ABSTRACT
Mobile sensing technologies present exciting opportunities for healthcare. Wireless sensors can automatically provide sensor data to care providers, dramatically improving their ability to diagnose, monitor, and manage a wide range of medical conditions. Using mobile phones to provide connectivity between sensors and providers is essential to keeping costs low and deployments simple. Unfortunately, software-based attacks against phones, which can have significant consequences for patients, are also on the rise.
This poster describes a simple, flexible, and novel approach to protecting both the confidentiality and integrity medical sensing and data processing on vulnerable mobile phones, using plug-in smart cards---even a phone compromised by malware. We describe our design, implementation, and initial experimental results using real smart cards and Android smartphones.
- P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall. Toward trustworthy mobile sensing. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile), pages 31--36. ACM, Feb. 2010. DOI DOIbbl10.1145/1734583.1734592. Google ScholarDigital Library
- L. A. Saxon, D. L. Hayes, F. R. Gilliam, P. A. Heidenreich, J. Day, M. Seth, T. E. Meyer, P. W. Jones, and J. P. Boehmer. Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study. Circulation, 122(23):2359--2367, Dec. 2010. DOI DOIbbl10.1161/CIRCULATIONAHA.110.960633.Google ScholarCross Ref
- Trusted Computing Group. TPM Main Specification Level 2 Version 1.2, Rev 103. http://www.trustedcomputinggroup.org/resources/tpm_main_specification.Google Scholar
Index Terms
- Poster: practical trusted computing for mhealth sensing
Recommendations
Wireless networks, physician handhelds use, and medical devices in U.S. hospitals
WH '15: Proceedings of the conference on Wireless HealthAs wireless technologies such as smartphones, tablets, and other handheld devices continue to permeate into every aspect of everyday life, hospitals have attempted to integrate them into the clinical workflow. Similarly, wireless sensor devices are ...
N-version Obfuscation
CPSS '16: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System SecurityAlthough existing for decades, software tampering attack is still a main threat to systems, such as Android, and cyber physical systems. Many approaches have been proposed to thwart specific procedures of tampering, e.g., obfuscation and self-...
Perioperative Smartphone Apps and Devices for Patient-Centered Care
Smartphones have grown in ubiquity and computing power, and they play an ever-increasing role in patient-centered health care. The "medicalized smartphone" not only enables web-based access to patient health resources, but also can run patient-oriented ...
Comments