skip to main content
10.1145/3359986.3361200acmconferencesArticle/Chapter ViewAbstractPublication PagesmemocodeConference Proceedingsconference-collections
research-article
Honorable Mention

Securing implantable medical devices with runtime enforcement hardware

Published:09 October 2019Publication History

ABSTRACT

In recent years we have seen numerous proof-of-concept attacks on implantable medical devices such as pacemakers. Attackers aim to breach the strict operational constraints that these devices operate within, with the end-goal of compromising patient safety and health. Most efforts to prevent these kinds of attacks are informal, and focus on application- and system-level security --- for instance, using encrypted communications and digital certificates for program verification. However, these approaches will struggle to prevent all classes of attacks. Runtime verification has been proposed as a formal methodology for monitoring the status of implantable medical devices. Here, if an attack is detected a warning is generated. This leaves open the risk that the attack can succeed before intervention can occur. In this paper, we propose a runtime-enforcement based approach for ensuring patient security. Custom hardware is constructed for individual patients to ensure a safe minimum quality of service at all times. To ensure correctness we formally verify the hardware using a model-checker. We present our approach through a pacemaker case study and demonstrate that it incurs minimal overhead in terms of execution time and power consumption.

References

  1. K. D. Atherton. 2013. How Dick Cheney Took His Heart Offline To Thwart Hackers. https://www.popsci.com/article/gadgets/how-dick-cheney-took-his-heart-offline-thwart-hackersGoogle ScholarGoogle Scholar
  2. S Serge Barold, Roland X Stroobandt, and Alfons F Sinnaeve. 2008. Cardiac Pacemakers step by step: An illustrated guide. John Wiley & Sons.Google ScholarGoogle Scholar
  3. Jan Olaf Blech, Yliès Falcone, and Klaus Becker. 2012. Towards Certified Runtime Verification. In Formal Methods and Software Engineering, Toshiaki Aoki and Kenji Taguchi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 494--509.Google ScholarGoogle Scholar
  4. Roderick Bloem, Bettina Könighofer, Robert Könighofer, and Chao Wang. 2015. Shield Synthesis: Runtime Enforcement For Reactive Systems. In Tools and Algorithms for the Construction and Analysis of Systems, Christel Baier and Cesare Tinelli (Eds.). Springer, Berlin, Heidelberg, 533--548.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D Clery. 2015. Could your pacemaker be hackable? Science 347, 6221 (January 2015), 499--499. Google ScholarGoogle ScholarCross RefCross Ref
  6. Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. SIGCOMM Comput. Commun. Rev. 41, 4 (Aug. 2011), 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zhihao Jiang, Miroslav Pajic, Salar Moarref, Rajeev Alur, and Rahul Mangharam. 2012. Modeling and Verification of a Dual Chamber Implantable Pacemaker. In Tools and Algorithms for the Construction and Analysis of Systems, Cormac Flanagan and Barbara König (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 188--203.Google ScholarGoogle Scholar
  8. J Kirk. 2012. Pacemaker hack can deliver deadly 830-volt jolt. Computerworld 17 (October 2012).Google ScholarGoogle Scholar
  9. I. Kuon and J. Rose. 2007. Measuring the Gap Between FPGAs and ASICs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 26, 2 (Feb 2007), 203--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Li, A. Raghunathan, and N. K. Jha. 2011. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services. 150--156. Google ScholarGoogle ScholarCross RefCross Ref
  11. Jay Ligatti, Lujo Bauer, and David Walker. 2005. Edit automata: enforcement mechanisms for run-time security policies. International Journal of Information Security 4, 1 (01 Feb 2005), 2--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jay Ligatti and Srikar Reddy. 2010. A Theory of Runtime Enforcement, with Results.. In ESORICS. Springer, 87--100.Google ScholarGoogle Scholar
  13. Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, and Bart Preneel. 2016. On the (in)Security of the Latest Generation Implantable Cardiac Defibrillators and How to Secure Them. In Proceedings of the 32Nd Annual Conference on Computer Security Applications (ACSAC '16). ACM, New York, NY, USA, 226--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. McGraw. 2004. Software security. IEEE Security Privacy 2, 2 (March 2004), 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Medtronic. 2017. Adapta DR pacing system UC200601057c. https://europe.medtronic.com/content/dam/medtronic-com/01_crhf/brady/pdfs/200601057cENp6_adapta_dr_pacing_system_spec%20Sheet.pdfGoogle ScholarGoogle Scholar
  16. S. Pinisetty, P. S. Roop, V. Sawant, and G. Schneider. 2018. Security of Pacemakers using Runtime Verification. In 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). 1--11. Google ScholarGoogle ScholarCross RefCross Ref
  17. Srinivas Pinisetty, Partha S. Roop, Steven Smyth, Nathan Allen, Stavros Tripakis, and Reinhard Von Hanxleden. 2017. Runtime Enforcement of Cyber-Physical Systems. ACM Trans. Embed. Comput. Syst. 16, 5s, Article 178 (Sept. 2017), 25 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Laurie Pycroft and Tipu Z. Aziz. 2018. Security of implantable medical devices with wireless connections: The dangers of cyber-attacks. Expert Review of Medical Devices 15, 6 (2018), 403--406. Google ScholarGoogle ScholarCross RefCross Ref
  19. Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, and Srdjan Capkun. 2009. Proximity-based Access Control for Implantable Medical Devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). ACM, New York, NY, USA, 410--419. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. D. Rockoff. 2016. J&J Warns Insulin Pump Vulnerable to Cyber Hacking. Wall Street Journal (October 2016).Google ScholarGoogle Scholar
  21. Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H): authentication for implanted medical devices. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13). ACM, New York, NY, USA, 1099--1112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. 2015. Security Challenges for Medical Devices. Commun. ACM 58, 4 (March 2015), 74--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R Sekar, Thomas F Bowen, and Mark E Segal. 1999. On Preventing Intrusions by Process Behavior Monitoring.. In Workshop on Intrusion Detection and Network Monitoring, Vol. 1999. 29--40.Google ScholarGoogle Scholar
  24. Julien Signoles, Nikolai Kosmatov, and Kostyantyn Vorobyov. 2017. E-ACSL, a Runtime Verification Tool for Safety and Security of C Programs (tool paper). In RV-CuBES, Vol. 3. Kalpa Publications in Computing, 164--173.Google ScholarGoogle Scholar
  25. D Takahashi. 2011. Insulin pump hacker says vendor Medtronic is ignoring security risk. Venturebeat (August 2011). https://venturebeat.com/2011/08/25/insulin-pump-hacker-says-vendor-medtronic-is-ignoring-security-risk/Google ScholarGoogle Scholar
  26. M. Tehranipoor and F. Koushanfar. 2010. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design Test of Computers 27, 1 (Jan 2010), 10--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. University of Oxford. 2019. EBMC. http://www.cprover.org/ebmcGoogle ScholarGoogle Scholar
  28. U.S. Food and Drug Administration. 2016. Postmarket Management of Cybersecurity in Medical Devices. Technical Report. Guidance for Industry and Food and Drug Administration Staff. https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdfGoogle ScholarGoogle Scholar
  29. C Weaver. 2013. Patients Put at Risk By Computer Viruses. Wall Street Journal (June 2013).Google ScholarGoogle Scholar
  30. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. In 2011 Proceedings IEEE INFOCOM. 1862--1870. Google ScholarGoogle ScholarCross RefCross Ref
  31. M. Zhang, A. Raghunathan, and N. K. Jha. 2013. MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection. IEEE Transactions on Biomedical Circuits and Systems 7, 6 (Dec 2013), 871--881. Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader