Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

@inproceedings{Ellouze2014DigitalIO,
  title={Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices},
  author={Nourhene Ellouze and Slim Rekhis and Mohamed Allouche and Noureddine Boudriga},
  booktitle={AIDP},
  year={2014}
}
A Cardiac Implantable Medical device (IMD) is a device, which is surgically implanted into a patient’s body, and wirelessly configured using an external pr ogrammer by prescribing physicians and doctors. A set of lethal attacks targeting these devices can be conducted due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed on IMDs. In this paper, we propose a system for postmortem analysis of lethal attack scenarios… 

Figures and Tables from this paper

Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review

TLDR
Various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives are analyzed.

Forensic Significance of Cardiac Implantable Device (Pacemaker)

TLDR
Digital data provided by the pacemaker in any ongoing investigation will have a huge evidentiary potential, as it can be made admissible in the court of law under Section 65-B of the Indian Evidence Act, 1872.

Security Risk of Wireless Implantable Medical Devices

TLDR
This paper presents a review of security risk of wireless implantable medical devices, the obstacles and solutions to address security threads that these devices might be exposed to.

Security Trade-offs in Cyber Physical Systems : A Case Study Survey on Implantable Medical Devices

TLDR
The trade-off between security, safety and availability in such systems and the safety of the patient in emergency situations where such measures must be dropped to allow access are studied.

Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices

TLDR
This paper focuses on the tradeoff between security measures required for blocking unauthorized access to the device and the safety of the patient in emergency situations where such measures must be dropped to allow access.

Forensic Investigation of Digital Crimes in Healthcare Applications

TLDR
After classifying crimes targeting healthcare applications, the requirements for the design of appropriate postmortem investigation system are discussed and a literature review of proposals related to the investigation of crimes in healthcare applications together with a discussion of the advanced issues are provided.

A Proposal on the Design of Battery-less Cardiac Pacemakers

Cardiac Pacemakers are used to monitor the rate and rhythm of the heart. Also they provide electrical simulation when the hearts beat is too slow or doesn’t beat. Present day pacemakers suffer from

An intrusion detection algorithm for wireless networks based on ASDL

TLDR
An intrusion detection algorithm based on ASDL is obtained that can find coordinated chop-chop attacks and is presented for automatically verifying whether or not the latter programs satisfy the formulas, that is, whether or whether the audit log coincides with the attack signatures.

Data Mining Analytics for Crime Security Investigation and Intrusion Detection

TLDR
Future research directions related to cyber-crime investigation that could be investigated are investigated and new trends of data mining techniques that deal with big data to detect attacks are presented.

References

SHOWING 1-10 OF 21 REFERENCES

Securing implantable cardiac medical devices: use of radio frequency energy harvesting

TLDR
A Radio Frequency energy harvesting solution is used to design a powerless mutual authentication protocol and a technique for dynamic biometric keys extraction from electrocardiogram signals collected at both sides is used, allowing to secure access to the IMD devices in regular and emergency situations.

Heart-to-heart (H2H): authentication for implanted medical devices

TLDR
A novel cryptographic device pairing protocol that uses time-varying randomness from ECG signals to protect against attacks by active adversaries, while meeting the practical challenges of lightweight implementation and noise tolerance in ECG readings is introduced.

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

TLDR
This paper is the first in the community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols, and introduces three new zero-power defenses based on RF power harvesting.

Balancing security and utility in Medical Devices?

TLDR
This paper reviews proposed approaches to the accesscontrol problem for IMDs, including the problem of secure pairing (and key distribution) between an IMD and another device, such as a programmer, and describes some limitations of well-conceived proposals and reveals security weaknesses in two proposed cryptographic pairing schemes.

Security and Privacy for Implantable Medical Devices

TLDR
The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.

Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system

TLDR
The study shows that both passive attacks and active attacks can be successfully launched using public-domain information and widely available off-the-shelf hardware and proposed defenses against such attacks have the potential to mitigate the security risks associated with personal healthcare systems.

Design challenges for secure implantable medical devices

TLDR
This survey paper summarizes recent work on IMD security and discusses sound security principles to follow and common security pitfalls to avoid and the importance of understanding and addressing security and privacy concerns in an increasingly connected world.

MICS transceivers: regulatory standards and applications [medical implant communications service]

TLDR
The regulatory standards and the characteristics of MICS transceivers are reviewed, which show usage is rapidly increasing in medical implant devices such as cardiac pacemakers, implantable cardioverter defibrillators, neurostimulators, hearing aids and automated drug delivery systems.