SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
SoK:	

Security and Privacy 
in Implantable Medical Devices 
	

Michael Rushanan1, Denis Foo Kune2, 	

Colleen M. Swanson2, Aviel D. Rubin1	

	

1. Johns Hopkins University	

2. University of Michigan	

0	
  
This work was supported by STARnet, the Dept. of HHS under award number 90TR0003-01, and the NSF under award number CNS1329737, 1330142.
What is an Implantable Medical Device?	

•  The FDA strictly defines a
medical device	

	

•  Device 	

–  Embedded system that can
sense and actuate	

•  Implantable 	

–  Surgically placed inside of a
patient’s body	

	

•  Medical 	

–  Provides diagnosis and therapy
for numerous health conditions	

1	
  
Neuro-
stimulator Cochlear
implant
Cardiac
Insulin
Pump
Gastric
Simulator
Various IMDs Trigger M
Se
S
2	
  
Implantable Medical Devices are not your
typical PCs
Implantable Medical Devices are not your
typical PCs	

3	
  
Implantable Medical Devices are not your
typical PCs	

4	
  
•  There exists resource limitations	

–  The battery limits computation and is not
rechargeable	

	

•  There are safety and utility concerns	

–  The IMD must be beneficial to the patient and elevate
patient safety above all else	

–  Security and privacy mechanisms must not adversely
affect the patient or therapy	

•  Lack of security mechanisms may have severe
consequences	

	

•  IMD’s provide safety-critical operation	

–  Must fail-open in the context of an emergency
Research Questions	

•  How do we provide security and privacy mechanisms that
adequately consider safety and utility?	

•  When do we use traditional security and privacy
mechanisms or invent new protocols?	

•  How do we formally evaluate security and privacy
mechanisms?	

•  Novel attack surfaces	

5	
  
A Healthcare Story	

6	
  
Alice	

 Cardiac Carl	

Nurse	

 Patient
Cardiac Carl’s Condition	

7	
  
•  Atrial Fibrillation	

	

	

	

	

•  Implantable Cardioverter
Defibrillator	

•  His ICD is safety-critical	

Cardiac Carl	

Atrial Fib.
Alice and Carl’s Relationship	

8	
  
visits	

accesses ICD w/ programmer	

receives private data	

adjusts therapy	

Where are the security and privacy mechanisms?	

Cardiac	

Carl	

Nurse	

Alice
Alice and Carl’s Relationship	

9	
  
visits!
accesses ICD!
send private data!
adjust therapy!
Carl! Alice!
Mallory	

Hacker Elite
Alice Mallory and Carl’s Relationship	

10	
  
Cardiac	

Carl	

Nurse	

Alice	

Mallory	

wireless communication	

[Halperin, SP, 08], [Li, HealthCom, 11] 	

eavesdrop	

forge	

modify	

jam
Attack Surfaces	

11	
  
Cardiac	

Carl	

Telemetry Interface
Software
Hardware/Sensor Interface
Security and Privacy Mechanisms	

12	
  
•  Security and Privacy mechanisms exist in standards	

–  Medical Implant Communication Services	

–  Wireless MedicalTelemetry Service	

•  These mechanisms are optional	

•  Interoperability might take priority of security	

[Foo Kune, MedCOMM, 12]
H2H:
authentication
using IPI
Rostami et al. [45],
CCS ’13
Attacks on
OPFKA and
IMDGuard
Rostami et al. [19],
DAC ’13
Using bowel
sounds for audit
Henry et al. [46],
HealthTech ’13
OPFKA: key
agreement
based on
overlapping
PVs
Hu et al. [47],
INFOCOM ’13
Namaste:
proximity-
based attack
against ECG
Bagade et al. [23],
BSN ’13
ASK-BAN: key
gen and auth
using wireless
channel chars
Shi et al. [48],
WiSec ’13
FDA MAUDE
and Recall
database
analysis
Alemzadeh et al.
[49], SP ’13
Attacks on
friendly
jamming
techniques
Tippenhauer et al.
[50], SP ’13
MedMon:
physical layer
anomaly
detection
Zhang et al. [51],
T-BCAS ’13
Ghost Talk:
EMI signal
injection
on ICDs
Foo Kune et al. [22]
SP ’13
Key sharing via
human body
transmission
Chang et al. [52],
HealthSec ’12
Security and
privacy analysis
of MAUDE
Database
Kramer et al. [53],
PLoS ONE ’12
BANA:
authentication
using received
signal strength
variation
Shi et al. [54],
WiSec ’12
Side-channel
attacks on BCI
Martinovic et al.
[55], USENIX ’12
PSKA: PPG
and ECG-based
key agreement
Venkatasubramanian
et al. [56], T-
ITB ’10
Wristband
and password
tattoos
Denning et al. [39],
CHI ’10
ECG used
to determine
proximity
Jurik et al. [57],
ICCCN ’11
ICD validation
and verification
Jiang et al. [58],
ECRTS ’10
Shield: external
proxy and
jamming device
Gollakota et al. [59]
SIGCOMM ’11
BioSec
extension
for BANs
(journal version)
Venkatasubramanian
et al. [60],
TOSN ’10
Eavesdropping
on acoustic
authentication
Halevi et al. [61],
CCS ’10
Wireless
attacks against
insulin pumps
Li et al. [18],
HealthCom ’11
Authentication
using body
coupled
communication
Li et al. [18],
HealthCom ’11
Software
security
analysis of
external
defibrillator
Hanna et al. [1],
HealthSec ’10
IMDGuard:
ECG-based key
management
Xu et al. [62],
INFOCOM ’11
Defending
against
resource
depletion
Hei et al. [63],
GLOBECOM ’10
PPG-based
key agreement
Venkatasubramanian
et al. [64],
MILCOM ’08
Audible, tactile,
and zero power
key exchange
Halperin et al. [12],
SP ’08
Wireless
attacks
against ICDs
Halperin et al. [12],
SP ’08
Proximity-
based access
control using
ultrasonic
frequency
Rasmussen et al.
[65], CCS ’09
Security and
privacy of
neural devices
Denning et al. [66],
Neurosurg
Focus ’09
Biometric
requirements
for key
generation
Ballard et al. [67],
USENIX ’08
ECG-based
key agreement
Venkatasubramanian
et al. [68],
INFOCOM ’08
Cloaker:
external
proxy device
Denning et al. [69],
HotSec ’08
BioSec
extension
for BANs
Venkatasubramanian
and Gupta. [70],
ICISIP ’06
BioSec:
extracting
keys from PVs
Cherukuri
et al. [71]
ICPPW ’03
Authentication
and secure
key exchange
using IPI
Poon et al. [72],
Commun. Mag ’06
Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats
Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution
13	
  
Biometrics and PhysiologicalValues	

Out-of-Band	

Distance Bounding	

Software/Malware	

External Devices	

Anomaly Detection	

Future Work	

Telemetry Interface	

2013
2003
Research Challenges	

•  Access to Implantable Medical Devices	

–  Is much harder then getting other components	

•  Reproducibility	

–  Limited analysis of attacks and defenses	

–  Do not use meat-based human tissue simulators	

–  Do use a calibrated saline solution at 1.8 g/L at 21 ◦C 	

•  The complete design is described in the ANSI/AAMI
PC69:2007 standard [92,Annex G]	

	

14	
  
Security and Privacy Mechanisms	

•  Biometric and PhysiologicalValues	

–  Key generation and agreement	

•  Electrocardiogram (ECG)	

–  Heart activity signal	

•  Interpulse interval	

–  Time between heartbeats	

15	
  
H2H Authentication Protocol	

16	
  
[Rostami, CCS, 13]	

Cardiac	

Carl	

Nurse	

Alice	

measure ECG α	

measure ECG β	

send ECG measurement β 	

send ECG measurement α	

TLS without certs
H2H Authentication Protocol	

17	
  
[Rostami, CCS, 13]	

•  Adversarial Assumptions	

–  Active attacker with full network control	

–  The attacker cannot:	

•  Compromise the programmer	

•  Engage in a denial-of-service	

•  Remotely measure ECG to weaken authentication
PhysiologicalValues as an Entropy Source	

•  How do ECG-based protocols work in practice?	

–  Age, Exertion, Noise	

•  ECG-based protocols rely on an analysis of ideal data in an
unrealistic setting	

–  Data sample is close to their ideal distribution	

–  Very accurate estimate of distribution characteristics	

–  Extract randomness using the estimate on the same data sample	

	

•  Observability	

–  Using video processing techniques to extract ECG-signals	

18	
  
[Rostami, SP, 2013] [Chang, HealthTech, 2012] 	

[Poh, Biomedical Engineering, 11]
19	
  
H2H:
authentication
using IPI
Rostami et al. [45],
CCS ’13
Attacks on
OPFKA and
IMDGuard
Rostami et al. [19],
DAC ’13
Using bowel
sounds for audit
Henry et al. [46],
HealthTech ’13
OPFKA: key
agreement
based on
overlapping
PVs
Hu et al. [47],
INFOCOM ’13
Namaste:
proximity-
based attack
against ECG
Bagade et al. [23],
BSN ’13
ASK-BAN: key
gen and auth
using wireless
channel chars
Shi et al. [48],
WiSec ’13
FDA MAUDE
and Recall
database
analysis
Alemzadeh et al.
[49], SP ’13
Attacks on
friendly
jamming
techniques
Tippenhauer et al.
[50], SP ’13
MedMon:
physical layer
anomaly
detection
Zhang et al. [51],
T-BCAS ’13
Ghost Talk:
EMI signal
injection
on ICDs
Foo Kune et al. [22]
SP ’13
Key sharing via
human body
transmission
Chang et al. [52],
HealthSec ’12
Security and
privacy analysis
of MAUDE
Database
Kramer et al. [53],
PLoS ONE ’12
BANA:
authentication
using received
signal strength
variation
Shi et al. [54],
WiSec ’12
Side-channel
attacks on BCI
Martinovic et al.
[55], USENIX ’12
PSKA: PPG
and ECG-based
key agreement
Venkatasubramanian
et al. [56], T-
ITB ’10
Wristband
and password
tattoos
Denning et al. [39],
CHI ’10
ECG used
to determine
proximity
Jurik et al. [57],
ICCCN ’11
ICD validation
and verification
Jiang et al. [58],
ECRTS ’10
Shield: external
proxy and
jamming device
Gollakota et al. [59]
SIGCOMM ’11
BioSec
extension
for BANs
(journal version)
Venkatasubramanian
et al. [60],
TOSN ’10
Eavesdropping
on acoustic
authentication
Halevi et al. [61],
CCS ’10
Wireless
attacks against
insulin pumps
Li et al. [18],
HealthCom ’11
Authentication
using body
coupled
communication
Li et al. [18],
HealthCom ’11
Software
security
analysis of
external
defibrillator
Hanna et al. [1],
HealthSec ’10
IMDGuard:
ECG-based key
management
Xu et al. [62],
INFOCOM ’11
Defending
against
resource
depletion
Hei et al. [63],
GLOBECOM ’10
PPG-based
key agreement
Venkatasubramanian
et al. [64],
MILCOM ’08
Audible, tactile,
and zero power
key exchange
Halperin et al. [12],
SP ’08
Wireless
attacks
against ICDs
Halperin et al. [12],
SP ’08
Proximity-
based access
control using
ultrasonic
frequency
Rasmussen et al.
[65], CCS ’09
Security and
privacy of
neural devices
Denning et al. [66],
Neurosurg
Focus ’09
Biometric
requirements
for key
generation
Ballard et al. [67],
USENIX ’08
ECG-based
key agreement
Venkatasubramanian
et al. [68],
INFOCOM ’08
Cloaker:
external
proxy device
Denning et al. [69],
HotSec ’08
BioSec
extension
for BANs
Venkatasubramanian
and Gupta. [70],
ICISIP ’06
BioSec:
extracting
keys from PVs
Cherukuri
et al. [71]
ICPPW ’03
Authentication
and secure
key exchange
using IPI
Poon et al. [72],
Commun. Mag ’06
Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats
Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution
Future Work
Trusted Sensor Interface	

•  Current systems trust their analog sensor inputs	

•  This assumption may not always hold	

•  Forging signals using electromagnetic interference	

–  Inject cardiac waveform	

	

20	
  
[Foo Kune, SP, 2013]
Neurosecurity	

21	
  
•  Neurostimulators	

–  What are the new attack surfaces	

–  What are the implications of recording and transmitting
brainwaves	

•  Brain computer interfaces	

•  Cognitive recognition could leak:	

–  Passwords, personal information	

[Martinovic, USENIX, 2012], [Denning, Neurosurg Focus, 09]
Questions?	

•  IMDs are becoming more common	

–  Improving patient outcome	

	

•  Research gaps exists	

–  Software	

–  Sensor Interface	

•  Areas for future work include	

–  Physiological values as an Entropy Source	

–  Trusted Sensor Interface	

–  Neurosecurity	

•  See our paper for more details!	

22	
  

Más contenido relacionado

La actualidad más candente

2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano TechnologiesJan Eite Bullema
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverThe Security of Things Forum
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsijwmn
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyEnriquezShane
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesBHAVANA KONERU
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
A gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemA gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemeSAT Publishing House
 
Technology trends that can change healthcare dynamics slideshare
Technology trends that can  change healthcare dynamics  slideshareTechnology trends that can  change healthcare dynamics  slideshare
Technology trends that can change healthcare dynamics slideshareAyush Agarwal
 
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING Power System Operation
 
IntelCornellCupApplication-1
IntelCornellCupApplication-1IntelCornellCupApplication-1
IntelCornellCupApplication-1Rohit Krishnan
 
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET Journal
 
Hrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertHrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertDavid Albert
 

La actualidad más candente (20)

2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies2014 Medical applications of Micro and Nano Technologies
2014 Medical applications of Micro and Nano Technologies
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Zigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patientsZigbee based wearable remote healthcare monitoring system for elderly patients
Zigbee based wearable remote healthcare monitoring system for elderly patients
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough TechnologyExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
ExMedicus Launches Worlds First Health Smartwatch With Breakthrough Technology
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
 
ECG_poster
ECG_posterECG_poster
ECG_poster
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
A gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control systemA gsm enabled real time simulated heart rate monitoring & control system
A gsm enabled real time simulated heart rate monitoring & control system
 
Technology trends that can change healthcare dynamics slideshare
Technology trends that can  change healthcare dynamics  slideshareTechnology trends that can  change healthcare dynamics  slideshare
Technology trends that can change healthcare dynamics slideshare
 
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
SURVEY ON HYDRO GENERATOR INSTRUMENTATION AND MONITORING
 
IntelCornellCupApplication-1
IntelCornellCupApplication-1IntelCornellCupApplication-1
IntelCornellCupApplication-1
 
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...IRJET-  	  Wireless and Ubiquity Communication to Bridge the Gap of Space and...
IRJET- Wireless and Ubiquity Communication to Bridge the Gap of Space and...
 
Resume
ResumeResume
Resume
 
Hrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albertHrs2015 ecg monitoring_de_albert
Hrs2015 ecg monitoring_de_albert
 
eUno R10
eUno R10eUno R10
eUno R10
 
H ui nno_deck
H ui nno_deckH ui nno_deck
H ui nno_deck
 
Navicular in Horses
Navicular in HorsesNavicular in Horses
Navicular in Horses
 
Project Report
Project ReportProject Report
Project Report
 

Destacado

Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Shaheed Suhrawardy Medical College
 
Health Informatics and implantable medical devices
Health Informatics and implantable medical devicesHealth Informatics and implantable medical devices
Health Informatics and implantable medical devicesMyron Finseth, MSc
 
Application of bio implant & biomedical devices-recent advancement and bio-m...
Application of  bio implant & biomedical devices-recent advancement and bio-m...Application of  bio implant & biomedical devices-recent advancement and bio-m...
Application of bio implant & biomedical devices-recent advancement and bio-m...Shaheed Suhrawardy Medical College
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentationelliehood
 
New Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical DevicesNew Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical Devicesbrandypearson
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTWalt Maclay
 
Emerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEmerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEWI
 

Destacado (8)

Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
Basics of- HUMAN BIOMATERIALS, IMPLANTABLE MEDICAL DEVICES AND BIOMEDICAL SCI...
 
Health Informatics and implantable medical devices
Health Informatics and implantable medical devicesHealth Informatics and implantable medical devices
Health Informatics and implantable medical devices
 
Application of bio implant & biomedical devices-recent advancement and bio-m...
Application of  bio implant & biomedical devices-recent advancement and bio-m...Application of  bio implant & biomedical devices-recent advancement and bio-m...
Application of bio implant & biomedical devices-recent advancement and bio-m...
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
New Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical DevicesNew Application Of Nanowires for Implantable Medical Devices
New Application Of Nanowires for Implantable Medical Devices
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoT
 
Emerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device ManufacturingEmerging Trends In Medical Device Manufacturing
Emerging Trends In Medical Device Manufacturing
 

Similar a Security and Privacy in Implantable Medical Devices

Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesFacultad de Informática UCM
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devicesAjay Ohri
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...Nick Brown
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
 
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...DataScienceConferenc1
 
Distriburted medical image system
Distriburted medical image system Distriburted medical image system
Distriburted medical image system syed sajju
 
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptxIOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx21l120
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesAndrew Oram
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)Modern Healthcare
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 

Similar a Security and Privacy in Implantable Medical Devices (20)

Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devices
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
How AstraZeneca is Applying AI, Imaging & Data Analytics (AI-Driven Drug Deve...
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
paper1.pdf
paper1.pdfpaper1.pdf
paper1.pdf
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
 
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...[DSC Europe 23][DigiHealth]  Vladimir Brusic - SMART HEALTH HOME: Technology,...
[DSC Europe 23][DigiHealth] Vladimir Brusic - SMART HEALTH HOME: Technology,...
 
Distriburted medical image system
Distriburted medical image system Distriburted medical image system
Distriburted medical image system
 
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptxIOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
IOT_BASED_AUTOMATED_HEALTHCARE_SYSTEM.pptx
 
The Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and ChallengesThe Scope of Health Information Technology: Progress and Challenges
The Scope of Health Information Technology: Progress and Challenges
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
EHR Safety - Identifying and Mitigating Health IT-related Risks (Webinar Slides)
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 

Más de Michael Rushanan

Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageMichael Rushanan
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationMichael Rushanan
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 

Más de Michael Rushanan (6)

Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of Procrastination
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 

Último

General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Último (20)

General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Security and Privacy in Implantable Medical Devices

  • 1. SoK: Security and Privacy in Implantable Medical Devices Michael Rushanan1, Denis Foo Kune2, Colleen M. Swanson2, Aviel D. Rubin1 1. Johns Hopkins University 2. University of Michigan 0   This work was supported by STARnet, the Dept. of HHS under award number 90TR0003-01, and the NSF under award number CNS1329737, 1330142.
  • 2. What is an Implantable Medical Device? •  The FDA strictly defines a medical device •  Device –  Embedded system that can sense and actuate •  Implantable –  Surgically placed inside of a patient’s body •  Medical –  Provides diagnosis and therapy for numerous health conditions 1   Neuro- stimulator Cochlear implant Cardiac Insulin Pump Gastric Simulator Various IMDs Trigger M Se S
  • 3. 2   Implantable Medical Devices are not your typical PCs
  • 4. Implantable Medical Devices are not your typical PCs 3  
  • 5. Implantable Medical Devices are not your typical PCs 4   •  There exists resource limitations –  The battery limits computation and is not rechargeable •  There are safety and utility concerns –  The IMD must be beneficial to the patient and elevate patient safety above all else –  Security and privacy mechanisms must not adversely affect the patient or therapy •  Lack of security mechanisms may have severe consequences •  IMD’s provide safety-critical operation –  Must fail-open in the context of an emergency
  • 6. Research Questions •  How do we provide security and privacy mechanisms that adequately consider safety and utility? •  When do we use traditional security and privacy mechanisms or invent new protocols? •  How do we formally evaluate security and privacy mechanisms? •  Novel attack surfaces 5  
  • 7. A Healthcare Story 6   Alice Cardiac Carl Nurse Patient
  • 8. Cardiac Carl’s Condition 7   •  Atrial Fibrillation •  Implantable Cardioverter Defibrillator •  His ICD is safety-critical Cardiac Carl Atrial Fib.
  • 9. Alice and Carl’s Relationship 8   visits accesses ICD w/ programmer receives private data adjusts therapy Where are the security and privacy mechanisms? Cardiac Carl Nurse Alice
  • 10. Alice and Carl’s Relationship 9   visits! accesses ICD! send private data! adjust therapy! Carl! Alice! Mallory Hacker Elite
  • 11. Alice Mallory and Carl’s Relationship 10   Cardiac Carl Nurse Alice Mallory wireless communication [Halperin, SP, 08], [Li, HealthCom, 11] eavesdrop forge modify jam
  • 12. Attack Surfaces 11   Cardiac Carl Telemetry Interface Software Hardware/Sensor Interface
  • 13. Security and Privacy Mechanisms 12   •  Security and Privacy mechanisms exist in standards –  Medical Implant Communication Services –  Wireless MedicalTelemetry Service •  These mechanisms are optional •  Interoperability might take priority of security [Foo Kune, MedCOMM, 12]
  • 14. H2H: authentication using IPI Rostami et al. [45], CCS ’13 Attacks on OPFKA and IMDGuard Rostami et al. [19], DAC ’13 Using bowel sounds for audit Henry et al. [46], HealthTech ’13 OPFKA: key agreement based on overlapping PVs Hu et al. [47], INFOCOM ’13 Namaste: proximity- based attack against ECG Bagade et al. [23], BSN ’13 ASK-BAN: key gen and auth using wireless channel chars Shi et al. [48], WiSec ’13 FDA MAUDE and Recall database analysis Alemzadeh et al. [49], SP ’13 Attacks on friendly jamming techniques Tippenhauer et al. [50], SP ’13 MedMon: physical layer anomaly detection Zhang et al. [51], T-BCAS ’13 Ghost Talk: EMI signal injection on ICDs Foo Kune et al. [22] SP ’13 Key sharing via human body transmission Chang et al. [52], HealthSec ’12 Security and privacy analysis of MAUDE Database Kramer et al. [53], PLoS ONE ’12 BANA: authentication using received signal strength variation Shi et al. [54], WiSec ’12 Side-channel attacks on BCI Martinovic et al. [55], USENIX ’12 PSKA: PPG and ECG-based key agreement Venkatasubramanian et al. [56], T- ITB ’10 Wristband and password tattoos Denning et al. [39], CHI ’10 ECG used to determine proximity Jurik et al. [57], ICCCN ’11 ICD validation and verification Jiang et al. [58], ECRTS ’10 Shield: external proxy and jamming device Gollakota et al. [59] SIGCOMM ’11 BioSec extension for BANs (journal version) Venkatasubramanian et al. [60], TOSN ’10 Eavesdropping on acoustic authentication Halevi et al. [61], CCS ’10 Wireless attacks against insulin pumps Li et al. [18], HealthCom ’11 Authentication using body coupled communication Li et al. [18], HealthCom ’11 Software security analysis of external defibrillator Hanna et al. [1], HealthSec ’10 IMDGuard: ECG-based key management Xu et al. [62], INFOCOM ’11 Defending against resource depletion Hei et al. [63], GLOBECOM ’10 PPG-based key agreement Venkatasubramanian et al. [64], MILCOM ’08 Audible, tactile, and zero power key exchange Halperin et al. [12], SP ’08 Wireless attacks against ICDs Halperin et al. [12], SP ’08 Proximity- based access control using ultrasonic frequency Rasmussen et al. [65], CCS ’09 Security and privacy of neural devices Denning et al. [66], Neurosurg Focus ’09 Biometric requirements for key generation Ballard et al. [67], USENIX ’08 ECG-based key agreement Venkatasubramanian et al. [68], INFOCOM ’08 Cloaker: external proxy device Denning et al. [69], HotSec ’08 BioSec extension for BANs Venkatasubramanian and Gupta. [70], ICISIP ’06 BioSec: extracting keys from PVs Cherukuri et al. [71] ICPPW ’03 Authentication and secure key exchange using IPI Poon et al. [72], Commun. Mag ’06 Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution 13   Biometrics and PhysiologicalValues Out-of-Band Distance Bounding Software/Malware External Devices Anomaly Detection Future Work Telemetry Interface 2013 2003
  • 15. Research Challenges •  Access to Implantable Medical Devices –  Is much harder then getting other components •  Reproducibility –  Limited analysis of attacks and defenses –  Do not use meat-based human tissue simulators –  Do use a calibrated saline solution at 1.8 g/L at 21 ◦C •  The complete design is described in the ANSI/AAMI PC69:2007 standard [92,Annex G] 14  
  • 16. Security and Privacy Mechanisms •  Biometric and PhysiologicalValues –  Key generation and agreement •  Electrocardiogram (ECG) –  Heart activity signal •  Interpulse interval –  Time between heartbeats 15  
  • 17. H2H Authentication Protocol 16   [Rostami, CCS, 13] Cardiac Carl Nurse Alice measure ECG α measure ECG β send ECG measurement β send ECG measurement α TLS without certs
  • 18. H2H Authentication Protocol 17   [Rostami, CCS, 13] •  Adversarial Assumptions –  Active attacker with full network control –  The attacker cannot: •  Compromise the programmer •  Engage in a denial-of-service •  Remotely measure ECG to weaken authentication
  • 19. PhysiologicalValues as an Entropy Source •  How do ECG-based protocols work in practice? –  Age, Exertion, Noise •  ECG-based protocols rely on an analysis of ideal data in an unrealistic setting –  Data sample is close to their ideal distribution –  Very accurate estimate of distribution characteristics –  Extract randomness using the estimate on the same data sample •  Observability –  Using video processing techniques to extract ECG-signals 18   [Rostami, SP, 2013] [Chang, HealthTech, 2012] [Poh, Biomedical Engineering, 11]
  • 20. 19   H2H: authentication using IPI Rostami et al. [45], CCS ’13 Attacks on OPFKA and IMDGuard Rostami et al. [19], DAC ’13 Using bowel sounds for audit Henry et al. [46], HealthTech ’13 OPFKA: key agreement based on overlapping PVs Hu et al. [47], INFOCOM ’13 Namaste: proximity- based attack against ECG Bagade et al. [23], BSN ’13 ASK-BAN: key gen and auth using wireless channel chars Shi et al. [48], WiSec ’13 FDA MAUDE and Recall database analysis Alemzadeh et al. [49], SP ’13 Attacks on friendly jamming techniques Tippenhauer et al. [50], SP ’13 MedMon: physical layer anomaly detection Zhang et al. [51], T-BCAS ’13 Ghost Talk: EMI signal injection on ICDs Foo Kune et al. [22] SP ’13 Key sharing via human body transmission Chang et al. [52], HealthSec ’12 Security and privacy analysis of MAUDE Database Kramer et al. [53], PLoS ONE ’12 BANA: authentication using received signal strength variation Shi et al. [54], WiSec ’12 Side-channel attacks on BCI Martinovic et al. [55], USENIX ’12 PSKA: PPG and ECG-based key agreement Venkatasubramanian et al. [56], T- ITB ’10 Wristband and password tattoos Denning et al. [39], CHI ’10 ECG used to determine proximity Jurik et al. [57], ICCCN ’11 ICD validation and verification Jiang et al. [58], ECRTS ’10 Shield: external proxy and jamming device Gollakota et al. [59] SIGCOMM ’11 BioSec extension for BANs (journal version) Venkatasubramanian et al. [60], TOSN ’10 Eavesdropping on acoustic authentication Halevi et al. [61], CCS ’10 Wireless attacks against insulin pumps Li et al. [18], HealthCom ’11 Authentication using body coupled communication Li et al. [18], HealthCom ’11 Software security analysis of external defibrillator Hanna et al. [1], HealthSec ’10 IMDGuard: ECG-based key management Xu et al. [62], INFOCOM ’11 Defending against resource depletion Hei et al. [63], GLOBECOM ’10 PPG-based key agreement Venkatasubramanian et al. [64], MILCOM ’08 Audible, tactile, and zero power key exchange Halperin et al. [12], SP ’08 Wireless attacks against ICDs Halperin et al. [12], SP ’08 Proximity- based access control using ultrasonic frequency Rasmussen et al. [65], CCS ’09 Security and privacy of neural devices Denning et al. [66], Neurosurg Focus ’09 Biometric requirements for key generation Ballard et al. [67], USENIX ’08 ECG-based key agreement Venkatasubramanian et al. [68], INFOCOM ’08 Cloaker: external proxy device Denning et al. [69], HotSec ’08 BioSec extension for BANs Venkatasubramanian and Gupta. [70], ICISIP ’06 BioSec: extracting keys from PVs Cherukuri et al. [71] ICPPW ’03 Authentication and secure key exchange using IPI Poon et al. [72], Commun. Mag ’06 Biometric and Physiological Values Distance BoundingWireless Attacks Software/Malware Anomaly DetectionOut-of-Band External Devices Emerging Threats Food-grade meat phantom used Defense contribution Dependency RelationshipAttack contribution Future Work
  • 21. Trusted Sensor Interface •  Current systems trust their analog sensor inputs •  This assumption may not always hold •  Forging signals using electromagnetic interference –  Inject cardiac waveform 20   [Foo Kune, SP, 2013]
  • 22. Neurosecurity 21   •  Neurostimulators –  What are the new attack surfaces –  What are the implications of recording and transmitting brainwaves •  Brain computer interfaces •  Cognitive recognition could leak: –  Passwords, personal information [Martinovic, USENIX, 2012], [Denning, Neurosurg Focus, 09]
  • 23. Questions? •  IMDs are becoming more common –  Improving patient outcome •  Research gaps exists –  Software –  Sensor Interface •  Areas for future work include –  Physiological values as an Entropy Source –  Trusted Sensor Interface –  Neurosecurity •  See our paper for more details! 22