Venkatasubramanian, Krishna K.Vasserman, Eugene Y.Sokolsky, OlegLee, Insup2015-08-052015-08-052013-10-16http://hdl.handle.net/2097/20139Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 1 of this two-part article provides an overview of the IMD environment and the attacks that can be mounted on it.en-UShttp://www.sherpa.ac.uk/romeo/issn/1540-7993/This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).https://rightsstatements.org/page/InC/1.0/?language=enIntegrated Clinical Environment (ICE)Attack model, attack vectorsComputer securityInteroperable medical devicesInteroperabilityMedical devicesSecurity and Interoperable Medical Device Systems: Part 1Text