作者
Eduard Marin, Dave Singelée, Flavio D Garcia, Tom Chothia, Rik Willems, Bart Preneel
发表日期
2016/12/5
图书
Proceedings of the 32nd annual conference on computer security applications
页码范围
226-236
简介
Implantable Medical Devices (IMDs) typically use proprietary protocols with no or limited security to wirelessly communicate with a device programmer. These protocols enable doctors to carry out critical functions, such as changing the IMD's therapy or collecting telemetry data, without having to perform surgery on the patient. In this paper, we fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters). For this we follow a black-box reverse-engineering approach and use inexpensive Commercial Off-The-Shelf (COTS) equipment. We demonstrate that reverse-engineering is feasible by a weak adversary who has limited resources and capabilities without physical access to the devices. Our analysis of the proprietary …
引用总数
201620172018201920202021202220232024181612152617138
学术搜索中的文章
E Marin, D Singelée, FD Garcia, T Chothia, R Willems… - Proceedings of the 32nd annual conference on …, 2016