SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
SoK:	

Security and Privacy 
in Implantable Medical Devices 
	

Michael Rushanan1, Denis Foo Kune2, 	

Colleen M. Swanson2, Aviel D. Rubin1	

	

1. Johns Hopkins University	

2. University of Michigan	

0	
  
This work was supported by STARnet, the Dept. of HHS under award number 90TR0003-01, and the NSF under award number CNS1329737, 1330142.
What is an Implantable Medical Device?	

•  The FDA strictly defines a
medical device	

	

•  Device 	

–  Embedded system that can
sense and actuate	

•  Implantable 	

–  Surgically placed inside of a
patient’s body	

	

•  Medical 	

–  Provides diagnosis and therapy
for numerous health conditions	

1	
  
Neuro-
stimulator Cochlear
implant
Cardiac
Insulin
Pump
Gastric
Simulator
Various IMDs Trigger M
Se
S
2	
  
Implantable Medical Devices are not your
typical PCs
Implantable Medical Devices are not your
typical PCs	

3	
  
Implantable Medical Devices are not your
typical PCs	

4	
  
•  There exists resource limitations	

–  The battery limits computation and is not
rechargeable	

	

•  There are safety and utility concerns	

–  The IMD must be beneficial to the patient and elevate
patient safety above all else	

–  Security and privacy mechanisms must not adversely
affect the patient or therapy	

•  Lack of security mechanisms may have severe
consequences	

	

•  IMD’s provide safety-critical operation	

–  Must fail-open in the context of an emergency
Research Questions	

•  How do we provide security and privacy mechanisms that
adequately consider safety and utility?	

•  When do we use traditional security and privacy
mechanisms or invent new protocols?	

•  How do we formally evaluate security and privacy
mechanisms?	

•  Novel attack surfaces	

5	
  
A Healthcare Story	

6	
  
Alice	

 Cardiac Carl	

Nurse	

 Patient
Cardiac Carl’s Condition	

7	
  
•  Atrial Fibrillation	

	

	

	

	

•  Implantable Cardioverter
Defibrillator	

•  His ICD is safety-critical	

Cardiac Carl	

Atrial Fib.
Alice and Carl’s Relationship	

8	
  
visits	

accesses ICD w/ programmer	

receives private data	

adjusts therapy	

Where are the security and privacy mechanisms?	

Cardiac	

Carl	

Nurse	

Alice
Alice and Carl’s Relationship	

9	
  
visits!
accesses ICD!
send private data!
adjust therapy!
Carl! Alice!
Mallory	

Hacker Elite
Alice Mallory and Carl’s Relationship	

10	
  
Cardiac	

Carl	

Nurse	

Alice	

Mallory	

wireless communication	

[Halperin, SP, 08], [Li, HealthCom, 11] 	

eavesdrop	

forge	

modify	

jam
Attack Surfaces	

11	
  
Cardiac	

Carl	

Telemetry Interface
Software
Hardware/Sensor Interface
Security and Privacy Mechanisms	

12	
  
•  Security and Privacy mechanisms exist in standards	

–  Medical Implant Communication Services	

–  Wireless MedicalTelemetry Service	

•  These mechanisms are optional	

•  Interoperability might take priority of security	

[Foo Kune, MedCOMM, 12]
H2H:
authentication
using IPI
Rostami et al. [45],
CCS ’13
Attacks on
OPFKA and
IMDGuard
Rostami et al. [19],
DAC ’13
Using bowel
sounds for audit
Henry et al. [46],
HealthTech ’13
OPFKA: key
agreement
based on
overlapping
PVs
Hu et al. [47],
INFOCOM ’13
Namaste:
proximity-
based attack
against ECG
Bagade et al. [23],
BSN ’13
ASK-BAN: key
gen and auth
using wireless
channel chars
Shi et al. [48],
WiSec ’13
FDA MAUDE
and Recall
database
analysis
Alemzadeh et al.
[49], SP ’13
Attacks on
friendly
jamming
techniques
Tippenhauer et al.
[50], SP ’13
MedMon:
physical layer
anomaly
detection
Zhang et al. [51],
T-BCAS ’13
Ghost Talk:
EMI signal
injection
on ICDs
Foo Kune et al. [22]
SP ’13
Key sharing via
human body
transmission
Chang et al. [52],
HealthSec ’12
Security and
privacy analysis
of MAUDE
Database
Kramer et al. [53],
PLoS ONE ’12
BANA:
authentication
using received
signal strength
variation
Shi et al. [54],
WiSec ’12
Side-channel
attacks on BCI
Martinovic et al.
[55], USENIX ’12
PSKA: PPG
and ECG-based
key agreement
Venkatasubramanian
et al. [56], T-
ITB ’10
Wristband
and password
tattoos
Denning et al. [39],
CHI ’10
ECG used
to determine
proximity
Jurik et al. [57],
ICCCN ’11
ICD validation
and verification
Jiang et al. [58],
ECRTS ’10
Shield: external
proxy and
jamming device
Gollakota et al. [59]
SIGCOMM ’11
BioSec
extension
for BANs
(journal version)
Venkatasubramanian
et al. [60],
TOSN ’10
Eavesdropping
on acoustic
authentication
Halevi et al. [61],
CCS ’10
Wireless
attacks against
insulin pumps
Li et al. [18],
HealthCom ’11
Authentication
using body
coupled
communication
Li et al. [18],
HealthCom ’11
Software
security
analysis of
external
defibrillator
Hanna et al. [1],
HealthSec ’10
IMDGuard:
ECG-based key
management
Xu et al. [62],
INFOCOM ’11
Defending
against
resource
depletion
Hei et al. [63],
GLOBECOM ’10
PPG-based
key agreement
Venkatasubramanian
et al. [64],
MILCOM ’08
Audible, tactile,
and zero power
key exchange
Halperin et al. [12],
SP ’08
Wireless
attacks
against ICDs
Halperin et al. [12],
SP ’08
Proximity-
based access
control using
ultrasonic
frequency
Rasmussen et al.
[65], CCS ’09
Security and
privacy of
neural devices
Denning et al. [66],
Neurosurg
Focus ’09
Biometric
requirements
for key
generation
Ballard et al. [67],
USENIX ’08
ECG-based
key agreement
Venkatasubramanian
et al. [68],
INFOCOM ’08
Cloaker:
external
proxy device
Denning et al. [69],
HotSec ’08
BioSec
extension
for BANs
Venkatasubramanian
and Gupta. [70],
ICISIP ’06
BioSec:
extracting
keys from PVs
Cherukuri
et al. [71]
ICPPW ’03
Authentication
and secure
key exchange
using IPI
Poon et al. [72],
Commun. Mag ’06
Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats
Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution
13	
  
Biometrics and PhysiologicalValues	

Out-of-Band	

Distance Bounding	

Software/Malware	

External Devices	

Anomaly Detection	

Future Work	

Telemetry Interface	

2013
2003
Research Challenges	

•  Access to Implantable Medical Devices	

–  Is much harder then getting other components	

•  Reproducibility	

–  Limited analysis of attacks and defenses	

–  Do not use meat-based human tissue simulators	

–  Do use a calibrated saline solution at 1.8 g/L at 21 ◦C 	

•  The complete design is described in the ANSI/AAMI
PC69:2007 standard [92,Annex G]	

	

14	
  
Security and Privacy Mechanisms	

•  Biometric and PhysiologicalValues	

–  Key generation and agreement	

•  Electrocardiogram (ECG)	

–  Heart activity signal	

•  Interpulse interval	

–  Time between heartbeats	

15	
  
H2H Authentication Protocol	

16	
  
[Rostami, CCS, 13]	

Cardiac	

Carl	

Nurse	

Alice	

measure ECG α	

measure ECG β	

send ECG measurement β 	

send ECG measurement α	

TLS without certs
H2H Authentication Protocol	

17	
  
[Rostami, CCS, 13]	

•  Adversarial Assumptions	

–  Active attacker with full network control	

–  The attacker cannot:	

•  Compromise the programmer	

•  Engage in a denial-of-service	

•  Remotely measure ECG to weaken authentication
PhysiologicalValues as an Entropy Source	

•  How do ECG-based protocols work in practice?	

–  Age, Exertion, Noise	

•  ECG-based protocols rely on an analysis of ideal data in an
unrealistic setting	

–  Data sample is close to their ideal distribution	

–  Very accurate estimate of distribution characteristics	

–  Extract randomness using the estimate on the same data sample	

	

•  Observability	

–  Using video processing techniques to extract ECG-signals	

18	
  
[Rostami, SP, 2013] [Chang, HealthTech, 2012] 	

[Poh, Biomedical Engineering, 11]
19	
  
H2H:
authentication
using IPI
Rostami et al. [45],
CCS ’13
Attacks on
OPFKA and
IMDGuard
Rostami et al. [19],
DAC ’13
Using bowel
sounds for audit
Henry et al. [46],
HealthTech ’13
OPFKA: key
agreement
based on
overlapping
PVs
Hu et al. [47],
INFOCOM ’13
Namaste:
proximity-
based attack
against ECG
Bagade et al. [23],
BSN ’13
ASK-BAN: key
gen and auth
using wireless
channel chars
Shi et al. [48],
WiSec ’13
FDA MAUDE
and Recall
database
analysis
Alemzadeh et al.
[49], SP ’13
Attacks on
friendly
jamming
techniques
Tippenhauer et al.
[50], SP ’13
MedMon:
physical layer
anomaly
detection
Zhang et al. [51],
T-BCAS ’13
Ghost Talk:
EMI signal
injection
on ICDs
Foo Kune et al. [22]
SP ’13
Key sharing via
human body
transmission
Chang et al. [52],
HealthSec ’12
Security and
privacy analysis
of MAUDE
Database
Kramer et al. [53],
PLoS ONE ’12
BANA:
authentication
using received
signal strength
variation
Shi et al. [54],
WiSec ’12
Side-channel
attacks on BCI
Martinovic et al.
[55], USENIX ’12
PSKA: PPG
and ECG-based
key agreement
Venkatasubramanian
et al. [56], T-
ITB ’10
Wristband
and password
tattoos
Denning et al. [39],
CHI ’10
ECG used
to determine
proximity
Jurik et al. [57],
ICCCN ’11
ICD validation
and verification
Jiang et al. [58],
ECRTS ’10
Shield: external
proxy and
jamming device
Gollakota et al. [59]
SIGCOMM ’11
BioSec
extension
for BANs
(journal version)
Venkatasubramanian
et al. [60],
TOSN ’10
Eavesdropping
on acoustic
authentication
Halevi et al. [61],
CCS ’10
Wireless
attacks against
insulin pumps
Li et al. [18],
HealthCom ’11
Authentication
using body
coupled
communication
Li et al. [18],
HealthCom ’11
Software
security
analysis of
external
defibrillator
Hanna et al. [1],
HealthSec ’10
IMDGuard:
ECG-based key
management
Xu et al. [62],
INFOCOM ’11
Defending
against
resource
depletion
Hei et al. [63],
GLOBECOM ’10
PPG-based
key agreement
Venkatasubramanian
et al. [64],
MILCOM ’08
Audible, tactile,
and zero power
key exchange
Halperin et al. [12],
SP ’08
Wireless
attacks
against ICDs
Halperin et al. [12],
SP ’08
Proximity-
based access
control using
ultrasonic
frequency
Rasmussen et al.
[65], CCS ’09
Security and
privacy of
neural devices
Denning et al. [66],
Neurosurg
Focus ’09
Biometric
requirements
for key
generation
Ballard et al. [67],
USENIX ’08
ECG-based
key agreement
Venkatasubramanian
et al. [68],
INFOCOM ’08
Cloaker:
external
proxy device
Denning et al. [69],
HotSec ’08
BioSec
extension
for BANs
Venkatasubramanian
and Gupta. [70],
ICISIP ’06
BioSec:
extracting
keys from PVs
Cherukuri
et al. [71]
ICPPW ’03
Authentication
and secure
key exchange
using IPI
Poon et al. [72],
Commun. Mag ’06
Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats
Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution
Future Work
Trusted Sensor Interface	

•  Current systems trust their analog sensor inputs	

•  This assumption may not always hold	

•  Forging signals using electromagnetic interference	

–  Inject cardiac waveform	

	

20	
  
[Foo Kune, SP, 2013]
Neurosecurity	

21	
  
•  Neurostimulators	

–  What are the new attack surfaces	

–  What are the implications of recording and transmitting
brainwaves	

•  Brain computer interfaces	

•  Cognitive recognition could leak:	

–  Passwords, personal information	

[Martinovic, USENIX, 2012], [Denning, Neurosurg Focus, 09]
Questions?	

•  IMDs are becoming more common	

–  Improving patient outcome	

	

•  Research gaps exists	

–  Software	

–  Sensor Interface	

•  Areas for future work include	

–  Physiological values as an Entropy Source	

–  Trusted Sensor Interface	

–  Neurosecurity	

•  See our paper for more details!	

22	
  

Mais conteúdo relacionado

Mais procurados

2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano TechnologiesJan Eite Bullema
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverThe Security of Things Forum
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsijwmn
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyEnriquezShane
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesBHAVANA KONERU
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
A gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemA gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemeSAT Publishing House
 
Technology trends that can change healthcare dynamics slideshare
Technology trends that can  change healthcare dynamics  slideshareTechnology trends that can  change healthcare dynamics  slideshare
Technology trends that can change healthcare dynamics slideshareAyush Agarwal
 
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING Power System Operation
 
IntelCornellCupApplication-1
IntelCornellCupApplication-1IntelCornellCupApplication-1
IntelCornellCupApplication-1Rohit Krishnan
 
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET Journal
 
Hrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertHrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertDavid Albert
 

Mais procurados (20)

2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patients
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
 
ECG_poster
ECG_posterECG_poster
ECG_poster
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
A gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemA gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control system
 
Technology trends that can change healthcare dynamics slideshare
Technology trends that can  change healthcare dynamics  slideshareTechnology trends that can  change healthcare dynamics  slideshare
Technology trends that can change healthcare dynamics slideshare
 
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
 
IntelCornellCupApplication-1
IntelCornellCupApplication-1IntelCornellCupApplication-1
IntelCornellCupApplication-1
 
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
 
Resume
ResumeResume
Resume
 
Hrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertHrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albert
 
eUno R10
eUno R10eUno R10
eUno R10
 
H ui nno_deck
H ui nno_deckH ui nno_deck
H ui nno_deck
 
Navicular in Horses
Navicular in HorsesNavicular in Horses
Navicular in Horses
 
Project Report
Project ReportProject Report
Project Report
 

Destaque

Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Shaheed Suhrawardy Medical College
 
Health Informatics and implantable medical devices
Health Informatics and implantable medical devicesHealth Informatics and implantable medical devices
Health Informatics and implantable medical devicesMyron Finseth, MSc
 
Application of bio implant & biomedical devices-recent advancement and bio-m...
Application of  bio implant & biomedical devices-recent advancement and bio-m...Application of  bio implant & biomedical devices-recent advancement and bio-m...
Application of bio implant & biomedical devices-recent advancement and bio-m...Shaheed Suhrawardy Medical College
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 
New Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical DevicesNew Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical Devicesbrandypearson
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTWalt Maclay
 
Emerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEmerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEWI
 

Destaque (8)

Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
 
Health Informatics and implantable medical devices
Health Informatics and implantable medical devicesHealth Informatics and implantable medical devices
Health Informatics and implantable medical devices
 
Application of bio implant & biomedical devices-recent advancement and bio-m...
Application of  bio implant & biomedical devices-recent advancement and bio-m...Application of  bio implant & biomedical devices-recent advancement and bio-m...
Application of bio implant & biomedical devices-recent advancement and bio-m...
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
New Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical DevicesNew Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical Devices
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoT
 
Emerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEmerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device Manufacturing
 

Semelhante a Security and Privacy in Implantable Medical Devices

Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesFacultad de Informática UCM
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devicesAjay Ohri
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...Nick Brown
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
 
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...DataScienceConferenc1
 
Distriburted medical image system
Distriburted medical image system Distriburted medical image system
Distriburted medical image system syed sajju
 
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptxIOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx21l120
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesAndrew Oram
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)Modern Healthcare
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 

Semelhante a Security and Privacy in Implantable Medical Devices (20)

Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devices
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
paper1.pdf
paper1.pdfpaper1.pdf
paper1.pdf
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
 
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
 
Distriburted medical image system
Distriburted medical image system Distriburted medical image system
Distriburted medical image system
 
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptxIOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and Challenges
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 

Mais de Michael Rushanan

Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageMichael Rushanan
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationMichael Rushanan
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 

Mais de Michael Rushanan (6)

Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of Procrastination
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 

Último

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

Security and Privacy in Implantable Medical Devices

  • 1. SoK: Security and Privacy in Implantable Medical Devices Michael Rushanan1, Denis Foo Kune2, Colleen M. Swanson2, Aviel D. Rubin1 1. Johns Hopkins University 2. University of Michigan 0   This work was supported by STARnet, the Dept. of HHS under award number 90TR0003-01, and the NSF under award number CNS1329737, 1330142.
  • 2. What is an Implantable Medical Device? •  The FDA strictly defines a medical device •  Device –  Embedded system that can sense and actuate •  Implantable –  Surgically placed inside of a patient’s body •  Medical –  Provides diagnosis and therapy for numerous health conditions 1   Neuro- stimulator Cochlear implant Cardiac Insulin Pump Gastric Simulator Various IMDs Trigger M Se S
  • 3. 2   Implantable Medical Devices are not your typical PCs
  • 4. Implantable Medical Devices are not your typical PCs 3  
  • 5. Implantable Medical Devices are not your typical PCs 4   •  There exists resource limitations –  The battery limits computation and is not rechargeable •  There are safety and utility concerns –  The IMD must be beneficial to the patient and elevate patient safety above all else –  Security and privacy mechanisms must not adversely affect the patient or therapy •  Lack of security mechanisms may have severe consequences •  IMD’s provide safety-critical operation –  Must fail-open in the context of an emergency
  • 6. Research Questions •  How do we provide security and privacy mechanisms that adequately consider safety and utility? •  When do we use traditional security and privacy mechanisms or invent new protocols? •  How do we formally evaluate security and privacy mechanisms? •  Novel attack surfaces 5  
  • 7. A Healthcare Story 6   Alice Cardiac Carl Nurse Patient
  • 8. Cardiac Carl’s Condition 7   •  Atrial Fibrillation •  Implantable Cardioverter Defibrillator •  His ICD is safety-critical Cardiac Carl Atrial Fib.
  • 9. Alice and Carl’s Relationship 8   visits accesses ICD w/ programmer receives private data adjusts therapy Where are the security and privacy mechanisms? Cardiac Carl Nurse Alice
  • 10. Alice and Carl’s Relationship 9   visits! accesses ICD! send private data! adjust therapy! Carl! Alice! Mallory Hacker Elite
  • 11. Alice Mallory and Carl’s Relationship 10   Cardiac Carl Nurse Alice Mallory wireless communication [Halperin, SP, 08], [Li, HealthCom, 11] eavesdrop forge modify jam
  • 12. Attack Surfaces 11   Cardiac Carl Telemetry Interface Software Hardware/Sensor Interface
  • 13. Security and Privacy Mechanisms 12   •  Security and Privacy mechanisms exist in standards –  Medical Implant Communication Services –  Wireless MedicalTelemetry Service •  These mechanisms are optional •  Interoperability might take priority of security [Foo Kune, MedCOMM, 12]
  • 14. H2H: authentication using IPI Rostami et al. [45], CCS ’13 Attacks on OPFKA and IMDGuard Rostami et al. [19], DAC ’13 Using bowel sounds for audit Henry et al. [46], HealthTech ’13 OPFKA: key agreement based on overlapping PVs Hu et al. [47], INFOCOM ’13 Namaste: proximity- based attack against ECG Bagade et al. [23], BSN ’13 ASK-BAN: key gen and auth using wireless channel chars Shi et al. [48], WiSec ’13 FDA MAUDE and Recall database analysis Alemzadeh et al. [49], SP ’13 Attacks on friendly jamming techniques Tippenhauer et al. [50], SP ’13 MedMon: physical layer anomaly detection Zhang et al. [51], T-BCAS ’13 Ghost Talk: EMI signal injection on ICDs Foo Kune et al. [22] SP ’13 Key sharing via human body transmission Chang et al. [52], HealthSec ’12 Security and privacy analysis of MAUDE Database Kramer et al. [53], PLoS ONE ’12 BANA: authentication using received signal strength variation Shi et al. [54], WiSec ’12 Side-channel attacks on BCI Martinovic et al. [55], USENIX ’12 PSKA: PPG and ECG-based key agreement Venkatasubramanian et al. [56], T- ITB ’10 Wristband and password tattoos Denning et al. [39], CHI ’10 ECG used to determine proximity Jurik et al. [57], ICCCN ’11 ICD validation and verification Jiang et al. [58], ECRTS ’10 Shield: external proxy and jamming device Gollakota et al. [59] SIGCOMM ’11 BioSec extension for BANs (journal version) Venkatasubramanian et al. [60], TOSN ’10 Eavesdropping on acoustic authentication Halevi et al. [61], CCS ’10 Wireless attacks against insulin pumps Li et al. [18], HealthCom ’11 Authentication using body coupled communication Li et al. [18], HealthCom ’11 Software security analysis of external defibrillator Hanna et al. [1], HealthSec ’10 IMDGuard: ECG-based key management Xu et al. [62], INFOCOM ’11 Defending against resource depletion Hei et al. [63], GLOBECOM ’10 PPG-based key agreement Venkatasubramanian et al. [64], MILCOM ’08 Audible, tactile, and zero power key exchange Halperin et al. [12], SP ’08 Wireless attacks against ICDs Halperin et al. [12], SP ’08 Proximity- based access control using ultrasonic frequency Rasmussen et al. [65], CCS ’09 Security and privacy of neural devices Denning et al. [66], Neurosurg Focus ’09 Biometric requirements for key generation Ballard et al. [67], USENIX ’08 ECG-based key agreement Venkatasubramanian et al. [68], INFOCOM ’08 Cloaker: external proxy device Denning et al. [69], HotSec ’08 BioSec extension for BANs Venkatasubramanian and Gupta. [70], ICISIP ’06 BioSec: extracting keys from PVs Cherukuri et al. [71] ICPPW ’03 Authentication and secure key exchange using IPI Poon et al. [72], Commun. Mag ’06 Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution 13   Biometrics and PhysiologicalValues Out-of-Band Distance Bounding Software/Malware External Devices Anomaly Detection Future Work Telemetry Interface 2013 2003
  • 15. Research Challenges •  Access to Implantable Medical Devices –  Is much harder then getting other components •  Reproducibility –  Limited analysis of attacks and defenses –  Do not use meat-based human tissue simulators –  Do use a calibrated saline solution at 1.8 g/L at 21 ◦C •  The complete design is described in the ANSI/AAMI PC69:2007 standard [92,Annex G] 14  
  • 16. Security and Privacy Mechanisms •  Biometric and PhysiologicalValues –  Key generation and agreement •  Electrocardiogram (ECG) –  Heart activity signal •  Interpulse interval –  Time between heartbeats 15  
  • 17. H2H Authentication Protocol 16   [Rostami, CCS, 13] Cardiac Carl Nurse Alice measure ECG α measure ECG β send ECG measurement β send ECG measurement α TLS without certs
  • 18. H2H Authentication Protocol 17   [Rostami, CCS, 13] •  Adversarial Assumptions –  Active attacker with full network control –  The attacker cannot: •  Compromise the programmer •  Engage in a denial-of-service •  Remotely measure ECG to weaken authentication
  • 19. PhysiologicalValues as an Entropy Source •  How do ECG-based protocols work in practice? –  Age, Exertion, Noise •  ECG-based protocols rely on an analysis of ideal data in an unrealistic setting –  Data sample is close to their ideal distribution –  Very accurate estimate of distribution characteristics –  Extract randomness using the estimate on the same data sample •  Observability –  Using video processing techniques to extract ECG-signals 18   [Rostami, SP, 2013] [Chang, HealthTech, 2012] [Poh, Biomedical Engineering, 11]
  • 20. 19   H2H: authentication using IPI Rostami et al. [45], CCS ’13 Attacks on OPFKA and IMDGuard Rostami et al. [19], DAC ’13 Using bowel sounds for audit Henry et al. [46], HealthTech ’13 OPFKA: key agreement based on overlapping PVs Hu et al. [47], INFOCOM ’13 Namaste: proximity- based attack against ECG Bagade et al. [23], BSN ’13 ASK-BAN: key gen and auth using wireless channel chars Shi et al. [48], WiSec ’13 FDA MAUDE and Recall database analysis Alemzadeh et al. [49], SP ’13 Attacks on friendly jamming techniques Tippenhauer et al. [50], SP ’13 MedMon: physical layer anomaly detection Zhang et al. [51], T-BCAS ’13 Ghost Talk: EMI signal injection on ICDs Foo Kune et al. [22] SP ’13 Key sharing via human body transmission Chang et al. [52], HealthSec ’12 Security and privacy analysis of MAUDE Database Kramer et al. [53], PLoS ONE ’12 BANA: authentication using received signal strength variation Shi et al. [54], WiSec ’12 Side-channel attacks on BCI Martinovic et al. [55], USENIX ’12 PSKA: PPG and ECG-based key agreement Venkatasubramanian et al. [56], T- ITB ’10 Wristband and password tattoos Denning et al. [39], CHI ’10 ECG used to determine proximity Jurik et al. [57], ICCCN ’11 ICD validation and verification Jiang et al. [58], ECRTS ’10 Shield: external proxy and jamming device Gollakota et al. [59] SIGCOMM ’11 BioSec extension for BANs (journal version) Venkatasubramanian et al. [60], TOSN ’10 Eavesdropping on acoustic authentication Halevi et al. [61], CCS ’10 Wireless attacks against insulin pumps Li et al. [18], HealthCom ’11 Authentication using body coupled communication Li et al. [18], HealthCom ’11 Software security analysis of external defibrillator Hanna et al. [1], HealthSec ’10 IMDGuard: ECG-based key management Xu et al. [62], INFOCOM ’11 Defending against resource depletion Hei et al. [63], GLOBECOM ’10 PPG-based key agreement Venkatasubramanian et al. [64], MILCOM ’08 Audible, tactile, and zero power key exchange Halperin et al. [12], SP ’08 Wireless attacks against ICDs Halperin et al. [12], SP ’08 Proximity- based access control using ultrasonic frequency Rasmussen et al. [65], CCS ’09 Security and privacy of neural devices Denning et al. [66], Neurosurg Focus ’09 Biometric requirements for key generation Ballard et al. [67], USENIX ’08 ECG-based key agreement Venkatasubramanian et al. [68], INFOCOM ’08 Cloaker: external proxy device Denning et al. [69], HotSec ’08 BioSec extension for BANs Venkatasubramanian and Gupta. [70], ICISIP ’06 BioSec: extracting keys from PVs Cherukuri et al. [71] ICPPW ’03 Authentication and secure key exchange using IPI Poon et al. [72], Commun. Mag ’06 Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution Future Work
  • 21. Trusted Sensor Interface •  Current systems trust their analog sensor inputs •  This assumption may not always hold •  Forging signals using electromagnetic interference –  Inject cardiac waveform 20   [Foo Kune, SP, 2013]
  • 22. Neurosecurity 21   •  Neurostimulators –  What are the new attack surfaces –  What are the implications of recording and transmitting brainwaves •  Brain computer interfaces •  Cognitive recognition could leak: –  Passwords, personal information [Martinovic, USENIX, 2012], [Denning, Neurosurg Focus, 09]
  • 23. Questions? •  IMDs are becoming more common –  Improving patient outcome •  Research gaps exists –  Software –  Sensor Interface •  Areas for future work include –  Physiological values as an Entropy Source –  Trusted Sensor Interface –  Neurosecurity •  See our paper for more details! 22