• Deutsch
Internal Login

Open Access

  • Home
  • Search
  • Browse
  • Publish
  • FAQ

Refine

Author

  • Dresen, Christian (2)
  • Saatjohann, Christoph (2)
  • Schinzel, Sebastian (2)
  • Willing, Markus (2)
  • Czolbe, Marc (1)
  • Ebbers, Simon (1)
  • Eckardt, Lars (1)
  • Haverkamp, Uwe (1)
  • Köbe, Julia (1)
  • Paar, Christof (1)
+ more

Year of publication

  • 2025 (1)
  • 2021 (1)

Document Type

  • Article (1)
  • Article in Conference Proceedings (1)

Language

  • English (2)

Has Fulltext

  • yes (2) (remove)

Is part of the Bibliography

  • no (2)

Institute

  • Elektrotechnik und Informatik (ETI) (2)

2 search hits

  • 1 to 2
  • BibTeX
  • CSV
  • RIS
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem (2021)
Puschner, Endres ; Saatjohann, Christoph ; Willing, Markus ; Dresen, Christian ; Köbe, Julia ; Rath, Benjamin ; Paar, Christof ; Eckardt, Lars ; Haverkamp, Uwe ; Schinzel, Sebastian
Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients’ health. This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices. Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients’ rights and companies’ obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem.
Simulating the overload of medical processes due to system failures during a cyberattack (2025)
Willing, Markus ; Ebbers, Simon ; Dresen, Christian ; Czolbe, Marc ; Saatjohann, Christoph ; Schinzel, Sebastian
Today’s medical IT is more and more connected and network or IT system outages may impact the quality of patient treatment. IT outages from cyberattacks are particularly worrisome if attackers focus on those medical IT devices that are critical for medical processes. However, medical processes are primarily documented for the hospital employees and not for analyzing the criticality of any given human or medical IT resource. This paper presents a generic model for realistic, patient-focused simulation of medical processes. The model allows the simulation of cyber incidents, focusing on device outages or overload situations like mass casualty incidents. Furthermore, we present a proof-of-concept tool that implements the described model, enabling end-users to simulate their processes. The tool offers the ability to run with low detailed data for overview purposes and highly detailed data for fine-grained simulation results. We perform different scenario simulations for a sample hospital, including the acute phase of a ransomware attack, negative performance impacts due to the implementation of cybersecurity measures, and emergency plans for mass casualty incidents. In each scenario, the respective simulation resulted in a quantitative statement of how these scenarios affect overall process performance and show possible key factors supporting decision-making. We use real-world data from a German trauma room to optimize and evaluate the process simulation.
  • 1 to 2

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks