-
3
-
-
80053946151
-
-
Intel Health Guide, 2011. http://www.careinnovations.com/products/ healthguide.
-
(2011)
Intel Health Guide
-
-
-
7
-
-
67549101202
-
Analysis and design of a hardware/software trusted platform module for embedded systems
-
8:1-8:31, Jan.
-
N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst., 8:8:1-8:31, Jan. 2009.
-
(2009)
ACM Trans. Embed. Comput. Syst.
, vol.8
-
-
Aaraj, N.1
Raghunathan, A.2
Jha, N.K.3
-
9
-
-
48349086556
-
Formal methods based development of a pca infusion pump reference model: Generic infusion pump (gip) project
-
Jun.
-
D. Arney, R. Jetley, P. Jones, I. Lee, and O. Sokolsky. Formal methods based development of a PCA infusion pump reference model: Generic infusion pump (GIP) project. In Proc. Joint Workshop High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability, pages 23-33, Jun. 2007.
-
(2007)
Proc. Joint Workshop High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
, pp. 23-33
-
-
Arney, D.1
Jetley, R.2
Jones, P.3
Lee, I.4
Sokolsky, O.5
-
10
-
-
27644598154
-
Secure embedded processing through hardware-assisted run-time monitoring
-
Mar.
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha. Secure embedded processing through hardware-assisted run-time monitoring. In Proc. Design, Automation and Test in Europe Conf., volume 1, pages 178-183, Mar. 2005.
-
(2005)
Proc. Design, Automation and Test in Europe Conf.
, vol.1
, pp. 178-183
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
11
-
-
67651113733
-
Human-centric connectivity enabled by body-coupled communications
-
Jun.
-
H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Comm. Mag., 47:172-178, Jun. 2009.
-
(2009)
IEEE Comm. Mag.
, vol.47
, pp. 172-178
-
-
Baldus, H.1
Corroy, S.2
Fazzi, A.3
Klabunde, K.4
Schenk, T.5
-
12
-
-
84863537000
-
Design challenges for secure implantable medical devices
-
W. Burleson, S. S. Clark, B. Ransford, and K. Fu. Design challenges for secure implantable medical devices. In Proc. Design Automation Conf., pages 12-17, 2012.
-
(2012)
Proc. Design Automation Conf.
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
13
-
-
70349705913
-
Semiformal verification of embedded software in medical devices considering stringent hardware constraints
-
May
-
L. Cordeiro, B. Fischer, H. Chen, and J. Marques-Silva. Semiformal verification of embedded software in medical devices considering stringent hardware constraints. In Proc. IEEE Int. Conf. Embedded Software and Systems, pages 396-403, May 2009.
-
(2009)
Proc. IEEE Int. Conf. Embedded Software and Systems
, pp. 396-403
-
-
Cordeiro, L.1
Fischer, B.2
Chen, H.3
Marques-Silva, J.4
-
14
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
Jul.
-
T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proc. Conf. Hot Topics in Security, pages 1-7, Jul. 2008.
-
(2008)
Proc. Conf. Hot Topics in Security
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
15
-
-
33645712892
-
Compressed sensing
-
Apr.
-
D. Donoho. Compressed sensing. IEEE Trans. Information Theory, 52(4):1289-1306, Apr. 2006.
-
(2006)
IEEE Trans. Information Theory
, vol.52
, Issue.4
, pp. 1289-1306
-
-
Donoho, D.1
-
16
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
Aug.
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM Conf. Special Interest Group on Data Communication, Aug. 2011.
-
(2011)
Proc. ACM Conf. Special Interest Group on Data Communication
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
17
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symp. Security and Privacy, pages 129-142, May 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
18
-
-
79951477401
-
Eavesdropping attacks on high-frequency rfid tokens
-
Jul.
-
G. P. Hancke and S. C. Centre. Eavesdropping attacks on high-frequency RFID tokens. In Proc. Workshop RFID Security, pages 100-113, Jul. 2008.
-
(2008)
Proc. Workshop RFID Security
, pp. 100-113
-
-
Hancke, G.P.1
Centre, S.C.2
-
20
-
-
0035880664
-
Pacemaker systems as implantable cardiac rhythm monitors
-
Aug.
-
C. Israel and S. Barold. Pacemaker systems as implantable cardiac rhythm monitors. American J. Cardiology, 88(4):442-445, Aug. 2001.
-
(2001)
American J. Cardiology
, vol.88
, Issue.4
, pp. 442-445
-
-
Israel, C.1
Barold, S.2
-
21
-
-
34247491209
-
A formal approach to pre-market review for medical device software
-
Sep.
-
R. Jetley, S. P. Iyer, P. L. Jones, and W. Spees. A formal approach to pre-market review for medical device software. In Proc. Int. Conf. Computer Software and Applications, pages 169-177, Sep. 2006.
-
(2006)
Proc. Int. Conf. Computer Software and Applications
, pp. 169-177
-
-
Jetley, R.1
Iyer, S.P.2
Jones, P.L.3
Spees, W.4
-
22
-
-
78049500222
-
Safety of implantable pacemakers and cardioverter defibrillators in the magnetic field of a novel remote magnetic navigation system
-
Oct.
-
C. Jilek, S. Tzeis, T. Reents, H.-L. Estner, S. Fichtner, S. Ammar, J. Wu, G. Hessling, I. Deisenhofer, and C. Kolb. Safety of implantable pacemakers and cardioverter defibrillators in the magnetic field of a novel remote magnetic navigation system. J. Cardiovascular Electrophysiology, 21(10):1136-1141, Oct. 2010.
-
(2010)
J. Cardiovascular Electrophysiology
, vol.21
, Issue.10
, pp. 1136-1141
-
-
Jilek, C.1
Tzeis, S.2
Reents, T.3
Estner, H.-L.4
Fichtner, S.5
Ammar, S.6
Wu, J.7
Hessling, G.8
Deisenhofer, I.9
Kolb, C.10
-
26
-
-
36249007065
-
A wireless power interface for rechargeable battery operated medical implants
-
Oct.
-
P. Li and R. Bashirullah. A wireless power interface for rechargeable battery operated medical implants. IEEE Trans. Circuits and Systems, 54(10):912-916, Oct. 2007.
-
(2007)
IEEE Trans. Circuits and Systems
, vol.54
, Issue.10
, pp. 912-916
-
-
Li, P.1
Bashirullah, R.2
-
27
-
-
77954817369
-
A low overhead DPA countermeasure circuit based on ring oscillators
-
Jul.
-
P.-C. Liu, H.-C. Chang, and C.-Y. Lee. A low overhead DPA countermeasure circuit based on ring oscillators. IEEE Trans. Circuits and Systems, 57:546-550, Jul. 2010.
-
(2010)
IEEE Trans. Circuits and Systems
, vol.57
, pp. 546-550
-
-
Liu, P.-C.1
Chang, H.-C.2
Lee, C.-Y.3
-
28
-
-
4544296705
-
The use of triple-modular redundancy to improve computer reliability
-
Apr.
-
R. E. Lyons and W. Vanderkulk. The use of triple-modular redundancy to improve computer reliability. IBM J. Res. Dev., 6:200-209, Apr. 1962.
-
(1962)
IBM J. Res. Dev.
, vol.6
, pp. 200-209
-
-
Lyons, R.E.1
Vanderkulk, W.2
-
29
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proc. ACM Int. Conf. Mobile Computing and Networking, pages 128-139, 2008.
-
(2008)
Proc. ACM Int. Conf. Mobile Computing and Networking
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
30
-
-
51649122440
-
Energy harvesting from human and machine motion for wireless electronic devices
-
Sep.
-
P. D. Mitcheson, E. M. Yeatman, G. K. Rao, A. S. Holmes, and T. C. Green. Energy harvesting from human and machine motion for wireless electronic devices. Proc. IEEE, 96(9):1457-1486, Sep. 2008.
-
(2008)
Proc. IEEE
, vol.96
, Issue.9
, pp. 1457-1486
-
-
Mitcheson, P.D.1
Yeatman, E.M.2
Rao, G.K.3
Holmes, A.S.4
Green, T.C.5
-
31
-
-
77955998321
-
Ieee 802.11-01/610r02: 802.1.x and 802.11 key interactions
-
T. Moore. IEEE 802.11-01/610r02: 802.1.x and 802.11 key interactions. Technical report, Microsoft Research, 2001.
-
(2001)
Technical Report, Microsoft Research
-
-
Moore, T.1
-
32
-
-
0022721282
-
A review of fault-tolerant techniques for the enhancement of integrated circuit yield
-
May
-
W. R. Moore. A review of fault-tolerant techniques for the enhancement of integrated circuit yield. Proc. IEEE, 74(5):684-698, May 1986.
-
(1986)
Proc. IEEE
, vol.74
, Issue.5
, pp. 684-698
-
-
Moore, W.R.1
-
33
-
-
51849112476
-
Protection circuit against differential power analysis attacks for smart cards
-
Nov.
-
R. Muresan and S. Gregori. Protection circuit against differential power analysis attacks for smart cards. IEEE Trans. Comput., 57:1540-1549, Nov. 2008.
-
(2008)
IEEE Trans. Comput.
, vol.57
, pp. 1540-1549
-
-
Muresan, R.1
Gregori, S.2
-
35
-
-
84885876349
-
Hacking medical devices for fun and insulin: Breaking the human scada system
-
July-Aug.
-
J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conf., July-Aug. 2011.
-
(2011)
Proc. Black Hat Technical Security Conf.
-
-
Radcliffe, J.1
-
36
-
-
0016829070
-
System structure for software fault tolerance
-
Apr.
-
B. Randell. System structure for software fault tolerance. SIGPLAN Not., 10:437-449, Apr. 1975.
-
(1975)
SIGPLAN Not
, vol.10
, pp. 437-449
-
-
Randell, B.1
-
37
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
Nov.
-
K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun. Proximity-based access control for implantable medical devices. In Proc. ACM Conf. Computer and Communications Security, pages 410-419, Nov. 2009.
-
(2009)
Proc. ACM Conf. Computer and Communications Security
, pp. 410-419
-
-
Rasmussen, K.B.1
Castelluccia, C.2
Heydt-Benjamin, T.S.3
Capkun, S.4
-
39
-
-
27544452115
-
Mics transceivers: Regulatory standards and applications
-
Apr.
-
H. S. Savci, A. Sula, Z. Wang, N. S. Dogan, and E. Arvas. MICS transceivers: Regulatory standards and applications. Proc. IEEE, pages 179-182, Apr. 2005.
-
(2005)
Proc. IEEE
, pp. 179-182
-
-
Savci, H.S.1
Sula, A.2
Wang, Z.3
Dogan, N.S.4
Arvas, E.5
-
40
-
-
78650220913
-
Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
-
Apr.
-
S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. Technical Report MSR-TR-2010-33, Microsoft Research, Apr. 2010.
-
(2010)
Technical Report MSR-TR-2010-33, Microsoft Research
-
-
Schechter, S.1
-
41
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Apr.
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Comput. Netw., 31:831-860, Apr. 1999.
-
(1999)
Comput. Netw.
, vol.31
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
42
-
-
84860267053
-
An amulet for trustworthy wearable mhealth
-
pages 7:1-7:6
-
J. Sorber, M. Shin, R. Peterson, C. Cornelius, S. Mare, A. Prasad, Z. Marois, E. Smithayer, and D. Kotz. An amulet for trustworthy wearable mHealth. In Proc. Workshop Mobile Computing Systems Applications, pages 7:1-7:6, 2012.
-
(2012)
Proc. Workshop Mobile Computing Systems Applications
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
43
-
-
84864353539
-
Plug-n-trust: Practical trusted sensing for mhealth
-
J. M. Sorber, M. Shin, R. Peterson, and D. Kotz. Plug-n-Trust: Practical trusted sensing for mHealth. In Proc. Int. Conf. Mobile Systems, Applications, and Services, pages 309-322, 2012.
-
(2012)
Proc. Int. Conf. Mobile Systems, Applications, and Services
, pp. 309-322
-
-
Sorber, J.M.1
Shin, M.2
Peterson, R.3
Kotz, D.4
-
44
-
-
17644417528
-
Charge recycling sense amplifier based logic: Securing low power security ics against dpa
-
K. Tiri and I. Verbauwhede. Charge recycling sense amplifier based logic: Securing low power security ICs against DPA. In Proc. European Solid-State Circuits Conf., pages 179-182, 2004.
-
(2004)
Proc. European Solid-State Circuits Conf.
, pp. 179-182
-
-
Tiri, K.1
Verbauwhede, I.2
-
46
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
Apr.
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862-1870, Apr. 2011.
-
(2011)
Proc. IEEE Int. Conf. Computer Communications
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
47
-
-
80052017643
-
Finfet-based power management for improved dpa resistance with low overhead
-
10:1-10:16, Aug.
-
M. Zhang and N. K. Jha. FinFET-based power management for improved DPA resistance with low overhead. ACM J. Emerg. Technol. Comput. Syst., 7(3):10:1-10:16, Aug. 2011.
-
(2011)
ACM J. Emerg. Technol. Comput. Syst.
, vol.7
, Issue.3
-
-
Zhang, M.1
Jha, N.K.2
-
49
-
-
84879867975
-
Medmon: Securing medical devices through wireless monitoring and anomaly detection
-
accepted for publication in
-
M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. accepted for publication in IEEE Trans. Biomedical Circuits and Systems.
-
IEEE Trans. Biomedical Circuits and Systems
-
-
Zhang, M.1
Raghunathan, A.2
Jha, N.K.3
|