Towards an Inherently Secure Run-Time Environment for Medical Devices

被引:6
|
作者
Bresch, Cyril [1 ]
Chollet, Stephanie [1 ]
Hely, David [1 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Valence, France
关键词
Component; Control Flow Integrity; Trust Environment; Hardware Architecture;
D O I
10.1109/ICIOT.2018.00027
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Connected medical devices are promising in medical area. However, these devices are known to be poor in security and strongly vulnerable to code injection attacks. These attacks aim at modifying the run-time behavior of an application by violating its control flow graph. Control flow hijacking can lead hackers to remotely control medical application and endanger patient's life. This article focuses on devices and provides an overview of the different countermeasures that mitigate run-time attacks. Finally, from this state of the art, we will expose the perspectives and the ongoing work to make medical devices inherently more secure.
引用
下载
收藏
页码:140 / 147
页数:8
相关论文
共 50 条
  • [31] Estimation Accuracy on Execution Time of Run-Time Tasks in a Heterogeneous Distributed Environment
    Liu, Qi
    Cai, Weidong
    Jin, Dandan
    Shen, Jian
    Fu, Zhangjie
    Liu, Xiaodong
    Linge, Nigel
    SENSORS, 2016, 16 (09)
  • [32] Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models
    Amornpaisannon, Burin
    Diavastos, Andreas
    Peh, Li-Shiuan
    Carlson, Trevor E.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (02) : 431 - 441
  • [33] ICEr: An Intermittent Computing Environment Based on a Run-Time Module for Energy-Harvesting IoT Devices with NVRAM
    Kwak, Junho
    Kim, Hyeongrae
    Cho, Jeonghun
    ELECTRONICS, 2021, 10 (08)
  • [34] Secure content distribution system based on run-time partial hardware reconfiguration
    Hori, Yohei
    Yokoyama, Hiroyuki
    Toda, Kenji
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 637 - 640
  • [35] Secure embedded processing through hardware-assisted run-time monitoring
    Arora, D
    Ravi, S
    Raghunathan, A
    Jha, NK
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 178 - 183
  • [36] Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada
    Benjamin, Mable
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 71 - 72
  • [37] A universal low cost run-time and programming environment for reconfigurable computing
    Dollas, A
    Efstathiou, D
    Kyriakides, T
    14TH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEMS PROTOTYPING, PROCEEDINGS: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2003, : 2 - 8
  • [38] Towards improved Bayesian fusion through run-time model analysis
    Nunnink, Jan
    Pavlin, Gregor
    2007 PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2007, : 986 - 993
  • [39] Towards Security Case Run-time Adaptation by System Decomposition into Services
    Lisova, Elena
    Causevic, Aida
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 4102 - 4108
  • [40] Research on Run-Time Atmosphere Environment Database Based on Berkeley DB
    Zhang, Jinzhan
    Gong, Guanghong
    Wang, Jiangyun
    Gao, Dongdong
    SYSTEM SIMULATION AND SCIENTIFIC COMPUTING, PT II, 2012, 327 : 135 - 143