Deep Security Analysis Model for Smart Grid
    Di, Ting
    Wu, Yao
    Li, Weibo
    [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 276 - 280
  • [9] Machine Learning Model for Smart Contracts Security Analysis
    Momeni, Pouyan
    Wang, Yu
    Samavi, Reza
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 272 - 277
  • [10] Smart Security System Based on Android Platform
    Zubr, Pavel
    Dvorak, Jan
    Selamat, Ali
    Krejcar, Ondrej
    [J]. MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, MOBIWIS 2017, 2017, 10486 : 115 - 128