Departmental Papers (CIS)

Document Type

Journal Article

Date of this Version

9-2012

Comments

Venkatasubramanian, K. K., Vasserman, E. Y., Sokolsky, O., & Lee, I. Security and Interoperable-Medical-Device Systems, Part 1. Security & Privacy, IEEE, 10(5), 61-63, Sept.-Oct. 2012 doi: 10.1109/MSP.2012.128

Part 2 available at: http://repository.upenn.edu/cis_papers/748

© 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Abstract

Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 1 of this two-part article provides an overview of the IMD environment and the attacks that can be mounted on it.

Keywords

Biomedical equipment, Computer security, Interoperability, Medical devices, ICE, Integrated Clinical Environment, attack model, attack vectors, computer security, interoperable medical devices, PRECISE_paper, PRECISE_CPS_Medical

Share

COinS
 

Date Posted: 22 January 2013

This document has been peer reviewed.