메뉴 건너뛰기




Volumn 5, Issue 3, 2013, Pages 50-53

Improving the trustworthiness of medical device software with formal verification methods

Author keywords

Formal verification; Medical device software; Safety; Security

Indexed keywords

FORMAL VERIFICATION METHODS; FORMAL VERIFICATIONS; IMPLANTABLE MEDICAL DEVICES; MEDICAL DEVICES; SECURITY; SOFTWARE VULNERABILITIES; TEMPORAL SAFETY PROPERTIES; WIRELESS CONNECTIVITIES;

EID: 84883573451     PISSN: 19430663     EISSN: None     Source Type: Journal    
DOI: 10.1109/LES.2013.2276434     Document Type: Article
Times cited : (32)

References (16)
  • 2
    • 81255166554 scopus 로고    scopus 로고
    • Failuremodes inmedical device software: An analysis of 15 years of recall data
    • Jun
    • D. R. Wallace and D. R. Kuhn, "Failuremodes inmedical device software: An analysis of 15 years of recall data," in Proc. ACS/IEEE Int. Conf. Comput. Syst. Appl., Jun. 2001, pp. 301-311.
    • (2001) Proc. ACS/IEEE Int. Conf. Comput. Syst. Appl , pp. 301-311
    • Wallace, D.R.1    Kuhn, D.R.2
  • 3
    • 79960835043 scopus 로고    scopus 로고
    • On software verification for sensor nodes
    • D. Bucur and M. Kwiatkowska, "On software verification for sensor nodes," J. Syst. Software, vol. 84, no. 10, pp. 1693-1707, 2011.
    • (2011) J. Syst. Software , vol.84 , Issue.10 , pp. 1693-1707
    • Bucur, D.1    Kwiatkowska, M.2
  • 5
    • 84883576189 scopus 로고    scopus 로고
    • [Online]
    • Pacemaker system specification [Online]. Available: http://sqrl.mcmaster. ca/-SQRLDocuments/PACEMAKER.pdf
    • Pacemaker System Specification
  • 6
    • 38349178199 scopus 로고    scopus 로고
    • Security and privacy for implantable medical devices
    • Jan
    • D. Halperin et al., "Security and privacy for implantable medical devices," IEEE Pervasive Comput., vol. 7, pp. 30-39, Jan. 2008.
    • (2008) IEEE Pervasive Comput. , vol.7 , pp. 30-39
    • Halperin, D.1
  • 7
    • 77956216385 scopus 로고    scopus 로고
    • Medical cyber physical systems
    • Jun
    • I. Lee and O. Sokolsky, "Medical cyber physical systems," in Proc. Design Autom. Conf., Jun. 2010, pp. 743-748.
    • (2010) Proc. Design Autom. Conf , pp. 743-748
    • Lee, I.1    Sokolsky, O.2
  • 8
    • 80053973692 scopus 로고    scopus 로고
    • Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
    • Jun
    • C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in Proc. IEEE Int. Conf. Health Netw. Appl. Services, Jun. 2011, pp. 150-156.
    • (2011) Proc. IEEE Int. Conf. Health Netw. Appl. Services , pp. 150-156
    • Li, C.1    Raghunathan, A.2    Jha, N.K.3
  • 9
    • 50249098733 scopus 로고    scopus 로고
    • Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
    • May
    • D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. IEEE Symp. Security Privacy, May 2008, pp. 129-142.
    • (2008) Proc. IEEE Symp. Security Privacy , pp. 129-142
    • Halperin, D.1
  • 13
    • 70349705913 scopus 로고    scopus 로고
    • Semiformal verification of embedded software inmedical devices considering stringent hardware constraints
    • May
    • L. Cordeiro, B. Fischer, H. Chen, and J. Marques-Silva, "Semiformal verification of embedded software inmedical devices considering stringent hardware constraints," in Proc. Int. Conf. Embed. Software Syst., May 2009, pp. 396-403.
    • (2009) Proc. Int. Conf. Embed. Software Syst. , pp. 396-403
    • Cordeiro, L.1    Fischer, B.2    Chen, H.3    Marques-Silva, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.