Attack-graph threat modeling assessment of ambulatory medical devices

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient's vital signs. This integration creates environments that are conducive to malicious activities. The potential impact presents new challenges for the medical community. Hence, this research presents attack graph modeling as a viable solution to identifying vulnerabilities, assessing risk, and forming mitigation strategies to defend ambulatory medical devices from attackers. Common and frequent vulnerabilities and attack strategies related to the various aspects of ambulatory devices, including Bluetooth enabled sensors and Android applications are identified in the literature. Based on this analysis, this research presents an attack graph modeling example on a theoretical device that highlights vulnerabilities and mitigation strategies to consider when designing ambulatory devices with similar components.

Original languageEnglish
Title of host publicationProceedings of the 50th Annual Hawaii International Conference on System Sciences, HICSS 2017
EditorsTung X. Bui, Ralph Sprague
PublisherIEEE Computer Society
Pages3648-3657
Number of pages10
ISBN (Electronic)9780998133102
StatePublished - 2017
Event50th Annual Hawaii International Conference on System Sciences, HICSS 2017 - Big Island, United States
Duration: Jan 3 2017Jan 7 2017

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2017-January
ISSN (Print)1530-1605

Conference

Conference50th Annual Hawaii International Conference on System Sciences, HICSS 2017
Country/TerritoryUnited States
CityBig Island
Period01/3/1701/7/17

Fingerprint

Dive into the research topics of 'Attack-graph threat modeling assessment of ambulatory medical devices'. Together they form a unique fingerprint.

Cite this