DOI: 10.29007/8gxh
|View full text |Cite
|
Sign up to set email alerts
|

Attack-tree-based Threat Modeling of Medical Implants

Abstract: Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wireless- communication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. There is, thus, a rising trend towards increased connectivity of these devices. The down- side of this trend is, however, a proportional increase in the attack surface t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(20 citation statements)
references
References 16 publications
0
20
0
Order By: Relevance
“…ZPD schemes primarily address Availability from the CIANA security services [37]: Confidentiality, Integrity, Authentication, Nonrepudiation and Availability. Ensuring the first four services can have an indirect impact on Availability.…”
Section: Fundamental Security Servicesmentioning
confidence: 99%
See 3 more Smart Citations
“…ZPD schemes primarily address Availability from the CIANA security services [37]: Confidentiality, Integrity, Authentication, Nonrepudiation and Availability. Ensuring the first four services can have an indirect impact on Availability.…”
Section: Fundamental Security Servicesmentioning
confidence: 99%
“…Any ZPD scheme shall ensure that only the entity in close proximity to the patient for a prolonged period of time is allowed to access the IMD. This touch-to-access principle assumes that it is infeasible for the attacker to get in close proximity since the patient would reject physical contact with untrusted entities [34,37].…”
Section: Conformity To Touch-to-access Principlementioning
confidence: 99%
See 2 more Smart Citations
“…One such attack is the battery-depletion (or battery-DoS) attack where the attacker can force the IMD to continuously run an energy-consuming operation, which ultimately results in power loss and IMD shutdown. As indicated in an exhaustive IMD-threat-modeling analysis in [47], battery DoS is one of the easiest to mount and highly effective attacks. This is also backed by the majority of the ethical-hacking efforts in which the batteries of commercial IMDs were depleted using black-box approaches [16,32].…”
Section: Introductionmentioning
confidence: 99%