Towards an Inherently Secure Run-Time Environment for Medical Devices

被引:6
|
作者
Bresch, Cyril [1 ]
Chollet, Stephanie [1 ]
Hely, David [1 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Valence, France
关键词
Component; Control Flow Integrity; Trust Environment; Hardware Architecture;
D O I
10.1109/ICIOT.2018.00027
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Connected medical devices are promising in medical area. However, these devices are known to be poor in security and strongly vulnerable to code injection attacks. These attacks aim at modifying the run-time behavior of an application by violating its control flow graph. Control flow hijacking can lead hackers to remotely control medical application and endanger patient's life. This article focuses on devices and provides an overview of the different countermeasures that mitigate run-time attacks. Finally, from this state of the art, we will expose the perspectives and the ongoing work to make medical devices inherently more secure.
引用
收藏
页码:140 / 147
页数:8
相关论文
共 50 条
  • [21] RUN-TIME DEBUGGERS
    NELSON, T
    DR DOBBS JOURNAL, 1993, 18 (12): : 36 - 36
  • [22] Run-time reconfiguration: Towards reducing the density requirements of FPGAs
    Brunham, K
    Kinsner, W
    CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 1259 - 1264
  • [23] Run-time execution of reconfigurable hardware in a Java']Java environment
    King, LAS
    Quinn, H
    Leeser, M
    Galatopoullos, D
    Manolakos, E
    2001 INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, ICCD 2001, PROCEEDINGS, 2001, : 380 - 385
  • [24] A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls
    Johnsen, Einar Broch
    Owe, Olaf
    Axelsen, Eyvind W.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 117 : 375 - 392
  • [25] Porting of Run-Time Environment for Lua-based Applications
    Grumic, Marko
    Vasic, Marko
    Kovacevic, Jelena
    Kastelan, Ivan
    2015 IEEE 5TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2015, : 128 - 131
  • [26] Run-time verification
    Colin, S
    Mariani, L
    MODEL-BASED TESTING OF REACTIVE SYSTEMS, 2005, 3472 : 525 - 555
  • [27] Run-time monitoring of communication activities in a rapid prototyping environment
    Kirschbaum, A
    Becker, J
    Glesner, M
    NINTH INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING - PROCEEDINGS, 1998, : 52 - 57
  • [28] Design of run-time configuration manager for a multimedia network environment
    Park, TK
    Kim, C
    Hong, JW
    PROCEEDINGS OF THE IEEE SECOND INTERNATIONAL WORKSHOP ON SYSTEMS MANAGEMENT, 1996, : 9 - 14
  • [29] A unified codesign run-time environment for the UltraSONIC reconfigurable computer
    Wiangtong, T
    Cheung, PYK
    Luk, W
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 396 - 405
  • [30] Hardware-Based Run-Time Code Integrity in Embedded Devices
    Wehbe, Taimour
    Mooney, Vincent
    Keezer, David
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 18