2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2011
DOI: 10.1109/iembs.2011.6090663
|View full text |Cite
|
Sign up to set email alerts
|

Biomedical devices and systems security

Abstract: Abstract-Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 6 publications
0
23
0
Order By: Relevance
“…The second type of adversaries, passive, eavesdrop for the purposes of acquiring private data stored in a device. They also note four classes of targets that adversaries attack within medical device systems: patient physical security, patient data security (privacy), medical device physical security, and data security of the health-care institution that deploys the device [26]. Burleson et al [20] note that threat modeling is vital to assessing the security vulnerabilities to medical devices, and the risk posed by the vulnerabilities varies along with the nature of the data or the ramification of actuation.…”
Section: Risks For Medical Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…The second type of adversaries, passive, eavesdrop for the purposes of acquiring private data stored in a device. They also note four classes of targets that adversaries attack within medical device systems: patient physical security, patient data security (privacy), medical device physical security, and data security of the health-care institution that deploys the device [26]. Burleson et al [20] note that threat modeling is vital to assessing the security vulnerabilities to medical devices, and the risk posed by the vulnerabilities varies along with the nature of the data or the ramification of actuation.…”
Section: Risks For Medical Devicesmentioning
confidence: 99%
“…Arney et al [26] state that adversaries who attack medical devices can be classified into two categories, active and passive. Active adversaries have the ability to spy on communications among devices, network controllers and supervisors.…”
Section: Risks For Medical Devicesmentioning
confidence: 99%
“…These devices have the potential to be tampered with, reprogrammed by unauthorized users or subject to device-specific hazards [5]. Devices can be targeted though their firmware upgrades or through connections to the network interface when connected through remote attacks, in addition to local attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Security is crucial for the long term viability of all types of networked medical devices [5]. These devices have the potential to be tampered with, reprogrammed by unauthorized users or subject to device-specific hazards [5].…”
Section: Introductionmentioning
confidence: 99%
“…And in the area of biomedical devices the issue of security of these devices has been increasingly critical because the development trend of these devices will connect them to other entities through both wired and wireless channels. It is therefore important to consider medical device security issues [12].…”
Section: Introductionmentioning
confidence: 99%