Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

  • Authors:
  • Daniel Halperin;Thomas S. Heydt-Benjamin;Benjamin Ransford;Shane S. Clark;Benessa Defend;Will Morgan;Kevin Fu;Tadayoshi Kohno;William H. Maisel

  • Affiliations:
  • -;-;-;-;-;-;-;-;-

  • Venue:
  • SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
  • Year:
  • 2008

Quantified Score

Hi-index 0.03

Visualization

Abstract

Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includes pacemaker technologyand is designed to communicate wirelessly with a nearby external programmer in the 175 kHz frequency range. After partially reverse-engineering the ICD's communications protocol with an oscilloscope and a software radio, we implemented several software radio-based attacks that could compromise patient safety and patient privacy. Motivated by our desire to improve patient safety, and mindful of conventional trade-offs between security and power consumption for resource-constrained devices, we introduce three new zero-power defenses based on RF power harvesting. Two of these defenses are human-centric, bringing patients into the loop with respect to the security and privacy of their implantable medical devices (IMDs). Our contributions provide a scientific baseline for understanding the potential security and privacy risks of current and future IMDs, and introduce human-perceptible and zero-power mitigation techniques that address those risks. To the best of our knowledge, this paper is the first in our community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols.