Proceedings of the 15th ACM conference on Computer and communications security
Software maturity: design as dark art
ACM SIGSOFT Software Engineering Notes
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Research challenges for the security of control systems
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Ayushman: a secure, usable pervasive health monitoring system
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
Inside risks: Reducing risks of implantable medical devices
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
Towards an ethical code for information security?
Proceedings of the 2008 workshop on New security paradigms
A spotlight on security and privacy risks with future household robots: attacks and lessons
Proceedings of the 11th international conference on Ubiquitous computing
IMCE '09 Proceedings of the 1st international workshop on Interactive multimedia for consumer electronics
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Wireless Aspects of Telehealth
Wireless Personal Communications: An International Journal
SSSL: shoulder surfing safe login
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
SAR analysis in dispersive tissues for in vivo UWB body area networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Safety and security in industrial control
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
HotPower'08 Proceedings of the 2008 conference on Power aware computing and systems
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
Proceedings of the 17th ACM conference on Computer and communications security
Reverse engineering for mobile systems forensics with Ares
Proceedings of the 2010 ACM workshop on Insider threats
Proceedings of the second annual workshop on Security and privacy in medical and home-care systems
The road to trustworthy systems
Proceedings of the fifth ACM workshop on Scalable trusted computing
Process-based derivation of requirements for medical devices
Proceedings of the 1st ACM International Health Informatics Symposium
Ubiquitous verification of ubiquitous systems
SEUS'10 Proceedings of the 8th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Proceedings of the 42nd ACM technical symposium on Computer science education
Remote Patient Monitoring Within a Future 5G Infrastructure
Wireless Personal Communications: An International Journal
Dewdrop: an energy-aware runtime for computational RFID
Proceedings of the 8th USENIX conference on Networked systems design and implementation
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
Who does the autopsy? criminal implications of implantable medical devices
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Proceedings of the 27th Annual Computer Security Applications Conference
Block cipher based security for severely resource-constrained implantable medical devices
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Security aspects of cyber-physical device safety in assistive environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design challenges for secure implantable medical devices
Proceedings of the 49th Annual Design Automation Conference
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Toward a safe integrated clinical environment: a communication security perspective
Proceedings of the 2012 ACM workshop on Medical communication systems
Security'12 Proceedings of the 21st USENIX conference on Security symposium
The research value of publishing attacks
Communications of the ACM
Body area network security: robust key establishment using human body channel
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Computer security and the modern home
Communications of the ACM
EnGarde: protecting the mobile phone from malicious NFC interactions
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
Towards trustworthy medical devices and body area networks
Proceedings of the 50th Annual Design Automation Conference
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Securing implantable cardiac medical devices: use of radio frequency energy harvesting
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Fast tag searching protocol for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON)
FIE on firmware: finding vulnerabilities in embedded systems using symbolic execution
SEC'13 Proceedings of the 22nd USENIX conference on Security
SEC'13 Proceedings of the 22nd USENIX conference on Security
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Adaptive entity-identifier generation for IMD emergency access
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.03 |
Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includes pacemaker technologyand is designed to communicate wirelessly with a nearby external programmer in the 175 kHz frequency range. After partially reverse-engineering the ICD's communications protocol with an oscilloscope and a software radio, we implemented several software radio-based attacks that could compromise patient safety and patient privacy. Motivated by our desire to improve patient safety, and mindful of conventional trade-offs between security and power consumption for resource-constrained devices, we introduce three new zero-power defenses based on RF power harvesting. Two of these defenses are human-centric, bringing patients into the loop with respect to the security and privacy of their implantable medical devices (IMDs). Our contributions provide a scientific baseline for understanding the potential security and privacy risks of current and future IMDs, and introduce human-perceptible and zero-power mitigation techniques that address those risks. To the best of our knowledge, this paper is the first in our community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols.