33 research outputs found

    They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices

    Get PDF
    Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.National Science Foundation (U.S.). (Grant number CNS-0831244)National Science Foundation (U.S.). Graduate Research Fellowship ProgramAlfred P. Sloan Foundation. FellowshipUnited States. Dept. of Health and Human Services. Cooperative Agreement (90TR0003/01

    Mementos: System support for long-running computation on RFID-scale devices

    Get PDF
    Abstract Many computing systems include mechanisms designed to defend against sudden catastrophic losses of computational state, but few systems treat such losses as the common case rather than exceptional events. On the other end of the spectrum are transiently powered computing devices such as RFID tags and smart cards; these devices are typically paired with code that must complete its task under tight time constraints before running out of energy. Mementos is a software system that transforms general-purpose programs into interruptible computations that are protected from frequent power losses by automatic, energy-aware state checkpointing. Mementos comprises a collection of optimization passes for the LLVM compiler infrastructure and a linkable library that exercises hardware support for energy measurement while managing state checkpoints stored in nonvolatile memory. We evaluate Mementos against diverse test cases and find that, although it introduces time overhead of up to 60% in our tests versus uninstrumented code executed without power failures, it effectively spreads program execution across zero or more complete losses of power and state. Other contributions of this work include

    Arfid: A Reconfigurable Fabric of Input Devices for the Internet of Things

    Get PDF
    Abstract Low-cost, easily deployable, reconfigurable, movable input devices can enable adaptive workflows in commercial, industrial, and home environments. A key limitation of previous reconfigurable control systems is their high cost or maintenance burden (e.g., battery changes or wiring setup). Our poster presents Arfid, a "fabric" for reconfigurable input devices that connects low-cost, battery-free inputs to arbitrarily specified functions in their surroundings via a buildingwide network of RFID readers. Users can reassign controllers' functions using a simple web interface

    Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists

    Full text link
    Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/138357/1/pace13102_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/138357/2/pace13102.pd

    Mementos

    No full text

    WISPCam: A battery-free RFID camera

    No full text
    Abstract—Energy-scavenging devices with general-purpose microcontrollers can support arbitrarily complex sensing tasks in theory, but in practice, energy limitations impose severe constraints on the application space. Richer sensing such as image capture would enable many new applications to take advantage of energy scavenging. Richer sensing faces two key challenges: efficiently retaining the necessary amount of harvested energy, and storing and communicating large units of sensor data. This paper presents the WISPCam, a passive UHF RFID camera tag based on the Wireless Identification and Sensing Platform that overcomes these two challenges to support reliable image capture and transmission while powered by an RFID reader. The WISPCam uses a novel charge-storage scheme designed specifi-cally to match the image sensor’s needs. This scheme optimally balances capacitance and leakage to improve the sensitivity and efficiency of the power harvester. The WISPCam also uses a novel data storage and communication scheme to reliably support the transfer of complete images to an RFID reader application. The WISPCam makes battery-free image capture practical for applications such as mechanical gauge reading and surveillance, both demonstrated in this paper, and opens the door to richer sensing applications on battery-free devices
    corecore