Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
System structure for software fault tolerance
Proceedings of the international conference on Reliable software
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A Formal Approach to Pre-Market Review for Medical Device Software
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 01
HCMDSS-MDPNP '07 Proceedings of the 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Dynamic Binary Instrumentation-Based Framework for Malware Defense
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Protection Circuit against Differential Power Analysis Attacks for Smart Cards
IEEE Transactions on Computers
Analysis and design of a hardware/software trusted platform module for embedded systems
ACM Transactions on Embedded Computing Systems (TECS)
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
ICESS '09 Proceedings of the 2009 International Conference on Embedded Software and Systems
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
The use of triple-modular redundancy to improve computer reliability
IBM Journal of Research and Development
Human-centric connectivity enabled by body-coupled communications
IEEE Communications Magazine
A low overhead DPA countermeasure circuit based on ring oscillators
IEEE Transactions on Circuits and Systems II: Express Briefs
FinFET-Based Power Management for Improved DPA Resistance with Low Overhead
ACM Journal on Emerging Technologies in Computing Systems (JETC)
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
An amulet for trustworthy wearable mHealth
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Design challenges for secure implantable medical devices
Proceedings of the 49th Annual Design Automation Conference
IEEE Transactions on Information Theory
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Energy-efficient and Secure Sensor Data Transmission Using Encompression
VLSID '13 Proceedings of the 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems
Hi-index | 0.00 |
Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in IWMDs is towards increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as medical devices become more "intelligent," they also become less trustworthy -- less reliable and more vulnerable to malicious attacks. Various shortcomings -- hardware failures, software errors, wireless attacks, malware and software exploits, and side-channel attacks -- could undermine the trustworthiness of IWMDs and BANs. The trustworthiness of IWMDs must be addressed aggressively and proactively due to the potential for catastrophic consequences. While some recent efforts address the defense of IWMDs against specific security attacks, a holistic strategy that considers all concerns and types of threats is required. This paper discusses trustworthiness concerns in IWMDs and BANs through a comprehensive identification and analysis of potential threats and, for each threat, provides a discussion of the merits and inadequacies of current solutions.