2018
DOI: 10.1007/s41635-018-0040-7
|View full text |Cite
|
Sign up to set email alerts
|

Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…However, the introduced bit-monitoring convention applies to certain types of signals and is more suitable for occasional verification of the correctness of the A/D conversion. In the framework presented in [14], multiple hashes are generated for internal SoC signals in multiple internal stages, and are used for verifying the integrity of the signals as they propagate in the SoC. By focusing on the security of the intermediate signals in SoCs and implementing the security measures in independent security elements, this framework addresses a similar issue to that addressed in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…However, the introduced bit-monitoring convention applies to certain types of signals and is more suitable for occasional verification of the correctness of the A/D conversion. In the framework presented in [14], multiple hashes are generated for internal SoC signals in multiple internal stages, and are used for verifying the integrity of the signals as they propagate in the SoC. By focusing on the security of the intermediate signals in SoCs and implementing the security measures in independent security elements, this framework addresses a similar issue to that addressed in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The FDA has released numerous reports on changing patient's health data by modifying medical device hardware [57,58]. In recent work, researchers presented an HT attack on the bacillus calmette guerin (BCG) scale [59]. They injected a malicious payload that modifies the logic of an XOR gate on the input bus.…”
Section: Hardware Attacksmentioning
confidence: 99%
“…• Relied on the digital logic modules which minimally impacts the performance of the system. [59] Software-centric solution…”
Section: Hardware Communication Channelmentioning
confidence: 99%
See 1 more Smart Citation