-
1
-
-
84881523410
-
Analysis of safety-critical computer failures in medical devices
-
July-Aug.
-
Alemzadeh, H., Iyer, R.K. and Kalbarczyk, Z. Analysis of safety-critical computer failures in medical devices. IEEE Security & Privacy 11, 4, (July-Aug. 2013), 14-26.
-
(2013)
IEEE Security & Privacy
, vol.11
, Issue.4
, pp. 14-26
-
-
Alemzadeh, H.1
Iyer, R.K.2
Kalbarczyk, Z.3
-
4
-
-
67651015355
-
Neurosecurity: Security and privacy for neural devices
-
July
-
Denning, T., Matsuoka, Y. and Kohno, T. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus 27, 1 (July 2009).
-
(2009)
Neurosurgical Focus
, vol.27
, pp. 1
-
-
Denning, T.1
Matsuoka, Y.2
Kohno, T.3
-
7
-
-
84870598846
-
-
Food and Drug Administration.
-
Food and Drug Administration. Is The Product A Medical Device? http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/Overview/ClassifyYourDevice/ucm051512.htm
-
Is The Product A Medical Device?
-
-
-
8
-
-
84912524318
-
-
Food and Drug Administration.
-
Food and Drug Administration. Medical Devices-Classify Your Medical Device; http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/Overview/ClassifyYourDevice/default.htm
-
Medical Devices-Classify Your Medical Device
-
-
-
9
-
-
84942605309
-
-
Food and Drug Administration Safety Communication; June
-
Food and Drug Administration Safety Communication: Cybersecurity for Medical Devices and Hospital Networks; June 2013. http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm
-
(2013)
Cybersecurity for Medical Devices and Hospital Networks
-
-
-
11
-
-
85043019974
-
-
Fox News., Freezes PCs. Apr. 22
-
Fox News. Antivirus Program Goes Berserk, Freezes PCs. Apr. 22, 2010.
-
(2010)
Antivirus Program Goes Berserk
-
-
-
12
-
-
84885719603
-
Controlling for cybersecurity risks of medical device software
-
Oct.
-
Fu, K. and Blum, J. Controlling for cybersecurity risks of medical device software. Commun. ACM 56, 10 (Oct. 2013), 35-37.
-
(2013)
Commun. ACM
, vol.56
, Issue.10
, pp. 35-37
-
-
Fu, K.1
Blum, J.2
-
13
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
Toronto, Ontario, Canada, Aug. 15-19
-
Gollakota, S. et al. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proceedings from SIGCOMM'11 (Toronto, Ontario, Canada, Aug. 15-19, 2011).
-
(2011)
Proceedings from SIGCOMM'11
-
-
Gollakota, S.1
-
15
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy, May 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Halperin, D.1
-
16
-
-
78650197002
-
A taxonomy of vulnerabilities in implantable medical devices
-
Chicago, IL, Oct. 8
-
Hansen, J.A. and Hansen, N.M. A taxonomy of vulnerabilities in implantable medical devices. In Proceedings of SPIMACS'10, (Chicago, IL, Oct. 8, 2010).
-
(2010)
Proceedings of SPIMACS'10
-
-
Hansen, J.A.1
Hansen, N.M.2
-
20
-
-
84969257854
-
Black Hat: Insulin pumps can be hacked
-
Aug. 04
-
Kaplan, D. Black Hat: Insulin pumps can be hacked. SC Magazine, (Aug. 04, 2011).
-
(2011)
SC Magazine
-
-
Kaplan, D.1
-
22
-
-
85042995590
-
Of fact, fiction and Cheney's defibrillator
-
Oct. 27
-
Kolata, G. Of fact, fiction and Cheney's defibrillator. New York Times, (Oct. 27, 2013).
-
(2013)
New York Times
-
-
Kolata, G.1
-
23
-
-
84864058685
-
Security and privacy qualities of medical devices: An analysis of fda postmarket surveillance
-
Kramer, D.B. et al. Security and privacy qualities of medical devices: An analysis of fda postmarket surveillance. PLoS ONE 7, 7 (2012), e40200; doi:10.1371/journal.pone.0040200
-
(2012)
PLoS ONE
, vol.7
, Issue.7
, pp. e40200
-
-
Kramer, D.B.1
-
24
-
-
84883573451
-
Improving the trustworthiness of medical device software with formal verification methods
-
Sept.
-
Li, C., Raghunathan, A. and Jha, N.K. Improving the trustworthiness of medical device software with formal verification methods. IEEE Embedded Systems Letters 5, 3 (Sept. 2013), 50-53.
-
(2013)
IEEE Embedded Systems Letters
, vol.5
, Issue.3
, pp. 50-53
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
25
-
-
2342469291
-
Software security
-
Mar-Apr
-
McGraw, G. Software security. IEEE Security & Privacy 2, 2 (Mar-Apr 2004), 80-83.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 80-83
-
-
McGraw, G.1
-
28
-
-
84888984313
-
Heart-To-Heart (H2H): Authentication for implanted medical devices
-
ACM, New York, NY
-
Rostami, M., Juels, A. and Koushanfar F. Heart-To-Heart (H2H): Authentication for implanted medical devices. In Proceedings for ACM SIGSAC Conference on Computer & Communications Security. ACM, New York, NY, 1099-1112.
-
Proceedings for ACM SIGSAC Conference on Computer & Communications Security
, pp. 1099-1112
-
-
Rostami, M.1
Juels, A.2
Koushanfar, F.3
-
29
-
-
84899747600
-
N.S.A. Devises radio pathway into computers
-
Jan. 14
-
Sanger, D.E. and Shanker, T. N.S.A. devises radio pathway into computers. New York Times (Jan. 14, 2014).
-
(2014)
New York Times
-
-
Sanger, D.E.1
Shanker, T.2
-
30
-
-
84866651033
-
Breakthrough silicon scanning discovers backdoor in military chip, cryptographic hardware and embedded systems
-
Skorobogatov, S. and Woods, C. Breakthrough silicon scanning discovers backdoor in military chip, cryptographic hardware and embedded systems. Lecture Notes in Computer Science 7428 (2012), 23-40.
-
(2012)
Lecture Notes in Computer Science
, vol.7428
, pp. 23-40
-
-
Skorobogatov, S.1
Woods, C.2
-
34
-
-
84885803383
-
Patients put at risk by computer viruses
-
June 13
-
Weaver, C. Patients put at risk by computer viruses. Wall Street Journal (June 13, 2013).
-
(2013)
Wall Street Journal
-
-
Weaver, C.1
-
35
-
-
84879858360
-
The undetectable and unprovable hardware Trojan horse
-
Austin, TX, May 29-June 07
-
Wei, S., Potkonjak, M. The undetectable and unprovable hardware Trojan horse. In Proceedings of the ACM Design Automation Conference (Austin, TX, May 29-June 07, 2013).
-
(2013)
Proceedings of the ACM Design Automation Conference
-
-
Wei, S.1
Potkonjak, M.2
-
36
-
-
79953230521
-
Cybercrimes pose growing threat to medical devices
-
Jan/Feb
-
Wirth, A. Cybercrimes pose growing threat to medical devices. Biomed Instrum Technol. 45, 1 (Jan/Feb 2011), 26-34.
-
(2011)
Biomed Instrum Technol.
, vol.45
, Issue.1
, pp. 26-34
-
-
Wirth, A.1
|