Vis enkel innførsel

dc.contributor.authorBour, Guillaume
dc.contributor.authorMoe, Marie Elisabeth Gaup
dc.contributor.authorBorgaonkar, Ravishankar Bhaskarrao
dc.date.accessioned2023-08-31T16:54:12Z
dc.date.available2023-08-31T16:54:12Z
dc.date.created2022-08-11T14:14:52Z
dc.date.issued2022
dc.identifier.citationProceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2022) - Volume 1. 2022, 35-45.en_US
dc.identifier.isbn978-989-758-552-4
dc.identifier.urihttps://hdl.handle.net/11250/3086725
dc.description.abstractMedical devices and their connectivity capabilities are providing a variety of benefits to the healthcare domain, including remote monitoring, automated alerts, and improved patient outcomes. However, these medical devices introduce a range of new potential cyber security risks when connected to the Internet, affecting the patient or the healthcare infrastructure. In this paper, we systematically analyze the security issues of connected pacemakers. In particular, we use a black box testing methodology against a commercial pacemaker device and the network infrastructure. Our main objective is to understand how the data is sent from a bedside monitor in the patient’s home to the backend server hosted by the pacemaker manufacturer, and whether or not this data is protected from a cyber security perspective. To do so, we leveraged several hardware related vulnerabilities found in the bedside monitor to obtain the firmware of the device and then reverse engineered the proprietary communication protocol. We demonstrate how vulnerabilities in this protocol can be leveraged to allow an attacker to perform a man-in-the-middle attack on the pacemaker.en_US
dc.language.isoengen_US
dc.publisherSciTePressen_US
dc.relation.ispartofProceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2022) - Volume 1
dc.relation.urihttps://www.scitepress.org/PublicationsDetail.aspx?ID=p5nfEL479XE=&t=1
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleExperimental Security Analysis of Connected Pacemakersen_US
dc.title.alternativeExperimental Security Analysis of Connected Pacemakersen_US
dc.typeChapteren_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber35-45en_US
dc.identifier.doi10.5220/0010816900003123
dc.identifier.cristin2042467
dc.relation.projectNorges forskningsråd: 288856en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal