Attack-tree-based Threat Modeling of Medical Implants

M. Siddiqi, R. M. Seepers, Mohammad Hamad, V. Prevelakis, C. Strydis
{"title":"Attack-tree-based Threat Modeling of Medical Implants","authors":"M. Siddiqi, R. M. Seepers, Mohammad Hamad, V. Prevelakis, C. Strydis","doi":"10.29007/8gxh","DOIUrl":null,"url":null,"abstract":"Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wirelesscommunication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. There is, thus, a rising trend towards increased connectivity of these devices. The downside of this trend is, however, a proportional increase in the attack surface that can be exploited by a malicious entity. In effect, threat modeling of IMDs becomes ever more important. This is reflected by an increase in the number of vulnerabilities being found consistently in the IMDs available in market. This paper proposes a threat-modeling analysis based on attack trees to evaluate the security of these devices. As an example, three recent lightweight IMD security protocols from literature are analyzed using this approach to demonstrate its effectiveness in suggesting security improvements.","PeriodicalId":398629,"journal":{"name":"International Workshop on Security Proofs for Embedded Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Security Proofs for Embedded Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29007/8gxh","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Modern Implantable Medical Devices (IMDs) are low-power embedded systems with life-critical functionalities. Almost all of these devices are equipped with wirelesscommunication capabilities in order to aid in diagnosis, in updating the functional settings and firmware and so on, without any surgical procedure to perform these tasks manually. There is, thus, a rising trend towards increased connectivity of these devices. The downside of this trend is, however, a proportional increase in the attack surface that can be exploited by a malicious entity. In effect, threat modeling of IMDs becomes ever more important. This is reflected by an increase in the number of vulnerabilities being found consistently in the IMDs available in market. This paper proposes a threat-modeling analysis based on attack trees to evaluate the security of these devices. As an example, three recent lightweight IMD security protocols from literature are analyzed using this approach to demonstrate its effectiveness in suggesting security improvements.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于攻击树的医疗植入物威胁建模
现代植入式医疗设备(imd)是具有生命关键功能的低功耗嵌入式系统。几乎所有这些设备都配备了无线通信功能,以帮助诊断、更新功能设置和固件等,而无需任何外科手术来手动执行这些任务。因此,这些设备的连接性增加的趋势正在上升。然而,这种趋势的缺点是,恶意实体可以利用的攻击面会成比例地增加。实际上,imd的威胁建模变得越来越重要。这反映在市场上可用的imd中不断发现的漏洞数量的增加上。本文提出了一种基于攻击树的威胁建模分析方法来评估这些设备的安全性。作为一个例子,我们使用这种方法分析了文献中最近的三个轻量级IMD安全协议,以证明它在建议安全性改进方面的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones Attack-tree-based Threat Modeling of Medical Implants Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms Detection and Correction of Malicious and Natural Faults in Cryptographic Modules
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1