Nothing Special   »   [go: up one dir, main page]

skip to main content
review-article
Public Access

A brief chronology of medical device security

Published: 22 September 2016 Publication History

Abstract

With the implantation of software-driven devices comes unique privacy and security threats to the human body.

References

[1]
Applegate, S.D. The dawn of kinetic cyber. In Proceedings of the 5th International Conference on Cyber Conflict. IEEE, 2013, 1--15.
[2]
Bellissimo, A. et al. Secure software updates: Disappointments and new challenges. In Proceedings of the USENIX Summit on Hot Topics in Security, 2006.
[3]
Burleson, W. et al. Design challenges for secure implantable medical devices. In Proceedings of the 49th Annual Design Automation Conference. ACM, 2012, 12--17.
[4]
Chenok, D.J. ISPAB Letter to U.S. Office of Management and Budget (2012); http://csrc.nist.gov/groups/SMA/ispab/documents/correspondence/ispab-ltr-to-omb_med_device.pdf.
[5]
Curfman, G.D. et al. The medical device safety act of 2009. New Eng. J. Med. 360, 15 (2009), 1550--1551.
[6]
Faris, T.H. Safe and Sound Software: Creating an Efficient and Effective Quality System for Software Medical Device Organizations. ASQ Quality Press, 2006.
[7]
Food and Drug Administration. Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Guidance for Industry and Food and Drug Administration Staff (2014); http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf.
[8]
Food and Drug Administration. Postmarket Management of Cybersecurity in Medical Devices; Draft Guidance for Industry and Food and Drug Administration Staff (2016); http://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf.
[9]
Fu, K. Trustworthy medical device software. Workshop Report on Public Health Effectiveness of the FDA 510 (k) Clearance Process: Measuring Postmarket Performance and Other Select Topics. National Academies Press. Washington, D.C. (2011), 102.
[10]
Gollakota, S. et al. They can hear your heartbeats: Non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 2--13.
[11]
Hafemeister, T.L. and Spinos, S. Lean on me: A physician's fiduciary duty to disclose an emergent medical risk to the patient. Washington University Law Review 86, 5 (2009).
[12]
Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, 2008, 129--142.
[13]
Hauser, R.G. and Maron, B.J. Lessons from the failure and recall of an implantable cardioverter-defibrillator. Circulation 112, 13 (2005), 2040--2042.
[14]
Kilbridge, P. Computer crash-lessons from a system failure. New Eng. J. Medicine 348, 10 (2003), 881--882.
[15]
Lee, I. et al. High-confidence medical device software and systems. Computer 39, 4 (2006), 33--38.
[16]
Leveson, N.G. and Turner, C.S. An investigation of the Therac-25 accidents. Computer 26, 7 (1993), 18--41.
[17]
Li, C. et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedings of the 13th IEEE International Conference on e-Health Networking Applications and Services. IEEE, 2011, 150--156.
[18]
Maisel, W.H. et al. Recalls and safety alerts involving pacemakers and implantable cardioverter-defibrillator generators. JAMA 286, 7 (2001), 793--799.
[19]
Meier, B. Maker of heart device kept flaw from doctors. New York Times, 2005.
[20]
National Institute of Standards and Technology (NIST). Framework for Improving Critical Infrastructure Cybersecurity (Ver. 1.0) Feb. 12, 2014; http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf.
[21]
Perrow, C. Normal Accidents: Living with High Risk Technologies. Princeton University Press, 2011.
[22]
Rushanan, M. et al. SoK: Security and privacy in implantable medical devices and body area networks. In Proceedings of the 2014 IEEE Symposium on Security and Privacy. IEEE CS, 524--539.
[23]
Vladeck, D.C. Medical Device Safety Act of 2009: Hearing before the Subcomm. on Health of the Comm. on Energy and Commerce (111th Cong., May 12, 2009); http://scholarship.law.georgetown.edu/cong/45.
[24]
Zhang, M. et al. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomedical Circuits and Systems 7, 6 (2013), 871--881; DOI 10.1109/TBCAS.2013.2245664.
[25]
Zhang, M. et al. Towards trustworthy medical devices and body area networks. In Proceedings of the 50th Annual Design Automation Conference. ACM, 2013, 1--6.

Cited By

View all
  • (2024)Prevention and Mitigation of Disruptions in Medical Device Supply Chains: A Policy PerspectiveJournal of Science Policy & Governance10.38126/JSPG24010824:01Online publication date: 29-Apr-2024
  • (2024)Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic ReviewJournal of Medical Internet Research10.2196/4690426(e46904)Online publication date: 31-May-2024
  • (2023)Security vulnerabilities in healthcare: an analysis of medical devices and softwareMedical & Biological Engineering & Computing10.1007/s11517-023-02912-062:1(257-273)Online publication date: 4-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 59, Issue 10
October 2016
85 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3001840
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2016
Published in CACM Volume 59, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Review-article
  • Popular
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)890
  • Downloads (Last 6 weeks)133
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Prevention and Mitigation of Disruptions in Medical Device Supply Chains: A Policy PerspectiveJournal of Science Policy & Governance10.38126/JSPG24010824:01Online publication date: 29-Apr-2024
  • (2024)Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic ReviewJournal of Medical Internet Research10.2196/4690426(e46904)Online publication date: 31-May-2024
  • (2023)Security vulnerabilities in healthcare: an analysis of medical devices and softwareMedical & Biological Engineering & Computing10.1007/s11517-023-02912-062:1(257-273)Online publication date: 4-Oct-2023
  • (2022)Propositional Inference for IoT Based Dosage Calibration System Using Private Patient-Specific Prescription against Fatal DosagesSensors10.3390/s2301033623:1(336)Online publication date: 28-Dec-2022
  • (2022)Context-Aware Security Modes For Medical Devices2022 Annual Modeling and Simulation Conference (ANNSIM)10.23919/ANNSIM55834.2022.9859283(372-382)Online publication date: 18-Jul-2022
  • (2022)Information security and privacy in hospitals: a literature mapping and review of research gapsInformatics for Health and Social Care10.1080/17538157.2022.204927448:1(30-46)Online publication date: 17-Mar-2022
  • (2022)Most influential countries in the international medical device trade: Network-based analysisPhysica A: Statistical Mechanics and its Applications10.1016/j.physa.2022.127889604(127889)Online publication date: Oct-2022
  • (2021)Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility ManagementWSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS10.37394/23207.2021.18.3618(360-366)Online publication date: 25-Jan-2021
  • (2021)A Comprehensive Survey on Security and Privacy for Electronic Health DataInternational Journal of Environmental Research and Public Health10.3390/ijerph1818966818:18(9668)Online publication date: 14-Sep-2021
  • (2021)Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring DevicesACM Transactions on Internet Technology10.1145/344864922:1(1-31)Online publication date: 14-Sep-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media