skip to main content
review-article
Free Access

Security challenges for medical devices

Published:23 March 2015Publication History
Skip Abstract Section

Abstract

Implantable devices, often dependent on software, save countless lives. But how secure are they?

References

  1. Alemzadeh, H., Iyer, R.K. and Kalbarczyk, Z. Analysis of safety-critical computer failures in medical devices. IEEE Security & Privacy 11, 4, (July-Aug. 2013), 14--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boston Scientific. PACEMAKER System Specification. 2007.Google ScholarGoogle Scholar
  3. Denning, T., Fu, K. and Kohno, T. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of USENIX Workshop on Hot Topics in Security, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Denning, T., Matsuoka, Y. and Kohno, T. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus 27, 1 (July 2009).Google ScholarGoogle ScholarCross RefCross Ref
  5. Denning, T. et al. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Food and Drug Administration. MAUDE---Manufacturer and User Facility Device Experience; http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfMAUDE/search.CFMGoogle ScholarGoogle Scholar
  7. Food and Drug Administration. Is The Product A Medical Device? http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/Overview/ClassifyYourDevice/ucm051512.htmGoogle ScholarGoogle Scholar
  8. Food and Drug Administration. Medical Devices -- Classify Your Medical Device; http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/Overview/ClassifyYourDevice/default.htmGoogle ScholarGoogle Scholar
  9. Food and Drug Administration Safety Communication: Cybersecurity for Medical Devices and Hospital Networks; June 2013. http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htmGoogle ScholarGoogle Scholar
  10. Food and Drug Administration. Content of premarket submissions for management of cybersecurity in medical devices---Draft guidance for industry and Food and Drug administration staff, June 14, 2013; http://www.fda.gov/medicalDevices/Deviceregulationandguidance/guidanceDocuments/ucm356186.htmGoogle ScholarGoogle Scholar
  11. Fox News. Antivirus Program Goes Berserk, Freezes PCs. Apr. 22, 2010.Google ScholarGoogle Scholar
  12. Fu, K. and Blum, J. Controlling for cybersecurity risks of medical device software. Commun. ACM 56, 10 (Oct. 2013), 35--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gollakota, S. et al. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proceedings from SIGCOMM'11 (Toronto, Ontario, Canada, Aug. 15--19, 2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Halperin, D. et al. Security and privacy for implantable medical devices. IEEE Pervasive Computing, Special Issue on Implantable Electronics, (Jan. 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hansen, J.A. and Hansen, N.M. A taxonomy of vulnerabilities in implantable medical devices. In Proceedings of SPIMACS'10, (Chicago, IL, Oct. 8, 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Howard, M. and Lipner, S. The Security Development Lifecycle. Microsoft Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. International Standards Organization. Medical devices---Application of risk management to medical devices. ISO 14971:2007.Google ScholarGoogle Scholar
  19. Jee, E. et al. A safety-assured development approach for real-time software, Proc. IEEE Int. Conf. Embed. Real-time Comput. Syst. Appl. (Aug. 2010), 133--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kaplan, D. Black Hat: Insulin pumps can be hacked. SC Magazine, (Aug. 04, 2011).Google ScholarGoogle Scholar
  21. King, S.T. et al. Designing and implementing malicious hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Fabian Monrose, ed. USENIX Association, Berkeley, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kolata, G. Of fact, fiction and Cheney's defibrillator. New York Times, (Oct. 27, 2013).Google ScholarGoogle Scholar
  23. Kramer, D.B. et al. Security and privacy qualities of medical devices: An analysis of fda postmarket surveillance. PLoS ONE 7, 7 (2012), e40200; doi:10.1371/journal.pone.0040200Google ScholarGoogle ScholarCross RefCross Ref
  24. Li, C., Raghunathan, A. and Jha, N.K. Improving the trustworthiness of medical device software with formal verification methods. IEEE Embedded Systems Letters 5, 3 (Sept. 2013), 50--53.Google ScholarGoogle ScholarCross RefCross Ref
  25. McGraw, G. Software security. IEEE Security & Privacy 2, 2 (Mar-Apr 2004), 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Nixon, C. et al. Academic Dual Chamber Pacemaker. University of Minnesota, 2008.Google ScholarGoogle Scholar
  27. Ross, R.S. Guide for Conducting Risk Assessments. NIST Special Publication 800-30 Rev. 1, Sept. 2012.Google ScholarGoogle Scholar
  28. Rostami, M., Juels, A. and Koushanfar F. Heart-to-Heart (H2H): Authentication for implanted medical devices. In Proceedings for ACM SIGSAC Conference on Computer & Communications Security. ACM, New York, NY, 1099--1112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sanger, D.E. and Shanker, T. N.S.A. devises radio pathway into computers. New York Times (Jan. 14, 2014).Google ScholarGoogle Scholar
  30. Skorobogatov, S. and Woods, C. Breakthrough silicon scanning discovers backdoor in military chip, cryptographic hardware and embedded systems. Lecture Notes in Computer Science 7428 (2012), 23--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Sorber, J. et al. An amulet for trustworthy wearable mHealth. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications. ACM, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Venere, E. New firewall to safeguard against medical-device hacking. Purdue University News Service, Apr. 12, 2012.Google ScholarGoogle Scholar
  33. Vockley, M. Safe and Secure? Healthcare in the cyberworld. AAMI (Advancing Safety in Medical Technology) BI&T -- Biomedical Instrumentation & Technology, May/June 2012.Google ScholarGoogle Scholar
  34. Weaver, C. Patients put at risk by computer viruses. Wall Street Journal (June 13, 2013).Google ScholarGoogle Scholar
  35. Wei, S., Potkonjak, M. The undetectable and unprovable hardware Trojan horse. In Proceedings of the ACM Design Automation Conference (Austin, TX, May 29-June 07, 2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Wirth, A. Cybercrimes pose growing threat to medical devices. Biomed Instrum Technol. 45, 1 (Jan/Feb 2011), 26--34.Google ScholarGoogle ScholarCross RefCross Ref
  37. World Health Organization. Medical device regulations: Global overview and guiding principles. 2003.Google ScholarGoogle Scholar

Index Terms

  1. Security challenges for medical devices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 58, Issue 4
            April 2015
            86 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/2749359
            • Editor:
            • Moshe Y. Vardi
            Issue’s Table of Contents

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 March 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • review-article
            • Popular
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDFChinese translation

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format