Security and Interoperable Medical Device Systems, Part 2: Failures, Consequences and Classifications
dc.citation.doi | http://dx.doi.org/10.1109/MSP.2012.153 | en_US |
dc.citation.epage | 73 | en_US |
dc.citation.issn | 1540-7993 | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.jtitle | IEEE Security and Privacy Magazine (IEEE SECUR PRIV) | en_US |
dc.citation.spage | 70 | en_US |
dc.citation.volume | 10 | en_US |
dc.contributor.author | Vasserman, Eugene Y. | |
dc.contributor.author | Venkatasubramanian, Krishna K. | |
dc.contributor.author | Sokolsky, Oleg | |
dc.contributor.author | Lee, Insup | |
dc.contributor.authoreid | eyv | en_US |
dc.date.accessioned | 2015-08-05T21:51:10Z | |
dc.date.available | 2015-08-05T21:51:10Z | |
dc.date.issued | 2013-10-13 | |
dc.date.published | 2012 | en_US |
dc.description.abstract | Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 2 of this two-part article defines a failure model, or the specific ways in which IMD environments might fail when attacked. An attack-consequences model expresses the combination of failures experienced by IMD environments for each attack vector. This analysis leads to interesting conclusions about regulatory classes of medical devices in IMD environments subject to attacks. Part 1 can be found here: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.128. | en_US |
dc.description.version | Article (author version) | |
dc.identifier.uri | http://hdl.handle.net/2097/20140 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE Computer Society; Institute of Electrical and Electronics Engineers | en_US |
dc.relation.uri | http://www.ieee.org/index.html | en_US |
dc.rights | http://www.sherpa.ac.uk/romeo/issn/1540-7993/ | en_US |
dc.rights.uri | https://rightsstatements.org/page/InC/1.0/?language=en | |
dc.subject | Integrated Clinical Environment (ICE) | en_US |
dc.subject | Attack model, attack vectors | en_US |
dc.subject | Computer security | en_US |
dc.subject | Interoperable medical devices | en_US |
dc.subject | Interoperability | en_US |
dc.subject | Medical devices | en_US |
dc.title | Security and Interoperable Medical Device Systems, Part 2: Failures, Consequences and Classifications | en_US |
dc.type | Text | en_US |