SlideShare a Scribd company logo
Pacemakers and Implantable
Cardiac Defibrillators:
Software Radio Attacks and
Zero-Power Defenses
CSE 727 - Spring 2014
Seminar in Wireless Network Security
Principles and Practices
Professor Shambhu Upadhyaya
Meenakshi Muthuraman & Bich Vu
● D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S.
Clark, B. Defend, W. Morgan, K. Fu, T. Kohmo, and W.
H. Maisel. “Pacemakers and Implantable Cardiac
Defibrillators: Software Radio Attacks and Zero-Power
Defenses” in IEEE Symposium on Security and
Privacy, Oakland, CA, 2008, pp. 129-142.
Agenda
● Introduction to implantable medical devices
● Security attacks
● Security mechanisms
Implantable Medical Devices (IMD)
Pacemakers
● Medical device used to restore heartbeat to
normal (uses electrodes)
● About the size of a small coin
● Placed under the skin - near the heart
● Between 1992 and 2006 2.6 Million pacemakers
and ICDs were implanted in patients in the US
Implantable Medical Devices (IMD)
Neurostimulators
● Delivers electric signals to the epidural space
near the spine
● About the size of a stop watch
● Reduces chronic pain
● Sends electronic signals to the brain faster
than the pain signal
● Introduced in 2003
● Uses electric pulses or shocks to restore
heart beat
● Especially used during a cardiac arrest
● Typically include wires that pass through
a vein to the right chamber of the heart
● Communicates with external
programmer at 175 kHz frequency
Implantable Cardioverter Defibrillator (ICD)
Implantable Medical Devices (IMD)
ICD
Post Surgery medical
practitioner can use external
programmer for :
● Perform diagnostics
● Read/Write private data
● Adjust therapy settings
Magnetic Switch
● Located within the ICD
● Used to send telemetry data and electrocardiogram
readings
Wireless Communications
● 175 kHz for short range communications
● 402 - 405 MHz (Medical Implant Communications
Band) for long range communications
Motivation
● ICD discloses sensitive information in clear
● Reprogramming attacks (attacks that change the
operation of the device) have been conducted
● Denial of service attacks have been performed
● Attacks can be performed within the range of a few
centimeters using a specially configured radio device
Proposed Defence
● 3 different deterrence and prevention mechanisms
● Zero-power Defenses - draw no power from the
primary battery
● Zero-power Notification
● Zero-power Authentication
● Sensible Security
Wireless Identification and Sensing Platform
(WISP)
● WISP is a family of sensors that are powered and read
by UHF RFID readers
● They do not require batteries
● They harvest their power from RF signal generated by
the reader
● It is open source
Security Model
Possible types of attacks :
1. An adversary with an commercial ICD programmer
2. Passive Attacks
3. Active Attacks
Tools used to reverse-engineer attacks
● Commercial ICD programmer
● Software radio (Universal Software Radio Peripheral -
USRP)
● Oscilloscope
● Device Used for study
➢ Medtronic Maximo DR VVE-DDDR model #7278
ICD
● Threats
➢ Vital information life patient details and vital signals
of the patient are transmitted in clear
Reverse Engineering Transmissions
● ICD and the programmer use the same encoding
scheme but different modulation schemes
● Programmer uses binary frequency shift keying (2-FSK)
for modulation
● ICD uses differential binary phase shift keying (DBPSK)
for modulation
● Encoded using Non-Return-to-Zero Inverted (NRZI)
with bit stuffing
Conversation between ICD and programmer
Attacks Performed
Replay attacks
● ICD Identification
● Disclosing patient data
● Disclosing cardiac data (32 packets/second)
● Changing the patient's name (10 attempts)
● Setting ICD’s clock (10 attempts)
● Changing therapies (24 attempts)
● Denial of service (esp. with respect to power
consumption)
● Inducing Fibrillation (electro psychological test)
Test mode
● Safety mechanisms are enforced in the ICD
programmers software so that the physician can not
accidently active test mode
● But can be induced using USRP systems
● Solution Proposed : “we argue that if any
IMD exhibits a test procedure T for some property P, and
if there are no medical reasons for conducting
procedure T other than testing property P , then it
should be impossible to trigger T unless P is enabled.”
Zero Power Notification
● Cryptographic keys - hinders emergency response
● Must not consume a lot of energy
● Harvests power from RF energy
● Uses Piezo-elements to alert user
● Uses Wireless Identification and Sensing Platform
(WISP) that contains a RFID circuitry and a
microcontroller with 256 Bytes RAM and 8KB memory
Evaluation
● Standard - Sound Pressure Level
● Buzzing peaks at 67 dB SPL at
1m
● Simulation : Device implanted
beneath 1cm of Bacon and 4 cm
of 85% lean ground beef
● Measured 84 dB SPL at a
distance of 1m
Evaluation
Zero Power Authentication
● Harvests RF energy to power
a cryptographic protocol that
authenticates requests from
external device programmer
● Challenge response protocol
based on RC5-32/12/16
● Master Key - Km
● IMD identity I
● IMD specific key K = (Km
,I)
Zero Power Sensible Key Exchange
● Complements above 2 defence techniques
● Primary goal is to allow the user to know that a key exchange
is happening
● Programmer initiates the protocol by supplying unmodulated
RF signal
● IMD generates a random no to be used as session key and
modulates it as sound wave
● The sound wave can only be read and demodulated by a
reader with a microphone situated close to the patients body
● Can latter be used for long range communication
Future Work
● Access for previously unauthorized users during
emergency situations
● Next generation IMDs with more networking abilities
should not rely solely on external mechanisms for security.
● Device manufacturers must not view external devices like
external programmers as trusted computing base for
IMDs
● Ensure that all devices used do not harm the human body
References
● D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B.
Defend, W. Morgan, K. Fu, T. Kohmo, and W. H. Maisel.
“Pacemakers and Implantable Cardiac Defibrillators: Software
Radio Attacks and Zero-Power Defenses” in IEEE Symposium on
Security and Privacy, Oakland, CA, 2008, pp. 129-142.
● D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H.
Maisel. “Security and privacy for implantable medical devices. IEEE
Pervasive Computing, Special Issue on Implantable Electronics,
January 2008.”
● WISP - http://sensor.cs.washington.edu/WISP.html
Cse727

More Related Content

What's hot

Remote Controlled Home Appliance
Remote Controlled Home Appliance Remote Controlled Home Appliance
Remote Controlled Home Appliance
Samir Ahmed Shimul
 
Remote controlling of home appliance by moniruzzaman iiuc
Remote controlling of home appliance by moniruzzaman iiuc Remote controlling of home appliance by moniruzzaman iiuc
Remote controlling of home appliance by moniruzzaman iiuc
Md Moneruzzman
 
-1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid
 -1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid -1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid
-1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaidsairamreddy siddu
 
Remote Control Circuit.
Remote Control Circuit.Remote Control Circuit.
Remote Control Circuit.
Maruf Priyo
 
Infrared Remote Controlled Devices
Infrared Remote Controlled DevicesInfrared Remote Controlled Devices
Infrared Remote Controlled Devices
Narayan Jaiswal
 
Ir switch & remote control
Ir switch & remote controlIr switch & remote control
Ir switch & remote control
Vikas Pawar
 
Remote control for home appliances
Remote control for home appliancesRemote control for home appliances
Remote control for home appliancesBharath University
 
Gesture based appliance control
Gesture based appliance controlGesture based appliance control
Gesture based appliance control
joshimanu
 
Controlling a home appliance using IR remote
Controlling a home appliance using IR remoteControlling a home appliance using IR remote
Controlling a home appliance using IR remote
Chittaranjan Baliarsingh
 
CONTROLLING HOME APPLIANCES USING REMOTE(1)
CONTROLLING HOME APPLIANCES USING REMOTE(1)CONTROLLING HOME APPLIANCES USING REMOTE(1)
CONTROLLING HOME APPLIANCES USING REMOTE(1)Ambar Gupta
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
Zac Darcy
 
Infrared control
Infrared controlInfrared control
Infrared controlNitesh Jha
 
MICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONMICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONJahir Hussain
 
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch ScreenA Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
IJTET Journal
 
Dry contact sensor with temperature sensor start guide
Dry contact sensor with temperature sensor start guideDry contact sensor with temperature sensor start guide
Dry contact sensor with temperature sensor start guideDomotica daVinci
 
Touch Screen Based Home Automation System
Touch Screen Based Home Automation SystemTouch Screen Based Home Automation System
Touch Screen Based Home Automation System
Edgefxkits & Solutions
 
Mems based hand gesture controlled robot
Mems based hand gesture controlled robotMems based hand gesture controlled robot
Mems based hand gesture controlled robot
Sriteja Rst
 
Touchscreenbasedhomeautomationsystem dca
Touchscreenbasedhomeautomationsystem dcaTouchscreenbasedhomeautomationsystem dca
Touchscreenbasedhomeautomationsystem dca
vision2d16
 
Tidc2007 cardionet
Tidc2007 cardionetTidc2007 cardionet
Tidc2007 cardionetArpan Pal
 
Gesture Control Robot
Gesture Control RobotGesture Control Robot
Gesture Control Robot
nikhilsaini25
 

What's hot (20)

Remote Controlled Home Appliance
Remote Controlled Home Appliance Remote Controlled Home Appliance
Remote Controlled Home Appliance
 
Remote controlling of home appliance by moniruzzaman iiuc
Remote controlling of home appliance by moniruzzaman iiuc Remote controlling of home appliance by moniruzzaman iiuc
Remote controlling of home appliance by moniruzzaman iiuc
 
-1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid
 -1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid -1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid
-1348064572-13. electronics - ijeceierd - design and - sapna katiyar - unpaid
 
Remote Control Circuit.
Remote Control Circuit.Remote Control Circuit.
Remote Control Circuit.
 
Infrared Remote Controlled Devices
Infrared Remote Controlled DevicesInfrared Remote Controlled Devices
Infrared Remote Controlled Devices
 
Ir switch & remote control
Ir switch & remote controlIr switch & remote control
Ir switch & remote control
 
Remote control for home appliances
Remote control for home appliancesRemote control for home appliances
Remote control for home appliances
 
Gesture based appliance control
Gesture based appliance controlGesture based appliance control
Gesture based appliance control
 
Controlling a home appliance using IR remote
Controlling a home appliance using IR remoteControlling a home appliance using IR remote
Controlling a home appliance using IR remote
 
CONTROLLING HOME APPLIANCES USING REMOTE(1)
CONTROLLING HOME APPLIANCES USING REMOTE(1)CONTROLLING HOME APPLIANCES USING REMOTE(1)
CONTROLLING HOME APPLIANCES USING REMOTE(1)
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
Infrared control
Infrared controlInfrared control
Infrared control
 
MICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATIONMICROCONTROLLER BASED IR FOR HOME APPLICATION
MICROCONTROLLER BASED IR FOR HOME APPLICATION
 
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch ScreenA Smart Handheld Measuring and Testing Electronic Device with Touch Screen
A Smart Handheld Measuring and Testing Electronic Device with Touch Screen
 
Dry contact sensor with temperature sensor start guide
Dry contact sensor with temperature sensor start guideDry contact sensor with temperature sensor start guide
Dry contact sensor with temperature sensor start guide
 
Touch Screen Based Home Automation System
Touch Screen Based Home Automation SystemTouch Screen Based Home Automation System
Touch Screen Based Home Automation System
 
Mems based hand gesture controlled robot
Mems based hand gesture controlled robotMems based hand gesture controlled robot
Mems based hand gesture controlled robot
 
Touchscreenbasedhomeautomationsystem dca
Touchscreenbasedhomeautomationsystem dcaTouchscreenbasedhomeautomationsystem dca
Touchscreenbasedhomeautomationsystem dca
 
Tidc2007 cardionet
Tidc2007 cardionetTidc2007 cardionet
Tidc2007 cardionet
 
Gesture Control Robot
Gesture Control RobotGesture Control Robot
Gesture Control Robot
 

Viewers also liked

Implementation of dijsktra’s algorithm in parallel
Implementation of dijsktra’s algorithm in parallelImplementation of dijsktra’s algorithm in parallel
Implementation of dijsktra’s algorithm in parallel
Meenakshi Muthuraman
 
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
Nick Watkins
 
Re/Mastering Theses at The Ohio State University
Re/Mastering Theses at The Ohio State University Re/Mastering Theses at The Ohio State University
Re/Mastering Theses at The Ohio State University
Emily Frieda Shaw
 
Playground Safety; CD M23
Playground Safety; CD M23 Playground Safety; CD M23
Playground Safety; CD M23
nloehner
 
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
Nick Watkins
 
2チケット&計測」書籍で訴えたい
2チケット&計測」書籍で訴えたい2チケット&計測」書籍で訴えたい
2チケット&計測」書籍で訴えたいYoshiki Mitani
 
20140407內湖花市
20140407內湖花市20140407內湖花市
20140407內湖花市
志銘 江
 
Inisiasi polipeptida pada translasi
Inisiasi polipeptida pada translasiInisiasi polipeptida pada translasi
Inisiasi polipeptida pada translasi
Rismi Seftiani Jaitun
 
Jenis jenis teks ( 5 teks)
Jenis jenis teks ( 5 teks)Jenis jenis teks ( 5 teks)
Jenis jenis teks ( 5 teks)Eva Dian Wahyu S
 
What goes where? Bringing a new repository online at the Ohio State Universit...
What goes where? Bringing a new repository online at the Ohio State Universit...What goes where? Bringing a new repository online at the Ohio State Universit...
What goes where? Bringing a new repository online at the Ohio State Universit...
Emily Frieda Shaw
 
Industrial Microbiology of Molds
 Industrial Microbiology of Molds Industrial Microbiology of Molds
Industrial Microbiology of Molds
Duithy George
 

Viewers also liked (14)

Implementation of dijsktra’s algorithm in parallel
Implementation of dijsktra’s algorithm in parallelImplementation of dijsktra’s algorithm in parallel
Implementation of dijsktra’s algorithm in parallel
 
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
Cyprus 2011 complexity extreme bursts and volatility bunching in solar terres...
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
Re/Mastering Theses at The Ohio State University
Re/Mastering Theses at The Ohio State University Re/Mastering Theses at The Ohio State University
Re/Mastering Theses at The Ohio State University
 
Playground Safety; CD M23
Playground Safety; CD M23 Playground Safety; CD M23
Playground Safety; CD M23
 
Grafico02020202
Grafico02020202Grafico02020202
Grafico02020202
 
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
Venice 2012 Two topics in the history of complexity: Bunched Black Swans and ...
 
2チケット&計測」書籍で訴えたい
2チケット&計測」書籍で訴えたい2チケット&計測」書籍で訴えたい
2チケット&計測」書籍で訴えたい
 
20140407內湖花市
20140407內湖花市20140407內湖花市
20140407內湖花市
 
Inisiasi polipeptida pada translasi
Inisiasi polipeptida pada translasiInisiasi polipeptida pada translasi
Inisiasi polipeptida pada translasi
 
Jenis jenis teks ( 5 teks)
Jenis jenis teks ( 5 teks)Jenis jenis teks ( 5 teks)
Jenis jenis teks ( 5 teks)
 
What goes where? Bringing a new repository online at the Ohio State Universit...
What goes where? Bringing a new repository online at the Ohio State Universit...What goes where? Bringing a new repository online at the Ohio State Universit...
What goes where? Bringing a new repository online at the Ohio State Universit...
 
CSE633
CSE633CSE633
CSE633
 
Industrial Microbiology of Molds
 Industrial Microbiology of Molds Industrial Microbiology of Molds
Industrial Microbiology of Molds
 

Similar to Cse727

Securing Wireless IMD
Securing Wireless IMDSecuring Wireless IMD
Securing Wireless IMD
University of California Riverside
 
Home Automation/Smart Home/Power Reduction Mechanism
Home Automation/Smart Home/Power Reduction MechanismHome Automation/Smart Home/Power Reduction Mechanism
Home Automation/Smart Home/Power Reduction Mechanism
YOGEESH M
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422IJRAT
 
Cj35483486
Cj35483486Cj35483486
Cj35483486
IJERA Editor
 
Intra body communication in biomedical 1
Intra body communication in biomedical 1Intra body communication in biomedical 1
Intra body communication in biomedical 1
suvedhajeyaraman
 
J04701080085
J04701080085J04701080085
J04701080085
ijceronline
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
IJERA Editor
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
IJERA Editor
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
Karthikeyan Ece venkatesan
 
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
Praveen Reddy
 
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
KIYALIBAN1
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor Counter
Rituraj Singh
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor Counter
Rituraj Singh
 
heart rate monitoring using mobile technology
heart rate monitoring using mobile technologyheart rate monitoring using mobile technology
heart rate monitoring using mobile technology
Pawan Kumar Ganjhu
 
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECGIOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
PonselvanV
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
PREMKUMAR
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
Rajeev N
 
Live Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue OperationLive Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue Operation
ijcnes
 

Similar to Cse727 (20)

Securing Wireless IMD
Securing Wireless IMDSecuring Wireless IMD
Securing Wireless IMD
 
Home Automation/Smart Home/Power Reduction Mechanism
Home Automation/Smart Home/Power Reduction MechanismHome Automation/Smart Home/Power Reduction Mechanism
Home Automation/Smart Home/Power Reduction Mechanism
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422
 
Cj35483486
Cj35483486Cj35483486
Cj35483486
 
Intra body communication in biomedical 1
Intra body communication in biomedical 1Intra body communication in biomedical 1
Intra body communication in biomedical 1
 
J04701080085
J04701080085J04701080085
J04701080085
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Presentation22
Presentation22Presentation22
Presentation22
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
Remote-Monitoring and Energy-Saving Room Architecture with Security System ba...
 
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
254997587-Gsm-Based-Patient-Health-Monitoring-System (1).pptx
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor Counter
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor Counter
 
heart rate monitoring using mobile technology
heart rate monitoring using mobile technologyheart rate monitoring using mobile technology
heart rate monitoring using mobile technology
 
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECGIOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
 
final
finalfinal
final
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Live Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue OperationLive Human Detecting Robot for Earthquake Rescue Operation
Live Human Detecting Robot for Earthquake Rescue Operation
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Cse727

  • 1. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses CSE 727 - Spring 2014 Seminar in Wireless Network Security Principles and Practices Professor Shambhu Upadhyaya Meenakshi Muthuraman & Bich Vu
  • 2. ● D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohmo, and W. H. Maisel. “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses” in IEEE Symposium on Security and Privacy, Oakland, CA, 2008, pp. 129-142.
  • 3. Agenda ● Introduction to implantable medical devices ● Security attacks ● Security mechanisms
  • 4. Implantable Medical Devices (IMD) Pacemakers ● Medical device used to restore heartbeat to normal (uses electrodes) ● About the size of a small coin ● Placed under the skin - near the heart ● Between 1992 and 2006 2.6 Million pacemakers and ICDs were implanted in patients in the US
  • 5. Implantable Medical Devices (IMD) Neurostimulators ● Delivers electric signals to the epidural space near the spine ● About the size of a stop watch ● Reduces chronic pain ● Sends electronic signals to the brain faster than the pain signal
  • 6. ● Introduced in 2003 ● Uses electric pulses or shocks to restore heart beat ● Especially used during a cardiac arrest ● Typically include wires that pass through a vein to the right chamber of the heart ● Communicates with external programmer at 175 kHz frequency Implantable Cardioverter Defibrillator (ICD) Implantable Medical Devices (IMD)
  • 7. ICD Post Surgery medical practitioner can use external programmer for : ● Perform diagnostics ● Read/Write private data ● Adjust therapy settings
  • 8. Magnetic Switch ● Located within the ICD ● Used to send telemetry data and electrocardiogram readings Wireless Communications ● 175 kHz for short range communications ● 402 - 405 MHz (Medical Implant Communications Band) for long range communications
  • 9. Motivation ● ICD discloses sensitive information in clear ● Reprogramming attacks (attacks that change the operation of the device) have been conducted ● Denial of service attacks have been performed ● Attacks can be performed within the range of a few centimeters using a specially configured radio device
  • 10.
  • 11. Proposed Defence ● 3 different deterrence and prevention mechanisms ● Zero-power Defenses - draw no power from the primary battery ● Zero-power Notification ● Zero-power Authentication ● Sensible Security
  • 12. Wireless Identification and Sensing Platform (WISP) ● WISP is a family of sensors that are powered and read by UHF RFID readers ● They do not require batteries ● They harvest their power from RF signal generated by the reader ● It is open source
  • 13. Security Model Possible types of attacks : 1. An adversary with an commercial ICD programmer 2. Passive Attacks 3. Active Attacks
  • 14. Tools used to reverse-engineer attacks ● Commercial ICD programmer ● Software radio (Universal Software Radio Peripheral - USRP) ● Oscilloscope ● Device Used for study ➢ Medtronic Maximo DR VVE-DDDR model #7278 ICD ● Threats ➢ Vital information life patient details and vital signals of the patient are transmitted in clear
  • 15.
  • 16. Reverse Engineering Transmissions ● ICD and the programmer use the same encoding scheme but different modulation schemes ● Programmer uses binary frequency shift keying (2-FSK) for modulation ● ICD uses differential binary phase shift keying (DBPSK) for modulation ● Encoded using Non-Return-to-Zero Inverted (NRZI) with bit stuffing
  • 17. Conversation between ICD and programmer
  • 18. Attacks Performed Replay attacks ● ICD Identification ● Disclosing patient data ● Disclosing cardiac data (32 packets/second) ● Changing the patient's name (10 attempts) ● Setting ICD’s clock (10 attempts) ● Changing therapies (24 attempts) ● Denial of service (esp. with respect to power consumption) ● Inducing Fibrillation (electro psychological test)
  • 19. Test mode ● Safety mechanisms are enforced in the ICD programmers software so that the physician can not accidently active test mode ● But can be induced using USRP systems ● Solution Proposed : “we argue that if any IMD exhibits a test procedure T for some property P, and if there are no medical reasons for conducting procedure T other than testing property P , then it should be impossible to trigger T unless P is enabled.”
  • 20. Zero Power Notification ● Cryptographic keys - hinders emergency response ● Must not consume a lot of energy ● Harvests power from RF energy ● Uses Piezo-elements to alert user ● Uses Wireless Identification and Sensing Platform (WISP) that contains a RFID circuitry and a microcontroller with 256 Bytes RAM and 8KB memory
  • 21. Evaluation ● Standard - Sound Pressure Level ● Buzzing peaks at 67 dB SPL at 1m ● Simulation : Device implanted beneath 1cm of Bacon and 4 cm of 85% lean ground beef ● Measured 84 dB SPL at a distance of 1m
  • 23. Zero Power Authentication ● Harvests RF energy to power a cryptographic protocol that authenticates requests from external device programmer ● Challenge response protocol based on RC5-32/12/16 ● Master Key - Km ● IMD identity I ● IMD specific key K = (Km ,I)
  • 24. Zero Power Sensible Key Exchange ● Complements above 2 defence techniques ● Primary goal is to allow the user to know that a key exchange is happening ● Programmer initiates the protocol by supplying unmodulated RF signal ● IMD generates a random no to be used as session key and modulates it as sound wave ● The sound wave can only be read and demodulated by a reader with a microphone situated close to the patients body ● Can latter be used for long range communication
  • 25. Future Work ● Access for previously unauthorized users during emergency situations ● Next generation IMDs with more networking abilities should not rely solely on external mechanisms for security. ● Device manufacturers must not view external devices like external programmers as trusted computing base for IMDs ● Ensure that all devices used do not harm the human body
  • 26. References ● D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohmo, and W. H. Maisel. “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses” in IEEE Symposium on Security and Privacy, Oakland, CA, 2008, pp. 129-142. ● D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel. “Security and privacy for implantable medical devices. IEEE Pervasive Computing, Special Issue on Implantable Electronics, January 2008.” ● WISP - http://sensor.cs.washington.edu/WISP.html