Download presentation
Presentation is loading. Please wait.
Published byAmbrose Boyd Modified over 9 years ago
1
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
2
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of IMDs are currently deployed This is a big problem
3
Implantable Medical Devices (IMDs)
Surgically Implanted into a patient’s body Facilitates Medical Treatment i.e. pacemakers, defibrillators, insulin pumps. Communicates Wirelessly Sends vital sign information Receives commands Battery Powered
5
More IMD Properties Does not transmit unless…
It is responding to an IMD programmer It detects a life-threatening condition Does not share channels with other IMDs
6
IMD Programmer Wirelessly configure IMDs Requires no credentials
query IMD for data send commands to IMD Requires no credentials Good: settings can be changed in an emergency without hassle Bad: anyone can use it Communicates Wirelessly Sends vital sign information Receives commands
7
Commands Confidential Patient data
8
Unauthorized Commands
Confidential Patient data
9
Problems with using crypto
Inalterability IMDs last for up to 10 years IMD replacement requires surgery IMD hardware is inadequate Safety Immediate access False negatives Maintainability Bugs/Recalls
10
Solution: The Shield Does not alter IMD
Protects against Passive and Active Adversaries Does not inconvenience patient Does not reduce safety of IMD
11
The shield passes legitimate
Commands along to the IMD Encrypted Channels
12
The shield blocks unauthorized commands
13
Assumptions IMDs and Programmers are honest
The shield is a wearable device such as a necklace There is a secure channel between IMD and the programmer
15
Jamming Jams Eavesdroppers during IMDs transmissions
Does this only when it knows the IMD will transmit Jams the IMD during programmer transmissions If a signal is detected while the shield is transmitting, it automatically starts jamming
19
The End.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.