SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
Securing the Healthcare 
Industry: IMD 
Tandhy Simanjuntak 
Seminar on Practical Security 
08/18/2014
Implantable Medical Devices 
Device inserted into human body for medical purposes
2011 Most implanted medical devices in America[17] 
39% 
8% 11% 
8% 
6% 
6% 
7% 
6% 
4% 
3% 2% 
Artificial Eye Lenses 
Ear Tubes 
Coronary Stents 
Artificial Knees 
Traumatic Fracture Repair 
IUDs 
Spinal Fusion Hardware 
Breast Implants 
Heart Pacemakers 
Artificial Hips 
Implantable Cardioverter Defibrillators
Implantable Medical Devices 
Device inserted into human body for medical purposes 
Small size 
Tiny computing platform with firmware[28] 
Programmable[28] 
Limited Resources[28] 
Limited Power[28] 
Network-connected
Deep Brain 
Neurostimulator[1] 
Deep brain neurostimulator. http://www.synaptix.be 
Use for treatment of movement and affective disorders[6] 
• Parkinson’s disease 
• Essential tremor 
• Dystonia 
• Chronic Pain 
• Major depression 
• OCD
Cochlear Implant[3] 
Cochlear implant. www.medel.com. 
May helps patients with deaf to enable sufficient 
hearing for better understanding of speech[7]
Gastric Stimulator[2] 
• Attached to the surface of the stomach[7] 
• Aimed at obesity management[7] 
Implant Cardiac Defibrillator[4] 
• Implanted in the upper left chest and the lead in the right ventricle of the heart[9] 
• Detect Cardiac Arrhythmia and correct it with brief electrical impulse[9] 
Insulin Pumps[5] 
• Implanted under the skin[10] 
• Administer the insulin for the treatment of diabetes mellitus patient[10]
ACNR. Foot drop. http://www.acnr.co.uk 
Foot Drop Implant 
• Implanted on peroneal nerve, proximal to the knee[11] 
• Gait abnormality, which dropping the forefoot[12]
http://groups.csail.mit.edu/netmit/IMDShield
IMD Data[28] Static Data 
• Device make and model number 
Semi-static Data 
• Physician & Health Center ID 
• Patient Name and DOB 
• Medical Condition 
• Therapy configuration 
Dynamic Data 
• Patient health status history 
• Therapy and dosage history 
• Audit logs
Threats[28] 
Patient data extraction 
Patient data tampering 
Device re-programming 
Repeated access attempts
Threats[28] 
Device shut-off 
Therapy update 
Malicious inputs 
Data flooding
Attacks Pacemakers & ICDs : software radio attacks 
and Zero-Power defenses[26] 
Resource depletion attacks[27] 
pacemaker or ICDs 
Insulin pumps
Attacks Pacemakers & ICDs : software radio attacks and 
Zero-Power defenses[26] 
Pacemakers & ICDs : 
software radio attacks 
and Zero-Power 
defenses[26] 
Resource depletion 
attacks[27] 
pacemaker or ICD 
insulin pumps 
 Non-encrypted sensitive information 
 Reprogramming attack 
 Communicate with unauthenticated device DoS 
 3 adversaries: 
 Adversary with commercial ICD programmer 
 Passive adversary : eavesdrops communication 
 Active adversary : generate arbitrary RF
Attacks 
Resource depletion attacks[27] 
bladeRF. www.nuand.com 
Pacemakers & ICDs : 
software radio attacks 
and Zero-Power 
defenses[26] 
Resource depletion 
attacks[27] 
pacemaker or ICD 
insulin pumps 
Forced authentication attack: 
 software defined radio (bladeRF[29]/hackRF[30]) 
 Communications and computations 
 Security logs
Attacks 
Pacemakers & ICDs : 
software radio attacks 
and Zero-Power 
defenses[26] 
Resource depletion 
attacks[27] 
pacemaker or ICD 
insulin pumps 
Pacemaker or ICD[32] 
• Device shut-off 
• Read and write 
• Deliver electric shock up to 830 Volts 
Insulin Pumps 
• Supply more insulin[33] 
• Hacking Medical Devices for Fun and Insulin: Brea-king 
the Human SCADA System[34] Blackhat 2013
Challenges[28] 
Resource limitations 
Cryptography : ECC[14][15] 
Audit mechanisms
Criteria for 
IMDs[22] Safety and Utility Goals 
Security and Privacy Goals
Criteria for 
IMD 
Safety and Utility 
Goals 
Security and 
Privacy Goals 
Data access 
Data accuracy 
Device identification 
Configurability
Criteria for 
IMD 
Safety and Utility 
Goals 
Security and 
Privacy Goals 
Updatable software 
Multi-device coordination 
Auditable 
Resource efficient
Criteria for 
IMD 
Safety and Utility 
Goals 
Security and 
Privacy Goals 
Authorization 
• Personal 
• Role-based 
• IMD selection 
Availability 
Device software and testing
Criteria for 
IMD 
Safety and Utility 
Goals 
Security and 
Privacy Goals 
Device-existence privacy 
Device-type privacy 
Specific-device ID privacy 
Measurement and log privacy
Criteria for 
IMD 
Safety and Utility 
Goals 
Security and 
Privacy Goals 
Bearer privacy 
Data Integrity
Adversaries 
Type Passive adversaries 
Active adversaries 
Coordinated adversaries 
Insiders
Adversaries 
Equipment Standard equipment 
Custom equipment
Others work MedMon: with wireless monitoring and anomaly 
detection[18] 
• Snoops radio-frequency wireless 
• Multi-layer anomaly detection 
• Identify malicious transactions 
• Response: passive (notify user) or active (jamming 
packets) 
IMDShield[16] 
• Jam IMD’s messages and unauthorized commands
“At this time we believe that the risk is low and the 
benefits of the therapy to people with diabetes outweigh the 
Risk of an individual criminal attack” 
Amanda McNulty Sheldon 
Director of Public Relations for Medtronic Diabetes 
http://www.bloomberg.com/video/87427352-mcafee-s-barnaby-on-medical-device-hacking.html
References 
1. Deep brain neurosimulator. www.virtualworldlets.net. Web. 7 Aug 2014. 
2. Gastric Stimulator. www.medicalexpo.com. Web. 7 Aug 2014. 
3. Cochlear Implant. http://professionals.cochlearamericas.com. Web. 7 Aug 2014. 
4. Implant Cardiac Defribillator. drivetheweb.com. Web. 7 Aug 2014. 
5. Insulin pumps. www.medgadget.com. Web. 7 Aug 2014. 
6. Wikipedia. http://en.wikipedia.org/wiki/Deep_brain_stimulation. Web. 8 Aug 2014. 
7. Wikipedia. http://en.wikipedia.org/wiki/Cochlear_implant. Web. 8 Aug 2014. 
8. Wikipedia. http://en.wikipedia.org/wiki/Implantable_gastric_stimulation. Web. 8 Aug 2014. 
9. Wikipedia. http://en.wikipedia.org/wiki/Implantable_cardioverter-defibrillator. Web. 8 Aug 2014. 
10. Wikipedia. http://en.wikipedia.org/wiki/Insulin_pump. Web. 8 Aug 2014. 
11. Haugland, M., Childs, C., Ladouceur, M., Haase*, J., Sinkjær, T. (2000). An Implantable Foot Drop Stimulator. Proceedings of the 5th Annual IFESS 
Conference, pp. 59-62. 2000. 
12. Wikipedia. http://en.wikipedia.org/wiki/Foot_drop. Web. 8 Aug 214. 
13. T. Buchegger, G. Obberger, A. Reisenzahn, E. Hochmair, A. Stelzer, and A. Springer, ‘‘Ultrawideband transceivers for cochlear implants,EURASIP J. 
Appl. Signal. Process., vol. 2005, no. 18, pp. 3069–3075, 2005. 
14. Fan, J., Reparaz, O., Rozic, V., Verbauwhede, I. (2013). Low-Energy Encryption for Medical Devices: Security Adds an Extra Design Dimension. Design 
Automation Conference (DAC), 2013 50th ACM / EDAC / IEEE. May 29 2013-June 7 2013. 
15. Malasri, K., Wang, L. (2008) Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network. UbiComp 2008, Sept 21-24, 2008, 
Seoul, Korea. 
16. IMDShield. http://groups.csail.mit.edu/netmit/IMDShield/. Web. 7 Aug 2014.
References 
17. The eleven most implanted medical devices in America. http://247wallst.com/healthcare-economy/2011/07/18/the-eleven-most-implanted-medical-devices-in-america/ 
3/. Web. 12 Aug 2014. 
18. Zhang, M., Raghunathan, A., Jha, N.K. (2013). MedMon : Securing Medical Devices Through Wireless Monitoring and Anomaly Detection. IEEE TRANSACTIONS 
ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 7, NO. 6, DECEMBER 2013 
19. Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K (2011). They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices. 
SIGCOMM 2011, Aug 15-19, 2011, Toronto, ON, Canada. 
20. C. Zhan, W. B. Baine, A. Sedrakyan, and S. Claudia. Cardiac device implantation in the US from 1997 through 2004: A population-based analysis. Journal of 
General Internal Medicine, 2007. 
21. Fu, K. (2009) Inside risks: Reducing risks of implantable medical devices. Communications of the ACM - One Laptop Per Child: Vision vs. Reality CACM Homepage 
archive, Volume 52 Issue 6, June 2009 Pages 25-27, ACM New York, NY, USA. 
22. Halperin, D. ; Kohno, T. ; Heydt-Benjamin, T.S. ; Fu, K. ; Maisel, W.H. (2008). Security and Privacy for Implantable Medical Devices. Pervasive Computing, IEEE 
(Volume:7 , Issue: 1 ). Date of Publication: Jan.-March 2008. IEEE 
23. W. H. Maisel. Safety issues involving medical devices: Implications of recent implantable cardioverter-defibrillator malfunctions. Journal of the American Medical 
Association, 2005. 
24. ETSI EN 301 839-1 V 1.3.1 (2009-10). Electromagnetic compatibility and Radio spectrum Matters (ERM); Short Range Devices (SRD); Ultra Low Power Active 
Medical Implants (ULP-AMI) and Peripherals (ULP-AMI-P) operating in the frequency range 402 MHz to 405 MHz; Part 1: Technical characteristics and test 
methods 
25. Medical Implant Communication Service. http://en.wikipedia.org/wiki/Medical_Implant_Communication_Service. Web. 13 Aug 2014. 
26. Halperin, D. ; Heydt-Benjamin, T.S. ; Ransford, B. ; Clark, S.S. ; Defend, B. ; Morgan, W. ; Fu, K. ; Kohno, T. ; Maisel, W.H. (2008) Pacemakers and Implantable 
Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Security and Privacy, 2008. SP 2008. IEEE Symposium. Publication Year: 2008 , Page(s): 
129 – 142.
References 
27. Hei, X., Du, X., Wu, J., Hu, F. (2010). Defending Resource Depletion Attacks on Implantable Medical Devices. Global Telecommunications Conference 
(GLOBECOM 2010),IEEE. 
28. Gupta, S.(2012). Implantable Medical Devices-Cyber Risks and Mitigation Approaches. Presentation. NIST Cyber Physical Systems Workshop. April 23- 
24, 2012. 
29. BladeRF, Software defined Radio. www.nuand.com. Web. 17 Aug 2014. 
30. hackRF, open source software defined radio. http://greatscottgadgets.com/hackrf/. Web. 17 Aug 2014. 
31. bladeRF. https://www.kickstarter.com/projects/1085541682/bladerf-usb-30-software-defined-radio. Web. 17 Aug 2014 
32. Hacking implantable medical devices. http://resources.infosecinstitute.com/hcking-implantable-medical-devices/. Web. 17 Aug 2014. 
33. McAfee’s Barnaby on Medical Device Hacking. http://www.bloomberg.com/video/87427352-mcafee-s-barnaby-on-medical-device-hacking.html. 
Video. 17 Aug 2014. 
34. Radcliffe, J. (2011). Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System.

Más contenido relacionado

La actualidad más candente

Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
Hannah Rajsekhar
 
ME8791 Mechatronics Notes.pptx
ME8791 Mechatronics Notes.pptxME8791 Mechatronics Notes.pptx
ME8791 Mechatronics Notes.pptx
dharma raja`
 

La actualidad más candente (20)

Innovation in Orthopedics: Surgeon Perspectives
Innovation in Orthopedics:  Surgeon PerspectivesInnovation in Orthopedics:  Surgeon Perspectives
Innovation in Orthopedics: Surgeon Perspectives
 
Minimal invasive techniques in lumbar degenerative diseases
Minimal invasive techniques in lumbar degenerative diseasesMinimal invasive techniques in lumbar degenerative diseases
Minimal invasive techniques in lumbar degenerative diseases
 
Role OF Robots In Medical Field
Role OF Robots In Medical FieldRole OF Robots In Medical Field
Role OF Robots In Medical Field
 
Complications in Spine Surgery
Complications in Spine SurgeryComplications in Spine Surgery
Complications in Spine Surgery
 
Failed Back Surgery Syndrome
Failed Back Surgery Syndrome Failed Back Surgery Syndrome
Failed Back Surgery Syndrome
 
Diffusion Weighted MRI (2011-09-29 이정원)
Diffusion Weighted MRI (2011-09-29 이정원)Diffusion Weighted MRI (2011-09-29 이정원)
Diffusion Weighted MRI (2011-09-29 이정원)
 
CervicalScrew2011
CervicalScrew2011CervicalScrew2011
CervicalScrew2011
 
MR reconstruction 101
MR reconstruction 101MR reconstruction 101
MR reconstruction 101
 
Robotics in orthopedics
Robotics in orthopedicsRobotics in orthopedics
Robotics in orthopedics
 
Lecture 01 introduction to mems
Lecture 01   introduction to memsLecture 01   introduction to mems
Lecture 01 introduction to mems
 
Adjacent Segment disease.pptx
Adjacent Segment disease.pptxAdjacent Segment disease.pptx
Adjacent Segment disease.pptx
 
Computational Modeling & Simulation in Orthopedics: Tools to Comply in an Ev...
Computational Modeling & Simulation in Orthopedics:  Tools to Comply in an Ev...Computational Modeling & Simulation in Orthopedics:  Tools to Comply in an Ev...
Computational Modeling & Simulation in Orthopedics: Tools to Comply in an Ev...
 
Machine learning for materials design: opportunities, challenges, and methods
Machine learning for materials design: opportunities, challenges, and methodsMachine learning for materials design: opportunities, challenges, and methods
Machine learning for materials design: opportunities, challenges, and methods
 
Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
Basicunderstandingonmagneticresonanceimagingmri 141231045409-conversion-gate01
 
Robotics in Spine Surgery?
Robotics in Spine Surgery?Robotics in Spine Surgery?
Robotics in Spine Surgery?
 
DIAGNOSTIC ULTRASOUND-3.pdf
DIAGNOSTIC ULTRASOUND-3.pdfDIAGNOSTIC ULTRASOUND-3.pdf
DIAGNOSTIC ULTRASOUND-3.pdf
 
Robotic spine surgery
Robotic spine surgeryRobotic spine surgery
Robotic spine surgery
 
Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05
 
ME8791 Mechatronics Notes.pptx
ME8791 Mechatronics Notes.pptxME8791 Mechatronics Notes.pptx
ME8791 Mechatronics Notes.pptx
 
MEMS Piezoresistive Pressure Sensor: A Survey
MEMS Piezoresistive Pressure Sensor: A SurveyMEMS Piezoresistive Pressure Sensor: A Survey
MEMS Piezoresistive Pressure Sensor: A Survey
 

Similar a Securing the Healthcare Industry : Implantable Medical Devices

security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
Ajay Ohri
 
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
IJCI JOURNAL
 

Similar a Securing the Healthcare Industry : Implantable Medical Devices (20)

Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
 
Security and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesSecurity and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical Devices
 
Cybersecurity in Medical Devices
Cybersecurity in Medical DevicesCybersecurity in Medical Devices
Cybersecurity in Medical Devices
 
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...
 
Current Trends of Wearable Technology Devices in Clinical Diagnostics
Current Trends of Wearable Technology Devices in Clinical DiagnosticsCurrent Trends of Wearable Technology Devices in Clinical Diagnostics
Current Trends of Wearable Technology Devices in Clinical Diagnostics
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Challenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciencesChallenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciences
 
seminar Final ppt-format-1.pptx
seminar  Final ppt-format-1.pptxseminar  Final ppt-format-1.pptx
seminar Final ppt-format-1.pptx
 
Distriburted medical image system
Distriburted medical image system Distriburted medical image system
Distriburted medical image system
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Securing the Healthcare Industry : Implantable Medical Devices

  • 1. Securing the Healthcare Industry: IMD Tandhy Simanjuntak Seminar on Practical Security 08/18/2014
  • 2. Implantable Medical Devices Device inserted into human body for medical purposes
  • 3. 2011 Most implanted medical devices in America[17] 39% 8% 11% 8% 6% 6% 7% 6% 4% 3% 2% Artificial Eye Lenses Ear Tubes Coronary Stents Artificial Knees Traumatic Fracture Repair IUDs Spinal Fusion Hardware Breast Implants Heart Pacemakers Artificial Hips Implantable Cardioverter Defibrillators
  • 4. Implantable Medical Devices Device inserted into human body for medical purposes Small size Tiny computing platform with firmware[28] Programmable[28] Limited Resources[28] Limited Power[28] Network-connected
  • 5. Deep Brain Neurostimulator[1] Deep brain neurostimulator. http://www.synaptix.be Use for treatment of movement and affective disorders[6] • Parkinson’s disease • Essential tremor • Dystonia • Chronic Pain • Major depression • OCD
  • 6. Cochlear Implant[3] Cochlear implant. www.medel.com. May helps patients with deaf to enable sufficient hearing for better understanding of speech[7]
  • 7. Gastric Stimulator[2] • Attached to the surface of the stomach[7] • Aimed at obesity management[7] Implant Cardiac Defibrillator[4] • Implanted in the upper left chest and the lead in the right ventricle of the heart[9] • Detect Cardiac Arrhythmia and correct it with brief electrical impulse[9] Insulin Pumps[5] • Implanted under the skin[10] • Administer the insulin for the treatment of diabetes mellitus patient[10]
  • 8. ACNR. Foot drop. http://www.acnr.co.uk Foot Drop Implant • Implanted on peroneal nerve, proximal to the knee[11] • Gait abnormality, which dropping the forefoot[12]
  • 10. IMD Data[28] Static Data • Device make and model number Semi-static Data • Physician & Health Center ID • Patient Name and DOB • Medical Condition • Therapy configuration Dynamic Data • Patient health status history • Therapy and dosage history • Audit logs
  • 11. Threats[28] Patient data extraction Patient data tampering Device re-programming Repeated access attempts
  • 12. Threats[28] Device shut-off Therapy update Malicious inputs Data flooding
  • 13. Attacks Pacemakers & ICDs : software radio attacks and Zero-Power defenses[26] Resource depletion attacks[27] pacemaker or ICDs Insulin pumps
  • 14. Attacks Pacemakers & ICDs : software radio attacks and Zero-Power defenses[26] Pacemakers & ICDs : software radio attacks and Zero-Power defenses[26] Resource depletion attacks[27] pacemaker or ICD insulin pumps  Non-encrypted sensitive information  Reprogramming attack  Communicate with unauthenticated device DoS  3 adversaries:  Adversary with commercial ICD programmer  Passive adversary : eavesdrops communication  Active adversary : generate arbitrary RF
  • 15. Attacks Resource depletion attacks[27] bladeRF. www.nuand.com Pacemakers & ICDs : software radio attacks and Zero-Power defenses[26] Resource depletion attacks[27] pacemaker or ICD insulin pumps Forced authentication attack:  software defined radio (bladeRF[29]/hackRF[30])  Communications and computations  Security logs
  • 16. Attacks Pacemakers & ICDs : software radio attacks and Zero-Power defenses[26] Resource depletion attacks[27] pacemaker or ICD insulin pumps Pacemaker or ICD[32] • Device shut-off • Read and write • Deliver electric shock up to 830 Volts Insulin Pumps • Supply more insulin[33] • Hacking Medical Devices for Fun and Insulin: Brea-king the Human SCADA System[34] Blackhat 2013
  • 17. Challenges[28] Resource limitations Cryptography : ECC[14][15] Audit mechanisms
  • 18. Criteria for IMDs[22] Safety and Utility Goals Security and Privacy Goals
  • 19. Criteria for IMD Safety and Utility Goals Security and Privacy Goals Data access Data accuracy Device identification Configurability
  • 20. Criteria for IMD Safety and Utility Goals Security and Privacy Goals Updatable software Multi-device coordination Auditable Resource efficient
  • 21. Criteria for IMD Safety and Utility Goals Security and Privacy Goals Authorization • Personal • Role-based • IMD selection Availability Device software and testing
  • 22. Criteria for IMD Safety and Utility Goals Security and Privacy Goals Device-existence privacy Device-type privacy Specific-device ID privacy Measurement and log privacy
  • 23. Criteria for IMD Safety and Utility Goals Security and Privacy Goals Bearer privacy Data Integrity
  • 24. Adversaries Type Passive adversaries Active adversaries Coordinated adversaries Insiders
  • 25. Adversaries Equipment Standard equipment Custom equipment
  • 26. Others work MedMon: with wireless monitoring and anomaly detection[18] • Snoops radio-frequency wireless • Multi-layer anomaly detection • Identify malicious transactions • Response: passive (notify user) or active (jamming packets) IMDShield[16] • Jam IMD’s messages and unauthorized commands
  • 27. “At this time we believe that the risk is low and the benefits of the therapy to people with diabetes outweigh the Risk of an individual criminal attack” Amanda McNulty Sheldon Director of Public Relations for Medtronic Diabetes http://www.bloomberg.com/video/87427352-mcafee-s-barnaby-on-medical-device-hacking.html
  • 28. References 1. Deep brain neurosimulator. www.virtualworldlets.net. Web. 7 Aug 2014. 2. Gastric Stimulator. www.medicalexpo.com. Web. 7 Aug 2014. 3. Cochlear Implant. http://professionals.cochlearamericas.com. Web. 7 Aug 2014. 4. Implant Cardiac Defribillator. drivetheweb.com. Web. 7 Aug 2014. 5. Insulin pumps. www.medgadget.com. Web. 7 Aug 2014. 6. Wikipedia. http://en.wikipedia.org/wiki/Deep_brain_stimulation. Web. 8 Aug 2014. 7. Wikipedia. http://en.wikipedia.org/wiki/Cochlear_implant. Web. 8 Aug 2014. 8. Wikipedia. http://en.wikipedia.org/wiki/Implantable_gastric_stimulation. Web. 8 Aug 2014. 9. Wikipedia. http://en.wikipedia.org/wiki/Implantable_cardioverter-defibrillator. Web. 8 Aug 2014. 10. Wikipedia. http://en.wikipedia.org/wiki/Insulin_pump. Web. 8 Aug 2014. 11. Haugland, M., Childs, C., Ladouceur, M., Haase*, J., Sinkjær, T. (2000). An Implantable Foot Drop Stimulator. Proceedings of the 5th Annual IFESS Conference, pp. 59-62. 2000. 12. Wikipedia. http://en.wikipedia.org/wiki/Foot_drop. Web. 8 Aug 214. 13. T. Buchegger, G. Obberger, A. Reisenzahn, E. Hochmair, A. Stelzer, and A. Springer, ‘‘Ultrawideband transceivers for cochlear implants,EURASIP J. Appl. Signal. Process., vol. 2005, no. 18, pp. 3069–3075, 2005. 14. Fan, J., Reparaz, O., Rozic, V., Verbauwhede, I. (2013). Low-Energy Encryption for Medical Devices: Security Adds an Extra Design Dimension. Design Automation Conference (DAC), 2013 50th ACM / EDAC / IEEE. May 29 2013-June 7 2013. 15. Malasri, K., Wang, L. (2008) Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network. UbiComp 2008, Sept 21-24, 2008, Seoul, Korea. 16. IMDShield. http://groups.csail.mit.edu/netmit/IMDShield/. Web. 7 Aug 2014.
  • 29. References 17. The eleven most implanted medical devices in America. http://247wallst.com/healthcare-economy/2011/07/18/the-eleven-most-implanted-medical-devices-in-america/ 3/. Web. 12 Aug 2014. 18. Zhang, M., Raghunathan, A., Jha, N.K. (2013). MedMon : Securing Medical Devices Through Wireless Monitoring and Anomaly Detection. IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 7, NO. 6, DECEMBER 2013 19. Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K (2011). They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices. SIGCOMM 2011, Aug 15-19, 2011, Toronto, ON, Canada. 20. C. Zhan, W. B. Baine, A. Sedrakyan, and S. Claudia. Cardiac device implantation in the US from 1997 through 2004: A population-based analysis. Journal of General Internal Medicine, 2007. 21. Fu, K. (2009) Inside risks: Reducing risks of implantable medical devices. Communications of the ACM - One Laptop Per Child: Vision vs. Reality CACM Homepage archive, Volume 52 Issue 6, June 2009 Pages 25-27, ACM New York, NY, USA. 22. Halperin, D. ; Kohno, T. ; Heydt-Benjamin, T.S. ; Fu, K. ; Maisel, W.H. (2008). Security and Privacy for Implantable Medical Devices. Pervasive Computing, IEEE (Volume:7 , Issue: 1 ). Date of Publication: Jan.-March 2008. IEEE 23. W. H. Maisel. Safety issues involving medical devices: Implications of recent implantable cardioverter-defibrillator malfunctions. Journal of the American Medical Association, 2005. 24. ETSI EN 301 839-1 V 1.3.1 (2009-10). Electromagnetic compatibility and Radio spectrum Matters (ERM); Short Range Devices (SRD); Ultra Low Power Active Medical Implants (ULP-AMI) and Peripherals (ULP-AMI-P) operating in the frequency range 402 MHz to 405 MHz; Part 1: Technical characteristics and test methods 25. Medical Implant Communication Service. http://en.wikipedia.org/wiki/Medical_Implant_Communication_Service. Web. 13 Aug 2014. 26. Halperin, D. ; Heydt-Benjamin, T.S. ; Ransford, B. ; Clark, S.S. ; Defend, B. ; Morgan, W. ; Fu, K. ; Kohno, T. ; Maisel, W.H. (2008) Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. Security and Privacy, 2008. SP 2008. IEEE Symposium. Publication Year: 2008 , Page(s): 129 – 142.
  • 30. References 27. Hei, X., Du, X., Wu, J., Hu, F. (2010). Defending Resource Depletion Attacks on Implantable Medical Devices. Global Telecommunications Conference (GLOBECOM 2010),IEEE. 28. Gupta, S.(2012). Implantable Medical Devices-Cyber Risks and Mitigation Approaches. Presentation. NIST Cyber Physical Systems Workshop. April 23- 24, 2012. 29. BladeRF, Software defined Radio. www.nuand.com. Web. 17 Aug 2014. 30. hackRF, open source software defined radio. http://greatscottgadgets.com/hackrf/. Web. 17 Aug 2014. 31. bladeRF. https://www.kickstarter.com/projects/1085541682/bladerf-usb-30-software-defined-radio. Web. 17 Aug 2014 32. Hacking implantable medical devices. http://resources.infosecinstitute.com/hcking-implantable-medical-devices/. Web. 17 Aug 2014. 33. McAfee’s Barnaby on Medical Device Hacking. http://www.bloomberg.com/video/87427352-mcafee-s-barnaby-on-medical-device-hacking.html. Video. 17 Aug 2014. 34. Radcliffe, J. (2011). Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System.