Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems 2019
DOI: 10.1145/3302509.3311044
|View full text |Cite
|
Sign up to set email alerts
|

Synthesizing stealthy reprogramming attacks on cardiac devices

Abstract: An Implantable Cardioverter Defibrillator (ICD) is a medical device used for the detection of potentially fatal cardiac arrhythmia and their treatment through the delivery of electrical shocks intended to restore normal heart rhythm. An ICD reprogramming attack seeks to alter the device's parameters to induce unnecessary shocks and, even more egregious, prevent required therapy. In this paper, we present a formal approach for the synthesis of ICD reprogramming attacks that are both effective, i.e., lead to fun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…The adopted method is for detection of an anomaly for processing correlation variable for detection of cyber-attack with CSTR model. In [23] evaluated the control system for measuring data for cyber-attack for control signal commanded for spoofing attack. The closed-loop system provides spoofing attacks for testbed with the implementation process.…”
Section: Related Workmentioning
confidence: 99%
“…The adopted method is for detection of an anomaly for processing correlation variable for detection of cyber-attack with CSTR model. In [23] evaluated the control system for measuring data for cyber-attack for control signal commanded for spoofing attack. The closed-loop system provides spoofing attacks for testbed with the implementation process.…”
Section: Related Workmentioning
confidence: 99%
“…Adversarial attacks in health informatics can also cause serious damages, even deaths. For example, adversarial attacks to the machine learning algorithms in implantable cardioverter defibrillators could lead to unnecessary painful shocks, damaging the cardiac tissue, and even worse therapy interruptions and sudden cardiac death [62].…”
Section: B Adversarial Attacks In Health Informaticsmentioning
confidence: 99%
“…13, and the corresponding defense strategies. For example, Paoletti et al [62] performed parameter tampering attacks on Boston Scientific implantable cardioverter defibrillators, which use a discrimination tree to detect tachycardia episodes and then initiate the appropriate therapy. They slightly modified the parameters of the discrimination tree to achieve both attack effectiveness and stealthiness.…”
Section: Conclusion and Future Researchmentioning
confidence: 99%
“…), and user activities as a result of the unencrypted communication between the device and app. Palotti et al presented a formal approach to perform an effective and stealthy reprogramming attacks on ICDs [117]. Researchers focused on the ICD software that implements discrimination algorithm along with multiple discrimination criteria (discriminators) for the detection and classification of arrhythmia episodes based on the analysis of intracardiac signals features.…”
Section: Attacks Via Communication Channelmentioning
confidence: 99%