2018 International Interdisciplinary PhD Workshop (IIPhDW) 2018
DOI: 10.1109/iiphdw.2018.8388390
|View full text |Cite
|
Sign up to set email alerts
|

System for remote parental control and management of rooted smart TVs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The research conducted in 2012 about various Smart TV security implementations revealed that all of the tested vendors had vulnerabilities [35]. In [36], the authors presented that it is possible to build a system for remote parental control by hacking a Samsung Smart TV. In [37], this idea has been improved and expanded into remotely managed Kids Mode.…”
Section: Related Workmentioning
confidence: 99%
“…The research conducted in 2012 about various Smart TV security implementations revealed that all of the tested vendors had vulnerabilities [35]. In [36], the authors presented that it is possible to build a system for remote parental control by hacking a Samsung Smart TV. In [37], this idea has been improved and expanded into remotely managed Kids Mode.…”
Section: Related Workmentioning
confidence: 99%
“…In our work instead the process of age recognition is more challenging since the faces on which the age is estimated are extracted from live streams. Another effort toward exploiting smart device capabilities is shown in Reference 29, where the authors focusing on extending parental control capabilities through rooting on smart‐TVs. This approach though needs specifically modified smart‐TVs and software installed to them, that may cause instability of the operating system and break of the warranty.…”
Section: Related Workmentioning
confidence: 99%
“…It is currently difficult to imagine life without it; washing machines, refrigerators, watches, mobile phones, and televisions are increasingly equipped with modules that allow remote connection with other devices and become a part of the internet of Things (IoT) [4][5][6]. More importantly, more and more of these devices have access to our personal data, and that means that securing these devices against unauthorized access from outside is increasingly important [7][8][9][10][11]. A few years ago, most of us mainly cared about the security of our PCs; the security of mobile devices was a new thing, not very popular yet.…”
Section: Introductionmentioning
confidence: 99%