Dokument-ID Dokumenttyp Verfasser/Autoren Herausgeber Haupttitel Auflage Verlagsort Verlag Erscheinungsjahr Seitenzahl Schriftenreihe Titel Schriftenreihe Bandzahl Fachbereich Konferenzname Quelle:Titel Quelle:Jahrgang Quelle:Heftnummer Quelle:Erste Seite Quelle:Letzte Seite ISBN ISSN URN URL DOI Sprache Abstract OPUS4-12355 Beitrag in einer wiss. Zeitschrift Gierling, Markus; Saatjohann, Christoph; Dresen, Christian; Köbe, Julia; Rath, Benjamin; Eckardt, Lars; Schinzel, Sebastian Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients' Risk 2020 1 86. Jahrestagung und Herztage 2020 der DGK Band 109, Supplement 1, April 2020 Elektrotechnik und Informatik (ETI) 1 2 10.1007/s00392-020-01621-0 eng Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn't require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients' risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients' risk was rated by clinicians (security vulnerability of patients' data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients' risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients' risks from security vulnerabilities in implanted cardiac devices. OPUS4-13971 Konferenzveröffentlichung Willing, Markus; Saatjohann, Christoph; Rath, Benjamin; Schinzel, Sebastian; Eckardt, Lars; Köbe, Julia Experiences with General Data Protection Regulations and Remote Monitoring of Implantable Rhythm Devices Springer-Verlag GmbH 2021 87. Jahrestagung der Deutsche Gesellschaft für Kardiologie – Herz‑ und Kreislauforschung e.V Elektrotechnik und Informatik (ETI) 10.1007/s00392-021-01843-w eng OPUS4-13901 Konferenzveröffentlichung Puschner, Endres; Saatjohann, Christoph; Willing, Markus; Dresen, Christian; Köbe, Julia; Rath, Benjamin; Paar, Christof; Eckardt, Lars; Haverkamp, Uwe; Schinzel, Sebastian Listen to Your Heart: Evaluation of the Cardiologic Ecosystem 2021 ARES 2021: The 16th International Conference on Availability, Reliability and Security Elektrotechnik und Informatik (ETI) urn:nbn:de:hbz:836-opus-139012 10.1145/3465481.3465753 eng Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients' health. This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices. Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients' rights and companies' obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem.