Design Challenges for Secure Implantable Medical Devices
|
|
|
- Lorraine Hawkins
- 10 years ago
- Views:
Transcription
1 Design Challenges for Secure Implantable Medical Devices Wayne Burleson Department of Electrical and Computer Engineering University of Massachusetts Amherst Amherst, MA Shane S. Clark, Benjamin Ransford, Kevin Fu Department of Computer Science University of Massachusetts Amherst Amherst, MA ABSTRACT Implantable medical devices, or IMDs, are increasingly being used to improve patients medical outcomes. Designers of IMDs already balance safety, reliability, complexity, power consumption, and cost. However, recent research has demonstrated that designers should also consider security and data privacy to protect patients from acts of theft or malice, especially as medical technology becomes increasingly connected to other systems via wireless communications or the Internet. This survey paper summarizes recent work on IMD security. It discusses sound security principles to follow and common security pitfalls to avoid. As trends in power efficiency, sensing, wireless systems and bio-interfaces make possible new and improved IMDs, they also underscore the importance of understanding and addressing security and privacy concerns in an increasingly connected world. Categories and Subject Descriptors J.3 [Computer Applications]: Life and Medical Sciences Medical information systems; C.3 [Computer Systems Organization]: Special-Purpose and Application-Based Systems Real-time and embedded systems General Terms Security, Design Keywords Implantable Medical Devices, IMD Security 1. INTRODUCTION Implantable medical devices (IMDs) perform a variety of therapeutic or life-saving functions ranging from drug infusion and cardiac pacing to direct neurostimulation. Modern IMDs often contain electronic components that perform increasingly sophisticated sensing, computation, and actuation, in many cases without any patient interaction. IMDs have already improved medical outcomes Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. DAC 2012, June 3 7, 2012, San Francisco, California, USA Copyright 2012 ACM /12/06...$ for millions of patients; many more will benefit from future IMD technology treating a growing number of ailments. Because of their crucial roles in patient health, IMDs undergo rigorous evaluation to verify that they meet specific minimum safety and effectiveness requirements. However, security is a relatively new concern for regulatory bodies; bug-averse manufacturers have traditionally had little incentive to add security mechanisms that might cause problems or slow down regulatory approval. Perhaps not surprisingly in light of this situation, recent security research has demonstrated that some IMDs fail to meet appropriate expectations of security for critically important systems. The key classes of IMD vulnerabilities researchers have identified are control vulnerabilities, in which an unauthorized person can gain control of an IMD s operation or even disable its therapeutic services, and privacy vulnerabilities, in which an IMD exposes patient data to an unauthorized party. Both kinds of vulnerabilities may be harmful to patients health outcomes, and both kinds are avoidable. As designers realign themselves with incentives for better security, there are ample opportunities to adapt well-tested security principles to IMD design. This survey paper s goals are to (1) outline design principles for IMD security; (2) highlight the security challenges in designing implantable medical devices, some of which remain open problems; and (3) sketch the defensive measures that researchers have proposed and implemented. 1.1 Security Goals for IMD Design The term security refers to the goal of well-defined, correct system behavior in the presence of adversaries. 1 Security and reliability, both of which define policies and actions under a variety of conditions, form the basis of trustworthiness [9]. IMD designers can follow well-founded security practices to avoid pitfalls ( 3) and build trustworthy systems. In short, designers should: Consider security in early design phases. Encrypt sensitive traffic where possible. Authenticate third-party devices where possible. Use well-studied cryptographic building blocks instead of ad-hoc designs. Assume an adversary can discover your source code and designs; do not rely on security through obscurity. Use industry-standard source-code analysis techniques at design time. Develop a realistic threat model ( 1.2); defend the most attractive targets first. 1 See Bishop s textbook [4] for an introduction to security. 12
2 These design principles are not specific to IMDs; they are fundamental security ideas. Applying them to the IMD domain requires special consideration of IMDs use cases and limitations. For example, the choice of cryptographic system to implement on a tiny biosensor or nonrechargeable heart device can have major implications for device longevity. Halperin et al. detail some holistic design considerations related to medical-device security [14]. In contrast, this paper focuses on device-level concepts, relating the above principles to three specific classes of IMD ( 2). 1.2 Threat Modeling Threat modeling, which entails anticipating and characterizing potential threats, is a vital aspect of security design. With realistic models of adversaries, designers can assign appropriate priorities to addressing different threats. The severity of vulnerabilities varies along with the sensitivity of the data or the consequences of actuation; there is no one size fits all threat model for IMDs. A non-actuating glucose sensor incurs different risks than a defibrillator that can deliver disruptive electrical shocks to a heart. Adversaries are typically characterized according to their goals, their capabilities and the resources they possess. Security designers evaluate each threat by considering the value of the target and the amount of effort necessary to access it. Recent work analyzing IMD security and privacy has posited several classes of adversaries, described below. An eavesdropper who listens to an IMD s radio transmissions, but does not interfere with them, can often learn private information with minimal effort. Such a passive adversary may have access to an oscilloscope, software radio, directional antennas, and other listening equipment. Several studies have considered this type of adversary and demonstrated that eavesdropping on unencrypted communications could compromise patients data privacy [15, 20, 23, 26, 28]. An active adversary extends the passive adversary s capabilities with the ability to generate radio transmissions addressed to the IMD, or to replay recorded control commands. Halperin et al. demonstrated that an active adversary with a programmable radio could control one model of implantable defibrillator by replaying messages disabling programmed therapies or even delivering a shock intended to induce a fatal heart rhythm [15]. Jack and Li have demonstrated similar control over an insulin pump, including the ability to stop insulin delivery or inject excessive doses [28, 20]. Another adversarial capability is binary analysis, the ability to disassemble a system s software and in some cases completely understand its operation. By inspecting the Java-based configuration program supplied with his own insulin pump, researcher Jerome Radcliffe reverse-engineered the pump s packet structure, revealing that the pump failed to encrypt the medical data it transmitted or to adequately authenticate the components to one another [26]. In contrast to design-time static analysis of source code, a crucial practice that may expose flaws before devices are shipped [18], binary analysis involves inspecting compiled code; it can expose flaws in systems that erroneously depend on the supposed difficulty of reverse engineering to conceal private information. In the context of medical conditions, it may be difficult to comprehend why a malicious person would seek to cause harm to patients receiving therapy, but unfortunately, it has happened in the past. For example, in 2008, malicious hackers defaced a webpage run by the nonprofit Epilepsy Foundation, replacing the page s content with flashing animations that induced migraines or seizures for some unsuspecting visitors [24]. Although we know of no reports Sensing Glucose Monitor Display Programmer User Input Actuation Insulin Pump Outside Patient Inside Patient Figure 1: Block diagram of an insulin pump system (IPS), an open-loop IMD. of malicious attacks against IMDs in the wild, it is important to address vulnerabilities before they become serious threats. 2. DEVICES IN DEPTH To illustrate the complexity of the design space for IMD security, we offer three examples of IMD systems that pose different security challenges because of their different design and usage. The common thread among all three devices insulin pump systems, implantable cardioverter defibrillators, and subcutaneous biosensors is that security is a crucial design concern. Section 2.4 explores commonalities and defensive concepts. 2.1 Insulin Pump: Open-Loop System Insulin pump systems straddle the boundary between implanted and external systems, including some components that are physically attached to a patient and others that are external. A typical modern insulin pump system (IPS) may include: an insulin infusion pump with wireless interface that subcutaneously delivers insulin, a continuous glucose monitor (CGM) with wireless transmitter and subcutaneous sensor for glucose measurement, and a wireless remote control that the patient can use to alter infusion pump settings or manually trigger insulin injections. The CGM automatically takes frequent glucose readings, presenting the data to the user via a screen or PC, or sending data directly to the pump. The pump automatically provides basal doses for insulin maintenance and can also administer larger bolus doses to compensate for large insulin spikes that may result from, e.g., a meal. Finally, the remote control provides a convenient interface for the user to adjust pump settings without using the pump controls and screen typically attached at the abdomen. Figure 1 shows a block diagram of an IPS. Insulin pump systems exemplify open-loop IMDs: they require patient interaction to change pump settings. Specifically, the patient s remote control but not the CGM directly controls pump actuation. Because the remote-control interface carries crucial information and control signals, initial security studies have focused on finding vulnerabilities at this interface. Li et al. discovered that one IPS s communications were unencrypted, leading to potential disclosure of private patient information (e.g., glucose levels) [20]. They also found that the components failed to check their inputs appropriately, allowing the researchers to inject forged packets reporting incorrect glucose levels to the patient and pump and more alarmingly, to issue unauthorized pump-control commands. Soon thereafter, two security researchers independently demonstrated full control of IPSes via circumventing authentication mechanisms: Radcliffe compromised the wireless channel of his own (unspecified) 13
3 Clinical Programmer Outside Patient Inside Patient Patch Outside Patient Inside Patient Biosensor Sensing Actuation Sealed ICD Figure 2: Block diagram of an implantable cardiac defibrillator (ICD), a closed-loop IMD. IPS [26, 29], and Jack performed a live demonstration in which he remotely controlled and then shut down a volunteer s insulin pump [28]. Jack also demonstrated that certain IPSes responded to anonymous radio scanning with their serial numbers, a privacy vulnerability because of the potential of tracking IPS patients. 2.2 Defibrillator: Closed-Loop System Like an artificial pacemaker, which continually issues small electrical pulses to heart muscle to maintain a healthy rhythm, an implantable cardiac defibrillator (ICD) is implanted under the skin near the clavicle. ICDs extend the capabilities of artificial pacemakers with the ability to issue large (tens of joules) shocks to reset an unsustainable heart rhythm (arrhythmia). Figure 2 shows a block diagram of an ICD. Unlike an insulin pump that accepts patient input via a user interface, a fully implanted device such as an ICD is a closed-loop system: under normal circumstances, its sensing function alone dictates its actuation activities. (Closed-loop IMDs typically also have special modes for in-clinic configuration and operation.) Halperin et al. enumerated the security and privacy challenges of closed-loop implanted systems in a 2008 article [14], focusing primarily on the tensions between security and utility. ICD implantation currently requires invasive surgery with a risk of complications (infection or death) [11], so ICDs are designed to last for at least five years once implanted resulting in long design and deployment cycles for manufacturers. ICDs draw power from single-use batteries, sealed inside the case, to provide uninterrupted monitoring throughout the device s lifetime and to avoid the heating of tissue that might occur during battery recharging. In conformity with these design choices, ICDs spend most of their time in low-power sensing states. They also include radios for clinical adjustments and at-home status reporting. A 2008 security analysis of a commercial ICD found vulnerabilities in multiple subsystems [15], including those listed above. Focusing on the ICD s radio link, researchers used open-source software-radio tools to record transmissions between the ICD and a clinical programming console. Offline analysis of these traces revealed patient information in clear text without evidence of encryption. They replayed recorded traces of clinical therapy commands and found that they could control or disable the ICD s therapies with their software radio. Concerning the battery, the study found that a sequence of transmissions from the software radio could keep the ICD s radio in a high-power active mode, indefinitely transmitting packets at a regular rate and dramatically increasing the ICD s power consumption. Figure 3: Block diagram of a subcutaneous biosensor. Small biosensors may be injected into the patient and then inductively powered by a patch that relays sensed data to a higher-level wearable device. 2.3 Biosensors for Data Acquisition Implantable biosensors (Figure 3) are IMDs that measure biological phenomena and send data to a more powerful device for storage or analysis. Biosensors are a broader device category than insulin pump systems or defibrillators, representing a wide range of both signals and signal processing techniques. They are subject to a third set of security and privacy challenges that does not completely overlap with those mentioned above. Biosensors range from high-data-rate imaging devices for the eye [3] or brain [25] to extremely low-data-rate sensors for glucose [12] or other metabolites in the blood [5]. Actuators that consume biosensor data can control potentially lethal drug-delivery systems [23] or electrical therapies [15]. Keeping biosensor data confidential is important because it can be used in illegal or unethical ways including insurance fraud or discrimination. The provenance (origin) and timestamp information that accompany biosensor readings are also critically important for medical care and must be protected from tampering. Subcutaneous biosensors present a special set of security and privacy requirements. A subcutaneous sensor [5] involves an implanted biosensor that acts as a lab on chip, conducting a small experiment at the molecular or electro-chemical level on the sensor. Current subcutaneous sensors can detect drugs, bio-markers, and antibodies and may eventually examine DNA, and simultaneously log temperature, ph, and other phenomena. Recent examples of subcutaneous biosensors include injectable subcutaneous devices that are remotely powered by a bandage-like patch that also provides a data link to a higher-level wearable device, possibly a body-area-network (BAN) or eventually a higherlevel health information system. A related class of devices are lowcost disposable biosensors for detecting infectious disease or critical levels of glucose and lactate in a battlefield or other trauma situation [13]; such devices penetrate the skin for communication and power. These two classes of devices support different threat models because of their different usage parameters. Biosensors that are fully implanted must communicate wirelessly to transmit through tissue. (Some receive power through tissue as well; recent work has shown that remotely powering biosensors is feasible at gigahertz frequencies that enable millimeter-sized antennas [22].) A key problem with fully implanted sensors is that small, infrequent wireless transmissions may pose a greater privacy risk than large or continuous transmissions. For example, a sensor may take several minutes to complete its task, then deliver only a few bytes of data giving this information a high value per bit that may make it an attractive target. Short data transmissions necessitate careful use of a cipher, especially if the plaintext sensor data may take only a few different values. The small amount of data also 14
4 has little inherent redundancy, making error-correction necessary. When a biosensor includes a patch that is meant to pair with the sensor, additional risks arise. Although eavesdropping on a properly operating tag may be unlikely because of the short (several millimeters for a subcutaneous sensor) nominal transmission range, impersonation of both the clinical reader and the patch are plausible concerns. For example, the patch of an unconscious patient can be removed and replaced by another patch. Similarly, a rogue sensor can upload fraudulent data to a trusted patch. All components involved should authenticate one another using well-studied cryptographic mechanisms, especially during the critically important period when a sensor is first being tested or calibrated. Biosensors present a diverse set of challenges for security and privacy and a unique combination of constraints. Open problems include: 1) developing more detailed threat models; 2) exploring design alternatives that effectively trade off safety, security, and utility; 3) understanding energy issues, including power depletion and side-channel attacks that exploit the lightweight nature of the biosensor; 4) implementing multiple layers of security to accommodate the multiple stages required to access data from a lightweight sensor (implant to patch to wearable to internet); and 5) understanding the security and privacy implications of future biosensing devices that provide an unprecedented view into the (presumably private) inner workings of the human body. Future devices are likely to include more storage, more complex signal processing, integrated software control, and use of multiple intercommunicating sensors, all of which will complicate security and privacy issues. 2.4 Common Threads Different classes of IMDs have distinct hardware and usage constraints, but there are important security considerations that apply to many IMDs. Researchers investigating the security and privacy of IMDs have also proposed several domain-specific mechanisms that apply broadly. This section discusses some of these common threads in the context of our example IMD systems. All of the IMD vulnerabilities disclosed thus far could be mitigated by the use of encryption on radio links. Hosseini-Khayat presents a lightweight wireless protocol for IMDs [17] that leverages well-studied wireless and cryptography technologies and emphasizes low-energy computation. The choice of encryption scheme should consider the nature of the data as well as the device constraints. Fan et al. contribute hardware implementations of the stream cipher Hummingbird [7, 8]. Beck explores the use of block ciphers in IMD security [3]. Unfortunately, encryption is not a panacea for IMD security and privacy vulnerabilities; many questions remain. If the radio link were to use encryption, how would the necessary secret key material be distributed, and by whom? How should an IMD authenticate external entities, and how should it determine whether a particular entity is allowed to communicate with it? Even assuming that each of these questions can be answered, successful implementation of encryption would not completely address known risks. Encryption alone fails to address replay attacks, and previous work has demonstrated that encryption may not sufficiently conceal characteristic traffic patterns [16]. Furthermore, since some IMDs must fail open to allow emergency access (e.g., to disable the IMD during emergency procedures), how can it also provide security in non-emergency situations? Should an IMD raise an alarm (perhaps tactile or audible) when a security-sensitive event occurs? These questions are largely open. Recent research toward addressing these design tensions has proposed new techniques and auxiliary devices to provide fail-open security for IMDs. Rasmussen et al. proposed the use of ultrasonic distance bounding to enforce programmer proximity [27]. Li et al. proposed body-coupled communications for the same purpose [20], hoping to prevent an adversary from launching a long-range radiobased attack. Both of these distance-bounding techniques require new hardware, but this constraint may not represent a major stumbling block for IPSes or biosensor systems, which are short-lived and non-invasive compared to ICDs. Researchers have also proposed defenses specifically targeted toward existing ICDs, but which may be useful for other IMDs. Denning et al. proposed that an IMD be paired with a cloaker that would provide authentication services whenever it was present, and allow open communication otherwise [6]. Xu et al. proposed the Guardian, a device that would pair with an IMD and use radio jamming to defend against eavesdropping and unauthorized commands [30]. Gollakota et al. independently proposed an auxiliary device called the shield that would use friendly radio jamming to proxy an ICD s communications to an authorized reader [10]. The shield is designed for compatibility with devices that are already implanted, reducing the burden on device designers to address the security vulnerabilities in devices that have not completed their deployment lifecycles. 3. SECURITY PITFALLS Designing for security has many subtleties. In the context of IMDs, where devices may be physically inaccessible for years, it is particularly important to avoid design errors that lead to failures or recalls later. One common error is believing in security through obscurity relying entirely on proprietary ciphers or protocols for secrecy. Security through obscurity relying entirely on the secrecy of proprietary ciphers or protocols is a common fallacy. Sound security principles dictate that a system s security must not depend on the secrecy of the algorithm or hardware; it is better to use wellstudied standard ciphers and spend more design effort protecting cryptographic keys. This principle, commonly known as Kerckhoff s principle, 2 is a fundamental guideline for security design. Following it is essential for resistance against reverse-engineering adversaries. A recent example that illustrates the hazards of security through obscurity is that of the NXP Mifare Classic smart-card chipset, which is widely used for transit ticketing systems. Nohl et al. reverseengineered the Mifare Classic hardware and analyzed the underlying cipher and protocol, discovering that it used a flawed implementation of a cipher called Crypto-1 [21]. Crypto-1 supports only a limited key size; the Mifare Classic hardware also implements a predictable random-number generator. These factors combine to allow an adversary to clone a tag in a matter of seconds. The Mifare Classic tag could have addressed these flaws by using established, publicly studied cryptographic primitives rather than ad-hoc proprietary systems. 4. OPEN PROBLEMS IN IMD DESIGN IMDs are first and foremost intended to improve patients quality of life. To this end, the primary focus for designers must be device safety and utility. We argue that security and privacy are also important properties that must be part of the design process, but there is the potential for direct conflict between these two sets of properties. The issue of emergency access highlights some of the tensions 2 First articulated in 1883 by Auguste Kerckhoff in La Cryptographie Militaire 15
5 that exist among these properties. Requiring users to authenticate to a device before altering its functionality is a boon for security, but it introduces risks in the case of an emergency. A medical professional may need to reprogram or disable a device to effectively treat a patient. As discussed in Section 2.4, encryption or other strong authentication mechanisms could make such emergency measures impossible if the patient is unconscious or the facility does not possess a programming device with a required shared secret. For some IMDs, including both IPSes and ICDs, designers must carefully weigh the energy costs of encryption against safety and utility. A heavyweight encryption scheme could potentially drain enough energy to require more frequent device replacement a surgical procedure for ICD patients and a persistent burden for IPS users. Costly encryption could even make the construction and deployment of some subcutaneous biosensors infeasible. It remains to be seen whether ASIC implementations of lightweight algorithms can effectively mitigate this issue because of the lack of public deployments to date [17, 3]. There are no clear-cut methods for resolving these tensions, and there is little publicly available information about whatever steps manufacturers have already taken. While cryptographers and security researchers have long embraced Kerckhoff s principle, device manufacturers employ proprietary systems and generally do not comment (for business reasons) on security measures that they may employ. These closed ecosystems hamper industry-wide progress on shared issues such as security and privacy. Research into wholesystem modeling and formal analysis of medical devices [19, 2, 1] offers hope that future IMDs will integrate sound security principles at design time, but the time horizon for industrial adoption may be long. Recent analyses of implantable medical devices have revealed a number of security and privacy failings, but researchers are developing novel solutions to the problems IMD designers face. By incorporating security and privacy design principles into the development process, IMD designers have the opportunity to address these issues before they become larger threats. 5. ACKNOWLEDGMENTS This material is based upon work supported by: the Armstrong Fund for Science; the National Science Foundation under Grants No , and ; Cooperative Agreement No. 90TR0003/01 from the Department of Health and Human Services; two NSF Graduate Research Fellowships; and a Sloan Research Fellowship. Its contents are solely the responsibility of the authors and do not necessarily represent the official views of DHHS or NSF. 6. REFERENCES [1] D. Arney, R. Jetley, P. Jones, I. Lee, and O. Sokolsky. Formal methods based development of a PCA infusion pump reference model: Generic infusion pump (GIP) project. In Proceedings of the 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, HCMDSS-MDPNP 07, pages IEEE Computer Society, [2] D. Arney, M. Pajic, J. M. Goldman, I. Lee, R. Mangharam, and O. Sokolsky. Toward patient safety in closed-loop medical device systems. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 10, pages ACM, [3] C. Beck, D. Masny, W. Geiselmann, and G. Bretthauer. Block cipher based security for severely resource-constrained implantable medical devices. In Proceedings of 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL 11, pages 62:1 62:5. ACM, October [4] M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, [5] G. De Micheli, S. Ghoreishizadeh, C. Boero, F. Valgimigli, and S. Carrara. An integrated platform for advanced diagnostics. In Design, Automation & Test in Europe Conference & Exhibition, DATE 11. IEEE, March [6] T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec), July [7] X. Fan, G. Gong, K. Lauffenburger, and T. Hicks. FPGA implementations of the Hummingbird cryptographic algorithm. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 10, pages 48 51, June [8] X. Fan, H. Hu, G. Gong, E. Smith, and D. Engels. Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. In International Conference for Internet Technology and Secured Transactions, ICITST 09, pages 1 7, November [9] K. Fu. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report, Washington, DC, July IOM (Institute of Medicine), National Academies Press. [10] S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implanted medical devices. In Proceedings of ACM SIGCOMM, August [11] P. Gould and A. Krahn. Complications associated with implantable cardioverter defibrillator replacement in response to device advisories. Journal of the American Medical Association (JAMA), 295(16): , April [12] S. Guan, J. Gu, Z. Shen, J. Wang, Y. Huang, and A. Mason. A wireless powered implantable bio-sensor tag system-on-chip for continuous glucose monitoring. In Proceedings of the IEEE Biomedical Circuits and Systems Conference, BioCAS 11, November [13] A. Guiseppi-Elie. An implantable biochip to influence patient outcomes following trauma-induced hemorrhage. Analytical and Bioanalytical Chemistry, 399(1): , January [14] D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel. Security and privacy for implantable medical devices. IEEE Pervasive Computing, Special Issue on Implantable Electronics, 7(1):30 39, January [15] D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 29th IEEE Symposium on Security and Privacy, May [16] A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Proceedings of the Privacy Enhancing Technologies workshop, PET 02. Springer-Verlag, LNCS 2482, April [17] S. Hosseini-Khayat. A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices. In Proceedings of the 5th 16
6 International Symposium on Medical Information Communication Technology, ISMICT 11, pages 6 9, March [18] R. P. Jetley, P. L. Jones, and P. Anderson. Static analysis of medical device software using CodeSonar. In Proceedings of the 2008 Workshop on Static Analysis, SAW 08, pages ACM, [19] I. Lee, G. J. Pappas, R. Cleaveland, J. Hatcliff, and B. H. Krogh. High-confidence medical device software and systems. IEEE Computer, 39(4):33 38, [20] C. Li, A. Raghunathan, and N. K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedings of the 13th IEEE International Conference on e-health Networking, Applications, and Services, Healthcom 11, June [21] K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic RFID tag. In Proceedings of the 17th USENIX Security Symposium, pages , July [22] S. O Driscoll, A. Poon, and T. Meng. A mm-sized implantable power receiver with adaptive link compensation. In Proceedings of the International Solid-State Circuits Conference, ISSCC 09, pages ,295a. IEEE, February [23] N. Paul, T. Kohno, and D. C. Klonoff. A review of the security of insulin pump infusion systems. Journal of Diabetes Science and Technology, 5(6): , November [24] K. Poulsen. Hackers assault epilepsy patients via computer. Wired.com, /03/epilepsy, March [25] J. Rabaey, M. Mark, D. Chen, C. Sutardja, C. Tang, S. Gowda, M. Wagner, and D. Werthimer. Powering and communicating with mm-size implants. In Design, Automation & Test in Europe Conference & Exhibition, DATE 11. IEEE, [26] J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA system. Black Hat Conference presentation slides, August [27] K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Čapkun. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pages , [28] P. Roberts. Blind attack on wireless insulin pumps could deliver lethal dose. Threatpost (blog post), October [29] D. Takahashi. Excuse me while I turn off your insulin pump. VentureBeat, August [30] F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proceedings of the 30th IEEE International Conference on Computer Communications, INFOCOM 11, pages , April
Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
Recent Results in Computer Security for Medical Devices
Recent Results in Computer Security for Medical Devices Shane S. Clark and Kevin Fu Department of Computer Science University of Massachusetts Amherst {ssclark,kevinfu}@cs.umass.edu Abstract. The computer
Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Project part 1 submission Assignment 2 is online Last lecture: Recap Medical Telemetry Infrastructure Devices capturing
Body Area Network Security: Robust Secret Sharing
Body Area Network Security: Robust Secret Sharing Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois Body Area Network Background Body area network (BAN) consists
Energy Efficient Security in Implantable Medical Devices
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 773 778 ISBN 978-83-60810-51-4 Energy Efficient Security in Implantable Medical Devices Krzysztof Daniluk Warsaw
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters August 2012 MEDICAL DEVICES FDA Should Expand Its Consideration of Information Security for Certain Types of Devices
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Testing Overview [Document subtitle]
10/16/2015 ZigBee Penetration Testing Overview [Document subtitle] PURE INTEGRATION Introduction Penetration testers have been focusing on wireless technologies for over a decade now, and industry researchers
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Securing the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey
Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey Carmen Camara a,b, Pedro Peris-Lopez a,, Juan E. Tapiador a a Department of Computer Science, Universidad Carlos III de
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
W ith an estimated 14 billion devices connected to
Renesas Synergy Security Portfolio Delivers Comprehensive Protection from Industrial and IoT Threats Advanced capabilities give developers tools to counter attacks W ith an estimated 14 billion devices
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Thomas S. Heydt-Benjamin
Thomas S. Heydt-Benjamin Contact Information 530 E86th St #3C NYC, NY 10028, USA +1 (917) 744-7934 [email protected] http://cryptocracy.net Research Interests Privacy, security, and identity management. Anonymity
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
Unpatchable: Living with a vulnerable implanted device
Safer Sooner Together Unpatchable: Living with a vulnerable implanted device Marie Moe, PhD, Research ScienAst at SINTEF @MarieGMoe @iamthecavalry #safersoonertogether SINTEF ICT Safer Sooner Together
The U.S. FDA s Regulation and Oversight of Mobile Medical Applications
The U.S. FDA s Regulation and Oversight of Mobile Medical Applications The U.S. FDA s Regulation and Oversight of Mobile Medical Applications As smart phones and portable tablet computers become the preferred
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin University of Massachusetts Amherst Benjamin
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Medical Devices. Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire
Medical Devices Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire Introduction This perspective paper aims to help organizations understand the emerging issue of security
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security Tamara Denning Kevin Fu Tadayoshi Kohno Abstract A fundamental tension exists between safety in the common case
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
All You Can Eat. Breaking a Real-World Contactless Payment System
All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {Timo.Kasper,
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
