Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses

被引:396
作者
Halperin, Daniel [2 ]
Clark, Shane S. [1 ]
Fu, Kevin [1 ]
Heydt-Benjamin, Thomas S. [1 ]
Defend, Benessa [1 ]
Kohno, Tadayoshi [2 ]
Ransford, Benjamin [1 ]
Morgan, Will [1 ]
Maisel, William H. [3 ,4 ]
机构
[1] Univ Massachusetts Amherst, Dept Comp Sci, Med Device Secur Ctr, 140 Governors Dr, Amherst, MA 01003 USA
[2] Univ Washington, Seattle, WA 98195 USA
[3] BIDMC, Boston, MA USA
[4] Harvard Med Sch, Boston, MA USA
来源
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2008年
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2008.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includes pacemaker technology and is designed to communicate wirelessly with a nearby external programmer in the 175 kHz frequency range. After partially reverse-engineering the ICD's communications protocol with an oscilloscope and a software radio, we implemented several software radio-based attacks that could compromise patient safety and patient privacy. Motivated by our desire to improve patient safety, and mindful of conventional trade-offs between security and power consumption for resource-constrained devices, we introduce three new zero-power defenses based on RF power harvesting. Two of these defenses are human-centric, bringing patients into the loop with respect to the security and privacy of their implantable medical devices (IMDs). Our contributions provide a scientific baseline for understanding the potential security and privacy risks of current and future IMDs, and introduce human-perceptible and zero-power mitigation techniques that address those risks. To the best of our knowledge, this paper is the first in our community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols.
引用
收藏
页码:129 / +
页数:2
相关论文
共 31 条
[1]  
BELLISSIMO A, 2006, P USENIX HOT TOPICS
[2]  
CHAE HJ, 2007, P C RFID SEC JUL
[3]  
CHERUKURI S, 2003, ICPP WORKSH
[4]  
DREW T, 2006, 5 INT JOINT C AUT AG
[5]  
Ettus_Research_LLC, UN SOFTW RAD PER
[6]  
FU K, 2006, P S NETW DISTR SYST
[7]  
FUKOMOTO M, 2003, P 1 INT C APPL DES 2
[8]  
GOODRICH MT, 2005, LOUD CLEAR HUMAN VER
[9]  
HALLER N, 1994, P S NETW DISTR SYST
[10]  
Halperin D., 2008, IEEE PERVASIVE COMPU