skip to main content
10.1145/2600176.2600192acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

An analysis method for medical device security

Published: 08 April 2014 Publication History

Abstract

This paper is a proposal for a poster. In it we describe a medical device security approach that researchers at Fraunhofer used to analyze different kinds of medical devices for security vulnerabilities. These medical devices were provided to Fraunhofer by a medical device manufacturer whose name we cannot disclose due to non-disclosure agreements.

References

[1]
FDA Guidance. http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/HomeHealthandConsumer/HomeUse Devices/ucm204884.htm
[2]
Lethal medical device hack taken to next level. http://www.cso.com.au/article/404909/lethal_medical_device_hack_taken_next_level/
[3]
Black hat hacker can remotely attack insulin pumps and kill people http://www.cbsnews.com/8301-501465_162-20088598-501465.htm.
[4]
Halperin et al, Pacemakers and Implantable Cardiac Defibrillators:Software Radio Attacks and Zero- Power Defenses. IEEE Symposium on Security and Privacy. 2008
[5]
Confickered! Medical Devices and Digital Medical Records Are Getting Hacked http://www.massdevice.com/blogs/massdevice/confic_kered-medical-devices-and-digital-medical-records-are-getting-hacked
[6]
FDA Should Expand Its Consideration of Information Security for Certain Types of Devices http://www.gao.gov/products/GAO-12-816
[7]
Premarket Submissions for Management of Cybersecurity in Medical Devices. http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm356186.htm

Cited By

View all
  • (2018)Exploiting Requirements Engineering to Resolve Conflicts in Pervasive Computing SystemsEvaluation of Novel Approaches to Software Engineering10.1007/978-3-319-94135-6_5(93-115)Online publication date: 1-Jul-2018

Index Terms

  1. An analysis method for medical device security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
    April 2014
    184 pages
    ISBN:9781450329071
    DOI:10.1145/2600176
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    • No. Carolina State Univeresity: North Carolina State University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 April 2014

    Check for updates

    Author Tag

    1. medical device security

    Qualifiers

    • Research-article

    Conference

    HotSoS '14
    Sponsor:
    • No. Carolina State Univeresity
    HotSoS '14: Symposium and Bootcamp on the Science of Security
    April 8 - 9, 2014
    North Carolina, Raleigh, USA

    Acceptance Rates

    HotSoS '14 Paper Acceptance Rate 12 of 21 submissions, 57%;
    Overall Acceptance Rate 34 of 60 submissions, 57%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Exploiting Requirements Engineering to Resolve Conflicts in Pervasive Computing SystemsEvaluation of Novel Approaches to Software Engineering10.1007/978-3-319-94135-6_5(93-115)Online publication date: 1-Jul-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media