Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy(2008)

引用 986|浏览3
暂无评分
摘要
Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includes pacemaker technologyand is designed to communicate wirelessly with a nearby external programmer in the 175 kHz frequency range. After partially reverse-engineering the ICD's communications protocol with an oscilloscope and a software radio, we implemented several software radio-based attacks that could compromise patient safety and patient privacy. Motivated by our desire to improve patient safety, and mindful of conventional trade-offs between security and power consumption for resource-constrained devices, we introduce three new zero-power defenses based on RF power harvesting. Two of these defenses are human-centric, bringing patients into the loop with respect to the security and privacy of their implantable medical devices (IMDs). Our contributions provide a scientific baseline for understanding the potential security and privacy risks of current and future IMDs, and introduce human-perceptible and zero-power mitigation techniques that address those risks. To the best of our knowledge, this paper is the first in our community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols.
更多
查看译文
关键词
software radio,general-purpose software radio,patient privacy,software radio attacks,patient safety,zero-power defenses,rf power harvesting,communications protocol,potential security,implantable cardiac defibrillators,software radio-based attack,privacy property,privacy risk,oscilloscope,security,pervasive computing,health and safety,cardiovascular system,frequency,cardiology,privacy,oscilloscopes,protocols,terrorism
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要