2008
DOI: 10.1109/sp.2008.31
|View full text |Cite
|
Sign up to set email alerts
|

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Abstract: Abstract-Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includes pacemaker technology and is designed to communicate wirelessly with a nearby external programmer in the 175 kHz frequency range. After partially reverse-engineering the ICD's communications protocol with an oscilloscope and a software radio, we implemented several software radio-based attacks that could compromise patient safety an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
533
1
7

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 591 publications
(575 citation statements)
references
References 22 publications
0
533
1
7
Order By: Relevance
“…As several researchers have observed [87,124,125], a cyber attack can be used to assist terrorist activities by softening a target before a physical attack or by generating fear and confusion. Yet, the majority of research for the security of EM systems has focussed on preventive approaches that assume that an authentication framework based on encryption of communications and access control will always be successful, and are not complemented by reactive response mechanisms (Table 5).…”
Section: Discussionmentioning
confidence: 99%
“…As several researchers have observed [87,124,125], a cyber attack can be used to assist terrorist activities by softening a target before a physical attack or by generating fear and confusion. Yet, the majority of research for the security of EM systems has focussed on preventive approaches that assume that an authentication framework based on encryption of communications and access control will always be successful, and are not complemented by reactive response mechanisms (Table 5).…”
Section: Discussionmentioning
confidence: 99%
“…Security applies across the board with medical equipment but is particularly important in implantable devices due to the importance and control they have over their wearer. Much has been written in the press about compromised medical devices [58,59] so one area of future focus will be in securing these types of devices.…”
Section: Implantable Medical Devices (Imd)mentioning
confidence: 99%
“…Frigos, voitures, jouets ou dispositifs médicaux connectés…, les exemples d'objets ayant des failles ne cessent d'augmenter [2]- [4].…”
Section: Introductionunclassified