skip to main content
review-article
Public Access

A brief chronology of medical device security

Published:22 September 2016Publication History
Skip Abstract Section

Abstract

With the implantation of software-driven devices comes unique privacy and security threats to the human body.

References

  1. Applegate, S.D. The dawn of kinetic cyber. In Proceedings of the 5th International Conference on Cyber Conflict. IEEE, 2013, 1--15.Google ScholarGoogle Scholar
  2. Bellissimo, A. et al. Secure software updates: Disappointments and new challenges. In Proceedings of the USENIX Summit on Hot Topics in Security, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Burleson, W. et al. Design challenges for secure implantable medical devices. In Proceedings of the 49th Annual Design Automation Conference. ACM, 2012, 12--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chenok, D.J. ISPAB Letter to U.S. Office of Management and Budget (2012); http://csrc.nist.gov/groups/SMA/ispab/documents/correspondence/ispab-ltr-to-omb_med_device.pdf.Google ScholarGoogle Scholar
  5. Curfman, G.D. et al. The medical device safety act of 2009. New Eng. J. Med. 360, 15 (2009), 1550--1551.Google ScholarGoogle ScholarCross RefCross Ref
  6. Faris, T.H. Safe and Sound Software: Creating an Efficient and Effective Quality System for Software Medical Device Organizations. ASQ Quality Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Food and Drug Administration. Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Guidance for Industry and Food and Drug Administration Staff (2014); http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf.Google ScholarGoogle Scholar
  8. Food and Drug Administration. Postmarket Management of Cybersecurity in Medical Devices; Draft Guidance for Industry and Food and Drug Administration Staff (2016); http://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf.Google ScholarGoogle Scholar
  9. Fu, K. Trustworthy medical device software. Workshop Report on Public Health Effectiveness of the FDA 510 (k) Clearance Process: Measuring Postmarket Performance and Other Select Topics. National Academies Press. Washington, D.C. (2011), 102.Google ScholarGoogle Scholar
  10. Gollakota, S. et al. They can hear your heartbeats: Non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hafemeister, T.L. and Spinos, S. Lean on me: A physician's fiduciary duty to disclose an emergent medical risk to the patient. Washington University Law Review 86, 5 (2009).Google ScholarGoogle Scholar
  12. Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, 2008, 129--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hauser, R.G. and Maron, B.J. Lessons from the failure and recall of an implantable cardioverter-defibrillator. Circulation 112, 13 (2005), 2040--2042.Google ScholarGoogle ScholarCross RefCross Ref
  14. Kilbridge, P. Computer crash-lessons from a system failure. New Eng. J. Medicine 348, 10 (2003), 881--882.Google ScholarGoogle ScholarCross RefCross Ref
  15. Lee, I. et al. High-confidence medical device software and systems. Computer 39, 4 (2006), 33--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Leveson, N.G. and Turner, C.S. An investigation of the Therac-25 accidents. Computer 26, 7 (1993), 18--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Li, C. et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedings of the 13th IEEE International Conference on e-Health Networking Applications and Services. IEEE, 2011, 150--156.Google ScholarGoogle Scholar
  18. Maisel, W.H. et al. Recalls and safety alerts involving pacemakers and implantable cardioverter-defibrillator generators. JAMA 286, 7 (2001), 793--799.Google ScholarGoogle ScholarCross RefCross Ref
  19. Meier, B. Maker of heart device kept flaw from doctors. New York Times, 2005.Google ScholarGoogle Scholar
  20. National Institute of Standards and Technology (NIST). Framework for Improving Critical Infrastructure Cybersecurity (Ver. 1.0) Feb. 12, 2014; http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Perrow, C. Normal Accidents: Living with High Risk Technologies. Princeton University Press, 2011.Google ScholarGoogle Scholar
  22. Rushanan, M. et al. SoK: Security and privacy in implantable medical devices and body area networks. In Proceedings of the 2014 IEEE Symposium on Security and Privacy. IEEE CS, 524--539. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Vladeck, D.C. Medical Device Safety Act of 2009: Hearing before the Subcomm. on Health of the Comm. on Energy and Commerce (111th Cong., May 12, 2009); http://scholarship.law.georgetown.edu/cong/45.Google ScholarGoogle Scholar
  24. Zhang, M. et al. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomedical Circuits and Systems 7, 6 (2013), 871--881; DOI 10.1109/TBCAS.2013.2245664.Google ScholarGoogle ScholarCross RefCross Ref
  25. Zhang, M. et al. Towards trustworthy medical devices and body area networks. In Proceedings of the 50th Annual Design Automation Conference. ACM, 2013, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A brief chronology of medical device security

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 59, Issue 10
                October 2016
                85 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/3001840
                • Editor:
                • Moshe Y. Vardi
                Issue’s Table of Contents

                Copyright © 2016 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 22 September 2016

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • review-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format