SlideShare a Scribd company logo
Mob Sec Mobile Security Conference 4/11/2010 Herzliya
Danny Lieberman – Software Associates.
v6
Agenda
 Mobile medical is hot
 Applications
 Threat scenarios
 A threat model framework for secure code
 Summary
Mobilemedicaldevices arehot
Mobile consumer electronics creates
potential for life-saving applications
that are cheaper and more
accessible than any other
alternative.
Social benefit comes at the price of
cyber threats.
In this talk we present a systematic
method of analysing cyber threats in
mobile medical devices.
Applications
Threat scenarios
Countermeasures
Datatracking
Who: Patients, care-givers, doctors
What: Data acquisition
Why: Controlling symptoms of chronic
illness requires tracking data over long
periods of time.
• Glucose
• Heart rate
• Blood pressure
• Dosage (insulin, dopamine …)
• ...
Platforms : Smart-phones, data &
location-based services.
Diabetes
Parkinson/MSA
Alzheimer
Asthma
Life-sustaining
Who: Patients
What: Implanted devices for cardiac
pacing, defibrillation, drug delivery…
Why: Sustain life
Platforms : Embedded devices with
mobile connectivity for remote
monitoring & programming.
Chronic heart disease
Epilepsy
Diabetes
Depression
“…the latest technology in a full complement of patient-focused CRM products”
Threatscenariotemplate
An attacker may exploit
vulnerabilities to cause damage to
assets.
Security countermeasures mitigate
vulnerabilities and reduce risk.
Asset
Vulnerability
Attacker
Radioattackscenario
Patient with ICD
Clear
text
protocol
Threat T1 – A malicious attacker may exploit a clear text
protocol and instruct an ICD to deliver a shock that would
cause sudden cardiac death.
Vulnerability V1 – Clear text communications protocol
Countermeasure C1 – Encrypt network link
Countermeasure C2 – Validate messages using secure
tokens.
Attacker
Implantable CardioverterDefibrillators
In 2008, approximately 350,000
pacemakers and 140,000 ICDs were
implanted in the US.
Forecasted to $48BN in 2014.
Proof of concept attack:
• Reverse-engineered commands
• Intercepted vital signs, history
• Reprogrammed therapy settings
• DoS to deplete battery
• Directed the ICD to deliver 137V
shocks that would induce
ventricular fibrillation in a patient.
2008 ICD vulnerability study
Devicedefectattackscenario
Patient
Life
Software
defects
Device
malfunction
Threat T2 – An internal short circuit is undetected by the
device control software and may be fatal.
Vulnerability V2 – Software doesn’t monitor hardware
malfunctions
Countermeasure C3 – Notify customer service when
hardware issue identified.
Countermeasure C4 – Implement fail-safe function
FDAdevicerecalls
The FDA issued 23 recalls of
defective devices in H1/2010.
All were “Class 1” :
“reasonable probability that use of
these products will cause serious
adverse health consequences or
death.”
At least 6 recalls were
probably caused by
software defects.
Maliciouscodeattackscenario
ePHI
Weak or well-
known
passwords
Software
defects
OS
vulnerabilities
Malware
Threat T3 – Malicious code may be used in order to exploit
multiple vulnerabilities and obtain patient information
Vulnerability V3 – USB, and/or Internet access enabled
Countermeasure C4 – Hardware toggle USB
Countermeasure C5 – Network isolation
Countermeasure C6 – Software security assessment
Mobileclinicalassistants
Mobile imaging analysis devices
used by hospital radiologists had
unplanned Internet access.
Over 300 devices infected by
Conficker and taken out of service.
Regulatory requirements mandated
that the impacted hospitals would
have to wait 90 days before the
systems could be modified to remove
the infections and vulnerabilities.
WhereistheFDA?
Guidance documents from 2015
extend FDA regulatory oversight –
1. Mobile apps that are medical
devices, draft 2/2015
2. Cyber security for networked
devices, final 10/2014
However -
If a device has FDA pre-market
approval, consumers cannot sue the
manufacturer for injuries and
disability incurred because of the
device.
“Riegel v. Medtronic “, 2008
Athreatmodelsecurityframework
Objectives
 Assess product risk
 Understand what
threats count
 Prioritize
countermeasures.
 Drive profits
Premarket approval.
Cyber security asset and
threat framework.
Assessproductrisk
Understandwhatthreatscount
Prioritizecountermeasures
Product management has 1
dollar in their pocket:
 Countermeasure C1 –
Encrypt network link to ICD
Countermeasure C21 –
Validate POST requests
with secure tokens.
 Countermeasure C3 –
Wearable “cloaker” to ensure
that only authorized
programmers can interact
with the device.
Driveprofits
Transparency means more eyeballs
can look at issues.
More eyeballs reduces cost.
More eyeballs means safer devices.
Safer devices means more revenue.
Medical
device threat
models are
transparent.
Sources
 Riegel v. Medtronic, Inc.
http://www.law.cornell.edu/supct/html/06-179.ZS.html
 Pacemakers and implantable cardiac defibrillators: Software radio
attacks and zero-power defenses.
Daniel Halperin et al.
Proceedings of the 29th Annual IEEE Symposium on Security and
Privacy, May 2008.
http://www.secure-medicine.org/icd-study/icd-study.pdf
 Software transparency in imbedded medical devices
http://www.softwarefreedom.org/resources/2010/transparent-medical-
devices.html
 Prof. Nir Giladi,Tel Aviv Souraski Hospital Neurology Department,
personal communication on data tracking for MSA patients
 Biotronik – cellular pacemaker, http://www.biotronik.com/en/us/19412

More Related Content

What's hot

Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical Devices
Jane Wang
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
Ajay Ohri
 
Aeroscout Wwt Wireless Mobilityin Hc Webcast
Aeroscout   Wwt Wireless Mobilityin Hc WebcastAeroscout   Wwt Wireless Mobilityin Hc Webcast
Aeroscout Wwt Wireless Mobilityin Hc Webcast
Marc
 
Machine Learning in Medical Devices Webinar
Machine Learning in Medical Devices WebinarMachine Learning in Medical Devices Webinar
Machine Learning in Medical Devices Webinar
ICS
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
rcnossen
 
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life Connect 2013: 2net System Overview, Security and PrivacyQualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life
 

What's hot (19)

CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 
Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical Devices
 
security and privacy for medical implantable devices
security and privacy for medical implantable devicessecurity and privacy for medical implantable devices
security and privacy for medical implantable devices
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
The Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDThe Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMD
 
Aeroscout Wwt Wireless Mobilityin Hc Webcast
Aeroscout   Wwt Wireless Mobilityin Hc WebcastAeroscout   Wwt Wireless Mobilityin Hc Webcast
Aeroscout Wwt Wireless Mobilityin Hc Webcast
 
Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
Machine Learning in Medical Devices Webinar
Machine Learning in Medical Devices WebinarMachine Learning in Medical Devices Webinar
Machine Learning in Medical Devices Webinar
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
 
Avaali-IOT HealthCare Applications
Avaali-IOT HealthCare ApplicationsAvaali-IOT HealthCare Applications
Avaali-IOT HealthCare Applications
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life Connect 2013: 2net System Overview, Security and PrivacyQualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
 

Viewers also liked

Flooding on the somerset levels
Flooding on the somerset levelsFlooding on the somerset levels
Flooding on the somerset levels
Noel Jenkins
 
Flooding 5 Bangladesh Gcse Aqa A
Flooding 5  Bangladesh Gcse Aqa AFlooding 5  Bangladesh Gcse Aqa A
Flooding 5 Bangladesh Gcse Aqa A
tudorgeog
 
Flooding 6 Solutions To Flooding
Flooding 6 Solutions To FloodingFlooding 6 Solutions To Flooding
Flooding 6 Solutions To Flooding
tudorgeog
 

Viewers also liked (8)

Quick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC systemQuick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC system
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
Flooding on the somerset levels
Flooding on the somerset levelsFlooding on the somerset levels
Flooding on the somerset levels
 
Flooding 5 Bangladesh Gcse Aqa A
Flooding 5  Bangladesh Gcse Aqa AFlooding 5  Bangladesh Gcse Aqa A
Flooding 5 Bangladesh Gcse Aqa A
 
Flooding 6 Solutions To Flooding
Flooding 6 Solutions To FloodingFlooding 6 Solutions To Flooding
Flooding 6 Solutions To Flooding
 
Methods Of Flood Control
Methods Of Flood Control Methods Of Flood Control
Methods Of Flood Control
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 

Similar to Killed by code 2015

Andy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptxAndy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptx
safsda1
 

Similar to Killed by code 2015 (20)

Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
FDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityFDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on Cybersecurity
 
Medical device cybersecurity
Medical device cybersecurityMedical device cybersecurity
Medical device cybersecurity
 
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
 
Andy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptxAndy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptx
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 
Presentation: Proposed Reforms to the Regulation of Software, Including Softw...
Presentation: Proposed Reforms to the Regulation of Software, Including Softw...Presentation: Proposed Reforms to the Regulation of Software, Including Softw...
Presentation: Proposed Reforms to the Regulation of Software, Including Softw...
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 
Design Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud ConnectivityDesign Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud Connectivity
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Wearable Tech Medical Devices
Wearable Tech Medical DevicesWearable Tech Medical Devices
Wearable Tech Medical Devices
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
Challenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciencesChallenges and-opportunities-in-software-driven-medical-sciences
Challenges and-opportunities-in-software-driven-medical-sciences
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 

More from Flaskdata.io

More from Flaskdata.io (16)

Flaskdata - Observability for clinical data
Flaskdata - Observability for clinical dataFlaskdata - Observability for clinical data
Flaskdata - Observability for clinical data
 
The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?
 
Flaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trialsFlaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trials
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
The insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeedThe insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeed
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Pathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcarePathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcare
 
The Tao of GRC
The Tao of GRCThe Tao of GRC
The Tao of GRC
 
Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Data Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetData Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budget
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Writing An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stickWriting An Effective Security Procedure in 2 pages or less and make it stick
Writing An Effective Security Procedure in 2 pages or less and make it stick
 

Recently uploaded

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (13)

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 

Killed by code 2015

  • 1. Mob Sec Mobile Security Conference 4/11/2010 Herzliya Danny Lieberman – Software Associates. v6
  • 2. Agenda  Mobile medical is hot  Applications  Threat scenarios  A threat model framework for secure code  Summary
  • 3. Mobilemedicaldevices arehot Mobile consumer electronics creates potential for life-saving applications that are cheaper and more accessible than any other alternative. Social benefit comes at the price of cyber threats. In this talk we present a systematic method of analysing cyber threats in mobile medical devices. Applications Threat scenarios Countermeasures
  • 4.
  • 5. Datatracking Who: Patients, care-givers, doctors What: Data acquisition Why: Controlling symptoms of chronic illness requires tracking data over long periods of time. • Glucose • Heart rate • Blood pressure • Dosage (insulin, dopamine …) • ... Platforms : Smart-phones, data & location-based services. Diabetes Parkinson/MSA Alzheimer Asthma
  • 6. Life-sustaining Who: Patients What: Implanted devices for cardiac pacing, defibrillation, drug delivery… Why: Sustain life Platforms : Embedded devices with mobile connectivity for remote monitoring & programming. Chronic heart disease Epilepsy Diabetes Depression “…the latest technology in a full complement of patient-focused CRM products”
  • 7.
  • 8. Threatscenariotemplate An attacker may exploit vulnerabilities to cause damage to assets. Security countermeasures mitigate vulnerabilities and reduce risk. Asset Vulnerability Attacker
  • 9. Radioattackscenario Patient with ICD Clear text protocol Threat T1 – A malicious attacker may exploit a clear text protocol and instruct an ICD to deliver a shock that would cause sudden cardiac death. Vulnerability V1 – Clear text communications protocol Countermeasure C1 – Encrypt network link Countermeasure C2 – Validate messages using secure tokens. Attacker
  • 10. Implantable CardioverterDefibrillators In 2008, approximately 350,000 pacemakers and 140,000 ICDs were implanted in the US. Forecasted to $48BN in 2014. Proof of concept attack: • Reverse-engineered commands • Intercepted vital signs, history • Reprogrammed therapy settings • DoS to deplete battery • Directed the ICD to deliver 137V shocks that would induce ventricular fibrillation in a patient. 2008 ICD vulnerability study
  • 11. Devicedefectattackscenario Patient Life Software defects Device malfunction Threat T2 – An internal short circuit is undetected by the device control software and may be fatal. Vulnerability V2 – Software doesn’t monitor hardware malfunctions Countermeasure C3 – Notify customer service when hardware issue identified. Countermeasure C4 – Implement fail-safe function
  • 12. FDAdevicerecalls The FDA issued 23 recalls of defective devices in H1/2010. All were “Class 1” : “reasonable probability that use of these products will cause serious adverse health consequences or death.” At least 6 recalls were probably caused by software defects.
  • 13. Maliciouscodeattackscenario ePHI Weak or well- known passwords Software defects OS vulnerabilities Malware Threat T3 – Malicious code may be used in order to exploit multiple vulnerabilities and obtain patient information Vulnerability V3 – USB, and/or Internet access enabled Countermeasure C4 – Hardware toggle USB Countermeasure C5 – Network isolation Countermeasure C6 – Software security assessment
  • 14. Mobileclinicalassistants Mobile imaging analysis devices used by hospital radiologists had unplanned Internet access. Over 300 devices infected by Conficker and taken out of service. Regulatory requirements mandated that the impacted hospitals would have to wait 90 days before the systems could be modified to remove the infections and vulnerabilities.
  • 15. WhereistheFDA? Guidance documents from 2015 extend FDA regulatory oversight – 1. Mobile apps that are medical devices, draft 2/2015 2. Cyber security for networked devices, final 10/2014 However - If a device has FDA pre-market approval, consumers cannot sue the manufacturer for injuries and disability incurred because of the device. “Riegel v. Medtronic “, 2008
  • 17. Objectives  Assess product risk  Understand what threats count  Prioritize countermeasures.  Drive profits Premarket approval. Cyber security asset and threat framework.
  • 20. Prioritizecountermeasures Product management has 1 dollar in their pocket:  Countermeasure C1 – Encrypt network link to ICD Countermeasure C21 – Validate POST requests with secure tokens.  Countermeasure C3 – Wearable “cloaker” to ensure that only authorized programmers can interact with the device.
  • 21. Driveprofits Transparency means more eyeballs can look at issues. More eyeballs reduces cost. More eyeballs means safer devices. Safer devices means more revenue. Medical device threat models are transparent.
  • 22. Sources  Riegel v. Medtronic, Inc. http://www.law.cornell.edu/supct/html/06-179.ZS.html  Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. Daniel Halperin et al. Proceedings of the 29th Annual IEEE Symposium on Security and Privacy, May 2008. http://www.secure-medicine.org/icd-study/icd-study.pdf  Software transparency in imbedded medical devices http://www.softwarefreedom.org/resources/2010/transparent-medical- devices.html  Prof. Nir Giladi,Tel Aviv Souraski Hospital Neurology Department, personal communication on data tracking for MSA patients  Biotronik – cellular pacemaker, http://www.biotronik.com/en/us/19412