SoK:Security and Privacy
in Implantable Medical Devices
Michael Rushanan1, Denis Foo Kune2, Colleen M. Swanson2, Aviel D. Rubin1
- 1. Johns Hopkins University
- 2. University of Michigan
What is an Implantable Medical Device? The FDA strictly defines a - - PowerPoint PPT Presentation
SoK: Security and Privacy in Implantable Medical Devices Michael Rushanan 1 , Denis Foo Kune 2 , Colleen M. Swanson 2 , Aviel D. Rubin 1 1. Johns Hopkins University 2. University of Michigan 0 This work was supported by STARnet, the Dept. of
in Implantable Medical Devices
Michael Rushanan1, Denis Foo Kune2, Colleen M. Swanson2, Aviel D. Rubin1
What is an Implantable Medical Device?
medical device
– Embedded system that can sense and actuate
– Surgically placed inside of a patient’s body
– Provides diagnosis and therapy for numerous health conditions
1
Neuro- stimulator Cochlear implant Cardiac
Pump Gastric Simulator
2
Implantable Medical Devices are not your typical PCs
Implantable Medical Devices are not your typical PCs
3
Implantable Medical Devices are not your typical PCs
4
– The battery limits computation and is not rechargeable
– The IMD must be beneficial to the patient and elevate patient safety above all else – Security and privacy mechanisms must not adversely affect the patient or therapy
consequences
– Must fail-open in the context of an emergency
Research Questions
adequately consider safety and utility?
mechanisms or invent new protocols?
mechanisms?
5
A Healthcare Story
6
Alice Cardiac Carl
Nurse Patient
Cardiac Carl’s Condition
7
Defibrillator
Cardiac Carl
Atrial Fib.
Alice and Carl’s Relationship
8
visits
accesses ICD w/ programmer receives private data adjusts therapy
Where are the security and privacy mechanisms?
Cardiac Carl Nurse Alice
Alice and Carl’s Relationship
9
Mallory
Hacker Elite
Alice Mallory and Carl’s Relationship
10
Cardiac Carl Nurse Alice Mallory
wireless communication
[Halperin, S&P , 08], [Li, HealthCom, 11]
eavesdrop forge modify jam
Attack Surfaces
11
Cardiac Carl Telemetry Interface Software Hardware/Sensor Interface
Security and Privacy Mechanisms
12
– Medical Implant Communication Services – Wireless Medical Telemetry Service
[Foo Kune, MedCOMM, 12]
13
Biometrics and Physiological Values Out-of-Band Distance Bounding Software/Malware External Devices Anomaly Detection Future Work Telemetry Interface
2013 2003
Research Challenges
– Is much harder then getting other components
– Limited analysis of attacks and defenses – Do not use meat-based human tissue simulators – Do use a calibrated saline solution at 1.8 g/L at 21 ◦C
PC69:2007 standard [92, Annex G]
14
Security and Privacy Mechanisms
Values
– Key generation and agreement
– Heart activity signal
– Time between heartbeats
15
H2H Authentication Protocol
16
[Rostami, CCS, 13] Cardiac Carl Nurse Alice
measure ECG α measure ECG β send ECG measurement β send ECG measurement α TLS without certs
H2H Authentication Protocol
17
[Rostami, CCS, 13]
– Active attacker with full network control – The attacker cannot:
Physiological Values as an Entropy Source
– Age, Exertion, Noise
unrealistic setting
– Data sample is close to their ideal distribution – Very accurate estimate of distribution characteristics – Extract randomness using the estimate on the same data sample
– Using video processing techniques to extract ECG-signals
18
[Rostami, S&P , 2013] [Chang, HealthTech, 2012] [Poh, Biomedical Engineering, 11]
19
H2H: authentication using IPI Rostami et al. [45], CCS ’13 Attacks on OPFKA and IMDGuard Rostami et al. [19], DAC ’13 Using bowel sounds for audit Henry et al. [46], HealthTech ’13 OPFKA: key agreement based onFuture Work
Trusted Sensor Interface
– Inject cardiac waveform
20
[Foo Kune, S&P , 2013]
Neurosecurity
21
– What are the new attack surfaces – What are the implications of recording and transmitting brainwaves
– Passwords, personal information
[Martinovic, USENIX, 2012], [Denning, Neurosurg Focus, 09]
Questions?
– Improving patient outcome
– Software – Sensor Interface
– Physiological values as an Entropy Source – Trusted Sensor Interface – Neurosecurity
22
This is Not Just an Engineering Problem
23
[Halperin, S&P , 08]