2015
DOI: 10.1145/2667218
|View full text |Cite
|
Sign up to set email alerts
|

Security challenges for medical devices

Abstract: Implantable devices, often dependent on software, save countless lives. But how secure are they?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 130 publications
(61 citation statements)
references
References 18 publications
0
61
0
Order By: Relevance
“…To evaluate the CDF-based anomaly detection method, we consider three mimicry malware based on known malware (albeit from different applications) [15] [16]. The File Manipulation malware breaks confidentiality and integrity by intruding into the file system and performing reads/writes on a target file.…”
Section: The Detection Methods Considers Individual Execution Pathsmentioning
confidence: 99%
“…To evaluate the CDF-based anomaly detection method, we consider three mimicry malware based on known malware (albeit from different applications) [15] [16]. The File Manipulation malware breaks confidentiality and integrity by intruding into the file system and performing reads/writes on a target file.…”
Section: The Detection Methods Considers Individual Execution Pathsmentioning
confidence: 99%
“…Although much consideration goes into the operational frequency and power supply choices, data security is often overlooked. Implantable medical devices commonly use existing wireless protocols for data transfer, bluetooth, MSK, FSK, OOK, etc, which are unencrypted and can be viewed with standard electrical equipment [155]. This may not be a large concern for animal testing, not withstanding safety pharmacology studies, however, this poses a large security and privacy issue for human implantable devices.…”
Section: Implant Design Challenges and Concernsmentioning
confidence: 99%
“…Furthermore, it is not only the data collection se-curity issue, but the base station to implant data can also be intercepted and compromised. It is common for pacemakers, drug delivery devices, insulin pumps, and other implantable devices to receive external commands, thus the possibility of an external attack, for example cause a electric shock from a pacemaker [155]. Currently, the limited power and range of implantable devices removes much of the the data threat, however, newer longer range devices are prone to attack.…”
Section: Implant Design Challenges and Concernsmentioning
confidence: 99%
See 1 more Smart Citation
“…While a fair amount has been written about applying security-based design, development and implementation methods to safety-critical IoT systems, such as [2] through [6], there is very little in the literature about how one might go about enforcing such measures. There clearly need to be means by which those responsible for creating and deploying safety-critical IoT systems can be motivated to ensure that their systems meet appropriate security and privacy standards.…”
Section: Introductionmentioning
confidence: 99%