Security and Privacy of Wireless Implantable Medical Devices



Similar documents
Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

Body Area Network Security: Robust Secret Sharing

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract

Recent Results in Computer Security for Medical Devices

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Energy Efficient Security in Implantable Medical Devices

MEDICAL DEVICE Cybersecurity.

How To Hack An Rdi Credit Card

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Unpatchable: Living with a vulnerable implanted device

White Paper on Medical Device Security. October 2013

Thomas S. Heydt-Benjamin

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey

Automated Security System using ZigBee

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Medical Devices: Security & Privacy Concerns. NIST Information Security and Privacy Advisory Board (ISPAB) Meeting July 14, 2011

Thomas S. Benjamin. 32 West Street Apt. 3N Cold Spring, NY IBM Research Zurich Research Laboratory Pre-Doctoral Research

GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters

What is Quantified Self (QS)?

Activating Standardization Bodies Around Medical Apps

Security and Privacy for Implantable Medical Devices

Problems of Security in Ad Hoc Sensor Network

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

FOR ACCESS CONTROL TECHNOLOGIES Docket No

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Proximity-based Access Control for Implantable Medical Devices

2.0 System Description

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

RFID Security: Threats, solutions and open challenges

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Veterans Health Administration: Health IT Leaders

Design Challenges for Secure Implantable Medical Devices

ISO Information Security Management Systems Professional

Aperio Online System Description

Wireless Medical Telemetry Laboratory

Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device

Signal Customized Helpdesk Course

Alternative Biometric as Method of Information Security of Healthcare Systems

The Heartbeat behind Portable Medical Devices: Ultra-Low-Power Mixed-Signal Microcontrollers

Securing your Linksys Wireless Router BEFW11S4 Abstract

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security

Fig. 1 BAN Architecture III. ATMEL BOARD

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Regulation of Mobile Medical Apps

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Threat Model for Software Reconfigurable Communications Systems

VitalJacket SDK v Technical Specifications

KIZ 2,33-3 p8 ~ 510(k) Summary. As required by 21 CFR (c) 510(k) Premarket Notification Submission AFrame Digital MobileCare Monitor.

WELCOME. Landis+Gyr Technical Training Catalog

Closing Wireless Loopholes for PCI Compliance and Security

Logging of RF Power Measurements

Regulations and Standards for Wireless Medical Applications

Vehicular On-board Security: EVITA Project

GSM Risks and Countermeasures

Annual review FLORENCE WP4 Network: prototypes

2014 NRTRC TELEMEDICINE CONFERENCE

Nokia E61i Configuring connection settings

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Introduction to Computer Security

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

VitalJacket SDK v Technical Specifications

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

On Quantitative Software Quality Assurance Methodologies for Cardiac Pacemakers

Smart LNB. White Paper. May 2014

Information Technology Branch Access Control Technical Standard

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Remote Patient Monitoring Within a Future 5G Infrastructure

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

The U.S. FDA s Regulation and Oversight of Mobile Medical Applications

Recommended Wireless Local Area Network Architecture

50 ways to break RFID privacy

Chap. 1: Introduction

GSM and UMTS security

Sensors and actuators are ubiquitous. They are used

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

2010 CPT Codes for Cardiac Device Monitoring

RTKL HEALTHCARE TECHNOLOGIES

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Automated Meter Reading Frequently Asked Questions. What is AMR?

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

International Journal of Engineering Research & Management Technology

Wireless Multimedia Technologies for Assisted Living

Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry

Transcription:

Security and Privacy of Wireless Implantable Medical Devices Security Forum 2013 Hagenberg, 17.04.2013 Dipl.-Ing. Dr. Gregor Koenig

Outlook Overview Device Hacking Safety & Utility Goals Security & Privacy Goals Tensions of Goals Countermeasure / Approaches in Research 2

Implantable Medical Devices Deep Brain Stimulators Ocular Implants Cochlear Implants Pacemakers Implantable Cardiac Defibrillators Implanted Sensors, e.g. Glucose Implanted Drug Pumps, e.g. Insulin Gastric Stimulators Smart Pills Prosthetic Limbs Graphic from http://lamm.mine.nu/human-body 3

Why Wireless IMDs? Ease of communication with implanted device During Implantation, Device Setup and Testing Therapy adjustments Software Updates Remote monitoring (over internet) Reduction of hospital visits by 40% and cost per visit by $1800 1 Implant Local Comm. Hub Internet Medical Facility [1] Journal of the American College of Cardiology, 2011 4

Default Usage of Programmers Used during implantation / operation Interrogated and program device wirelessly Continuous communication during procedure Control device s test-mode, e.g. defibrillation 5

ICD Hacking First real attack on Implantable Cardiac Defibrillator University of Washington and University of Massachusetts Amherst ICD Device, on US market since 2003 Replay Attacks Disclosure of Sensitive Data and Bio-Signals Drain Energy Reconfiguration of Device Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 6

ICD Hacking: Equipment Original External Programmer & Device GNU Radio Open Source SW Radio Low-Cost Radio Hardware and Antenna (< 1000$) Standard Oscilloscope Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 7

Reverse Engineering Physical Layer RF transmission around 175 khz Modulation 2-FSK, DBPSK Decoding using known plaintexts Non-Return-to-Zero Inverted with Bit Stuffing Device Communication Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 8

Eavesdropping Sensitive Information Sniff Vital Signals ICDs emit re-constructible vital signals V ms Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 9

Active Attacks Replay Attacks Retransmission of recorded traces Request ICD and patient data Drain Energy Constantly wake up the ICD Change Device Configuration Change ICD settings, e.g. date Change Patient/Therapy Configuration Induce electric shock using fibrillation-test mode Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 10

Safety and Utility Goals of IMDs Data Access Patient name, Diagnosis, Therapy, Physiological Values, Events, Allergies, Medication, Emergency Situations Data Accuracy Measured Values, Events, and Timestamps have to be correct Device Identification Presence and Type of Device should be advertised Imagery (MRI) Surgery D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 11

Safety and Utility Goals of IMDs 2 Configurability Choose and Change Settings, e.g. Therapy Patient Access, e.g. Open-Loop Insulin Pumps Updatable Software Avoids need to explant device, which may lead to infections etc. Multi-Device Coordination Closed-Loop Insulin Pumps, CROS hearing aids Resource-efficient Auditable D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 12

Security and Privacy Goals Authorization Personalized Authorization Role-Based Authorization Prevent accidental or intentional misuse Device Existence Privacy Device Type Privacy D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 13

Security and Privacy Goals 2 Specific-Device ID Privacy Traceability and Location Privacy Bearer Privacy Measurement and Log Privacy Data Integrity Medical or Technical Logs D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 14

Safety Goals vs. Security Goals Accessibility vs. Security Cryptographic security vs. Open access requirement in emergency situations Device Resources vs. Security Energy consumption of additional computations Usability vs. Security Long-distance communication offers advantages, e.g. home-monitoring Increased risk from a security perspective D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 15

Classical Approaches Classical Cryptographic Approaches Passwords or passphrases cannot be used without limitations Additional Body Implant, e.g. RFID Denning et al.; Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices; CHI 2010 16

Additional Approaches Activation of Programmer by Authority Programmer with internet access requests authorization e.g. of Manufacturer, primary care site Approved doctor s ID card Automatically expiring certificates Accountability Deter attacker Log of accessing entities in a reliable way Device s Credentials, Healthcare Professionals Credentials D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 17

Secondary Information Channels Patient awareness Inform Patient about Access, e.g. Buzzer or Alarm Sound Authorization Additional Activation via Near Field Communication Location awareness Change of environment e.g. using Accelerometers Halperin, Heydt-Benjamin, Ransford et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008 D. Halperin et al.; Security and Privacy for Implantable Medical Devices; IEEE Pervasive Computing Vol. 7/1, 2008 18

Experimental Approaches for BANs Body Area Network E.g. Glucometer and Insulin Pump communicating through body Biosignals as shared secret for secure communication in BANs Heart Rate Variability R-R Interval of QRS complex Plethysmography Topography of body Noise in human body K. Venkatasubramanian; Physiological Value-Based Efficient Usable Security Solutions for Body Sensor Networks; ACM Trans. Sensor Netw. 6, 4, Article 31 (July 2010) 19

Discussion Real Risk? Classification of incident-class does not exist Risk Analysis vs. Privacy and Security Introduction of new risks Criminal Implications IMD during Autopsy? D. Kramer et al.; Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance; PLoS ONE 7(7): e40200, 2012 M. Goodman; Who Does the Autopsy? Criminal Implications of Implantable Medical Devices, Future Crimes Institute, futurecrimes.com 20

Links and Literature Ann Arbor Research Center for MD Security http://secure-medicine.org http://secure-medicine.org/publications Professor Kevin FU, University of Michigan http://web.eecs.umich.edu/~kevinfu USENIX Workshop on Health Information Technologies, 12.08.2013, https://www.usenix.org/conference/healthtech13 21

Thank you! Dipl.-Ing. Dr. Gregor König gkoenig@barracuda.com Barracuda Networks AG Lassallestraße 7a 1020 Wien