Carlotta Tagliaro (TU Wien)

Smart TVs enable the integration of the traditional broadcast signal with services offered by the Internet. Specifically, the Hybrid Broadcast Broadband TV (HbbTV) protocol allows broadcasters to offer consumers additional features via the Internet (e.g., quizzes and the ability to restart programs), enriching their viewing experience. HbbTV works using standard web technologies as transparent overlays over a TV channel. Despite the increasing adoption of HbbTV worldwide, studies on its privacy are scarce.

In this study, we show how we tested a range of 36 channels across five European countries and what challenges we faced; specifically, every country adopts different ways of delivering the broadcast signal to the TVs. Thus, we identified a common experimental setup and instructions adopted in each country to assess the channels' privacy level. We also show how the extracted URLs pointing to the HbbTV application can foster further replicability and studies. Finally, we delve into how we measured users' awareness of HbbTV security and privacy risks and how we avoided bias in our results.

Speaker's Biography

Carlotta Tagliaro is a second year PhD student at TU Wien (Vienna, Austria). She has a great interest in Internet of Things security, especially in what concerns application-layer messaging protocols adopted by everyday users. She obtained her double master's degree in cyber security from the University of Trento (Italy) and the University of Twente (the Netherlands). She has worked as a junior researcher at the Fondazione Bruno Kessler - FBK in Trento, Italy on the security of the MQTT protocol.

View More Papers

BARS: Local Robustness Certification for Deep Learning based Traffic...

Kai Wang (Tsinghua University), Zhiliang Wang (Tsinghua University), Dongqi Han (Tsinghua University), Wenqi Chen (Tsinghua University), Jiahai Yang (Tsinghua University), Xingang Shi (Tsinghua University), Xia Yin (Tsinghua University)

Read More

Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging

Harjasleen Malvai (UIUC/IC3), Lefteris Kokoris-Kogias (IST Austria), Alberto Sonnino (Mysten Labs), Esha Ghosh (Microsoft Research), Ercan Oztürk (Meta), Kevin Lewi (Meta), Sean Lawlor (Meta)

Read More

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better...

Siyuan Cheng (Purdue University), Guanhong Tao (Purdue University), Yingqi Liu (Purdue University), Shengwei An (Purdue University), Xiangzhe Xu (Purdue University), Shiwei Feng (Purdue University), Guangyu Shen (Purdue University), Kaiyuan Zhang (Purdue University), Qiuling Xu (Purdue University), Shiqing Ma (Rutgers University), Xiangyu Zhang (Purdue University)

Read More

Cryptographic Oracle-based Conditional Payments

Varun Madathil (North Carolina State University), Sri Aravinda Krishnan Thyagarajan (NTT Research), Dimitrios Vasilopoulos (IMDEA Software Institute), Lloyd Fournier (None), Giulio Malavolta (Max Planck Institute for Security and Privacy), Pedro Moreno-Sanchez (IMDEA Software Institute)

Read More