SlideShare a Scribd company logo
Your (not so) smart TV is currently busy
with taking down the Internet
Achim D. Brucker
a.brucker@sheffield.ac.uk https://www.brucker.ch/
Software Assurance & Security Research
Department of Computer Science, The University of Sheffield, Sheffield, UK
https://logicalhacking.com/
May 15, 2017
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 3 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 4 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 4 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 4 of 21
http://www.comsoc.org/blog/infographic-internet-things-iot
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 5 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 6 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 6 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 6 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 6 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 6 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 7 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 8 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
w
here
is
w
w
w.google.com
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
w
here
is
w
w
w.google.com
itisat
216.58.209.228
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
w
here
is
w
w
w.google.com
itisat
216.58.209.228
216.58.209.228
get www.google.com
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
w
here
is
w
w
w.google.com
itisat
216.58.209.228
216.58.209.228
get www.google.com
www.google.com
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
getwww.google.com
w
here
is
w
w
w.google.com
itisat
216.58.209.228
216.58.209.228
get www.google.com
www.google.comwww.google.com
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 9 of 21
Image 1.2m devices
constantly
queering for
google.com ...
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 10 of 21
Attackers are
exploiting
vulnerabilitties
(bugs) to take control
over YOUR devices
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 11 of 21
When was the last time you updated your
computer
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 12 of 21
When was the last time you updated your
computer
wifi router
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 12 of 21
When was the last time you updated your
computer
wifi router
car
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 12 of 21
When was the last time you updated your
computer
wifi router
car
fridge
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 12 of 21
When was the last time you updated your
computer
wifi router
car
fridge
light bulb
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 12 of 21
Average life span
computers
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars: 14 years
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars: 14 years
fridges
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars: 14 years
fridges: 17 years
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars: 14 years
fridges: 17 years
LED
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
Average life span
computers: 5 years
wifi routers: 7 years
cars: 14 years
fridges: 17 years
LED: 20 years
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 13 of 21
and now to something
completely
different
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 14 of 21
and now to something
slightly
different
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 14 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 15 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 15 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 15 of 21
Dec 11, 1989: 20’000
envelopes
containing a 5.252
flopppy disk loaded
with the first known
ransomware (’AIDS’)
where mailed.
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 16 of 21
Dec 11, 1989: 20’000
envelopes
containing a 5.252
flopppy disk loaded
with the first known
ransomware (’AIDS’)
where mailed.
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 16 of 21
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 17 of 21
Blaming the victim
does not work!
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 18 of 21
Recommendations
For users:
update your devices regularly
(for your personal devices: use automated updates, if available)
back-up your data frequently
choose vendors that provide security fixes for their products
during the expected life-time
For researchers and vendors:
make it easier to write high quality software
make it easier to upgrade systems
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 19 of 21
http://www.geekculture.com/joyoftech/joyarchives/2340.html
Thank You!
Contact: Dr. Achim D. Brucker
Department of Computer Science
University of Sheffield
Regent Court
211 Portobello St.
Sheffield S1 4DP, UK
ƀ a.brucker@sheffield.ac.uk
@adbrucker
https://de.linkedin.com/in/adbrucker/
ĸ https://www.brucker.ch/
į https://logicalhacking.com/blog/
Document Classification and License Information
c 2017 LogicalHacking.com, A.D. Brucker.
This presentation is classified as Public (CC BY-ND 4.0):
Except where otherwise noted, this presentation is licensed under a Creative Commons
Attribution-NoDerivatives 4.0 International Public License (CC BY-ND 4.0).
c 2017 LogicalHacking.com. Public (CC BY-ND 4.0) Page 21 of 21

More Related Content

PDF
Introduction to JavaScript, Washington, DC February 2018
Thinkful
 
PDF
Intro to JavaScript
Aaron Lamphere
 
PDF
Embedded systems
Abhishek Gupta
 
PDF
Intro to JavaScript - Thinkful DC
TJ Stalcup
 
PDF
El computador
Esteban Garcia
 
PDF
Davide Montesin - SASAbus HTML5 & related Java Free Software
South Tyrol Free Software Conference
 
PDF
Dylan Beattie "Architecture: The Stuff That's Hard to Change"
Fwdays
 
PDF
LAS16-407: Internet of Tiny Linux (IoTL): the sequel.
Linaro
 
Introduction to JavaScript, Washington, DC February 2018
Thinkful
 
Intro to JavaScript
Aaron Lamphere
 
Embedded systems
Abhishek Gupta
 
Intro to JavaScript - Thinkful DC
TJ Stalcup
 
El computador
Esteban Garcia
 
Davide Montesin - SASAbus HTML5 & related Java Free Software
South Tyrol Free Software Conference
 
Dylan Beattie "Architecture: The Stuff That's Hard to Change"
Fwdays
 
LAS16-407: Internet of Tiny Linux (IoTL): the sequel.
Linaro
 

Similar to Your (not so) smart TV is currently busy with taking down the Internet (20)

PDF
Intro to Python
TJ Stalcup
 
PDF
Reverse engineering and modifying windows 8 apps
Amaan Khan
 
PDF
DevDay 2018: Ulrich Deiters - Offline First - kein Netz, kein Fehler, zufried...
DevDay Dresden
 
PPTX
Build 2017 - B8004 - App Model evolution
Windows Developer
 
PDF
Jenkins X - automated CI/CD solution for cloud native applications on Kubernetes
Ted Won
 
PDF
New NeXt for Advanced Developers
Cisco DevNet
 
PDF
Modern Release Engineering in a Nutshell - Why Researchers should Care!
Bram Adams
 
PDF
BSD Magazine December issue
Valerie Heatley
 
PDF
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
Tokyo University of Science
 
PDF
Intro to Python
TJ Stalcup
 
PPTX
Highway to heaven - XConf Manchester 2015
Christian Deger
 
PDF
"Will Git Be Around Forever? A List of Possible Successors" at UtrechtJUG
🎤 Hanno Embregts 🎸
 
PDF
IIT-RTC 2017 Qt WebRTC Tutorial (Qt Janus Client)
Alexandre Gouaillard
 
PDF
Intro to js september 19
Thinkful
 
PPTX
Cisco Live: Containers on Enterprise Compute and Networks
Michael Duarte
 
PDF
Software Bill of Materials (SBOMs) for C applications [FOSDEM 2025]
Chris Swan
 
PDF
stackconf 2023 | Dynamic Image Optimization with imgproxy at Schwarz IT by An...
NETWAYS
 
PDF
Build social network in 4 weeks
Yan Cui
 
PDF
Embedded Recipes 2019 - From maintaining I2C to the big (embedded) picture
Anne Nicolas
 
PDF
Encode Club Hackathon
Vanessa Lošić
 
Intro to Python
TJ Stalcup
 
Reverse engineering and modifying windows 8 apps
Amaan Khan
 
DevDay 2018: Ulrich Deiters - Offline First - kein Netz, kein Fehler, zufried...
DevDay Dresden
 
Build 2017 - B8004 - App Model evolution
Windows Developer
 
Jenkins X - automated CI/CD solution for cloud native applications on Kubernetes
Ted Won
 
New NeXt for Advanced Developers
Cisco DevNet
 
Modern Release Engineering in a Nutshell - Why Researchers should Care!
Bram Adams
 
BSD Magazine December issue
Valerie Heatley
 
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
Tokyo University of Science
 
Intro to Python
TJ Stalcup
 
Highway to heaven - XConf Manchester 2015
Christian Deger
 
"Will Git Be Around Forever? A List of Possible Successors" at UtrechtJUG
🎤 Hanno Embregts 🎸
 
IIT-RTC 2017 Qt WebRTC Tutorial (Qt Janus Client)
Alexandre Gouaillard
 
Intro to js september 19
Thinkful
 
Cisco Live: Containers on Enterprise Compute and Networks
Michael Duarte
 
Software Bill of Materials (SBOMs) for C applications [FOSDEM 2025]
Chris Swan
 
stackconf 2023 | Dynamic Image Optimization with imgproxy at Schwarz IT by An...
NETWAYS
 
Build social network in 4 weeks
Yan Cui
 
Embedded Recipes 2019 - From maintaining I2C to the big (embedded) picture
Anne Nicolas
 
Encode Club Hackathon
Vanessa Lošić
 
Ad

More from Achim D. Brucker (20)

PDF
Usable Security for Developers: A Nightmare
Achim D. Brucker
 
PDF
Formalizing (Web) Standards: An Application of Test and Proof
Achim D. Brucker
 
PDF
Combining the Security Risks of Native and Web Development: Hybrid Apps
Achim D. Brucker
 
PDF
The Evil Friend in Your Browser
Achim D. Brucker
 
PDF
How to Enable Developers to Deliver Secure Code
Achim D. Brucker
 
PDF
Developing Secure Software: Experiences From an International Software Vendor
Achim D. Brucker
 
PDF
Using Third Party Components for Building an Application Might be More Danger...
Achim D. Brucker
 
PDF
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
Achim D. Brucker
 
PDF
Isabelle: Not Only a Proof Assistant
Achim D. Brucker
 
PDF
Agile Secure Software Development in a Large Software Development Organisatio...
Achim D. Brucker
 
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
PDF
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Achim D. Brucker
 
PDF
Industrial Challenges of Secure Software Development
Achim D. Brucker
 
PDF
SAST for JavaScript: A Brief Overview of Commercial Tools
Achim D. Brucker
 
PDF
A Collection of Real World (JavaScript) Security Problems: Examples from 2 1/...
Achim D. Brucker
 
PDF
Deploying Static Application Security Testing on a Large Scale
Achim D. Brucker
 
PDF
Model-based Conformance Testing of Security Properties
Achim D. Brucker
 
PDF
Service Compositions: Curse or Blessing for Security?
Achim D. Brucker
 
PDF
Encoding Object-oriented Datatypes in HOL: Extensible Records Revisited
Achim D. Brucker
 
PDF
A Framework for Secure Service Composition
Achim D. Brucker
 
Usable Security for Developers: A Nightmare
Achim D. Brucker
 
Formalizing (Web) Standards: An Application of Test and Proof
Achim D. Brucker
 
Combining the Security Risks of Native and Web Development: Hybrid Apps
Achim D. Brucker
 
The Evil Friend in Your Browser
Achim D. Brucker
 
How to Enable Developers to Deliver Secure Code
Achim D. Brucker
 
Developing Secure Software: Experiences From an International Software Vendor
Achim D. Brucker
 
Using Third Party Components for Building an Application Might be More Danger...
Achim D. Brucker
 
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
Achim D. Brucker
 
Isabelle: Not Only a Proof Assistant
Achim D. Brucker
 
Agile Secure Software Development in a Large Software Development Organisatio...
Achim D. Brucker
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Achim D. Brucker
 
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Achim D. Brucker
 
Industrial Challenges of Secure Software Development
Achim D. Brucker
 
SAST for JavaScript: A Brief Overview of Commercial Tools
Achim D. Brucker
 
A Collection of Real World (JavaScript) Security Problems: Examples from 2 1/...
Achim D. Brucker
 
Deploying Static Application Security Testing on a Large Scale
Achim D. Brucker
 
Model-based Conformance Testing of Security Properties
Achim D. Brucker
 
Service Compositions: Curse or Blessing for Security?
Achim D. Brucker
 
Encoding Object-oriented Datatypes in HOL: Extensible Records Revisited
Achim D. Brucker
 
A Framework for Secure Service Composition
Achim D. Brucker
 
Ad

Recently uploaded (20)

PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Doc9.....................................
SofiaCollazos
 
The Future of Artificial Intelligence (AI)
Mukul
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 

Your (not so) smart TV is currently busy with taking down the Internet