A Real-Time Fault Tolerant Intra-Body Network
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Software vulnerability analysis
Software vulnerability analysis
A taxonomy of computer attacks with applications to wireless networks
A taxonomy of computer attacks with applications to wireless networks
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security aspects of cyber-physical device safety in assistive environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Hi-index | 0.00 |
Once the domain of science fiction, devices connecting biological systems with computers have become reality. Security vulnerabilities that might be exploited in such systems by malicious parties or by inadvertent manipulation are also now a reality. Where previous research has described certain categories of attacks against and countermeasures for implantable medical devices (IMDs), we construct a loose vulnerability taxonomy useful for the design of countermeasures that reinforce the security of these devices and evaluate avenues of attack that are novel to devices implanted in the body. Using this taxonomy, we discuss several well-known and novel countermeasures and discuss the specific categories of attacks that each can foil.