TY - GEN
T1 - Attack-graph threat modeling assessment of ambulatory medical devices
AU - Luckett, Patrick
AU - McDonald, J. Todd
AU - Glisson, William Bradley
N1 - Publisher Copyright:
© 2017 Proceedings of the Annual Hawaii International Conference on System Sciences. All rights reserved.
PY - 2017
Y1 - 2017
N2 - The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient's vital signs. This integration creates environments that are conducive to malicious activities. The potential impact presents new challenges for the medical community. Hence, this research presents attack graph modeling as a viable solution to identifying vulnerabilities, assessing risk, and forming mitigation strategies to defend ambulatory medical devices from attackers. Common and frequent vulnerabilities and attack strategies related to the various aspects of ambulatory devices, including Bluetooth enabled sensors and Android applications are identified in the literature. Based on this analysis, this research presents an attack graph modeling example on a theoretical device that highlights vulnerabilities and mitigation strategies to consider when designing ambulatory devices with similar components.
AB - The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient's vital signs. This integration creates environments that are conducive to malicious activities. The potential impact presents new challenges for the medical community. Hence, this research presents attack graph modeling as a viable solution to identifying vulnerabilities, assessing risk, and forming mitigation strategies to defend ambulatory medical devices from attackers. Common and frequent vulnerabilities and attack strategies related to the various aspects of ambulatory devices, including Bluetooth enabled sensors and Android applications are identified in the literature. Based on this analysis, this research presents an attack graph modeling example on a theoretical device that highlights vulnerabilities and mitigation strategies to consider when designing ambulatory devices with similar components.
UR - https://www.scopus.com/pages/publications/85093730446
M3 - Conference contribution
AN - SCOPUS:85093730446
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
SP - 3648
EP - 3657
BT - Proceedings of the 50th Annual Hawaii International Conference on System Sciences, HICSS 2017
A2 - Bui, Tung X.
A2 - Sprague, Ralph
PB - IEEE Computer Society
T2 - 50th Annual Hawaii International Conference on System Sciences, HICSS 2017
Y2 - 3 January 2017 through 7 January 2017
ER -