+ All Categories
Home > Documents > Interdisciplinary Security: Medical Devices

Interdisciplinary Security: Medical Devices

Date post: 10-Apr-2022
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
46
Type to enter text Interdisciplinary Security: Medical Devices Supported in part by NSF CNS-1330142 and CNS-1331652. Any opinions, findings, and conclusions expressed in this material are those of the authors and do not necessarily reflect the views of NSF. Kevin Fu Associate Professor Computer Science & Engineering University of Michigan web.eecs.umich.edu/~kevinfu/ [email protected]
Transcript
Page 1: Interdisciplinary Security: Medical Devices

Type to enter text

Interdisciplinary Security:

Medical Devices

Supported in part by NSF CNS-1330142 and CNS-1331652. Any opinions, findings, and conclusions expressed in this material are those of the authors and do not necessarily reflect the views of NSF.

Kevin Fu Associate Professor

Computer Science & Engineering University of Michigan

web.eecs.umich.edu/~kevinfu/ [email protected]

Page 2: Interdisciplinary Security: Medical Devices

2

Correctness is easy.

Security is hard.

Phot

o by

Kev

in F

u

Page 3: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Background & Disclosures! Co-founder, Virta Labs ! Security & Privacy Research Group @ Michigan ! Director, Archimedes Center for Medical Device Security ! Co-chair, AAMI Working Group on Medical Device Security ! Member, NIST Information S&P Advisory Board ! Consultant to Samsung, MicroCHIPS Biotech ! Fmr. visiting scientist, U.S. Food and Drug Administration ! Recent re$earch $upport from NSF, HHS, SRC, DARPA,

MARCO, UL, Medtronic, Philips, Siemens, WelchAllyn

3

Page 4: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Semmelweis to Software Sepsis1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation

4

Dr. Ignaz Semmelweis 1818-1865

Dr. Charles Meigs 1792-1869

Physicians should their wash

hands.

Doctors are gentlemen and

therefore their hands are always clean.

Page 5: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security 5

Networking + Wireless !

Photos from: Medtronic

Page 6: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security 6

> Energy spent on radio & computing, etc.

overhead!

< Energy for pacing!

Pacemakers: Regulate heartbeat

Page 7: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Wireless medical devices: great benefits.

subtle inconvenient risks.

Page 8: Interdisciplinary Security: Medical Devices

Photo by Kevin Fu @ Medtronic museum

Page 9: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Type to enter text

© 2014 Association for the Advancement of Medical Instrumentation www.aami.org

Wireless Makes Everything Better?

[Pho

tos:

unc

yclo

pedi

a.w

ikia

.com

/wik

i/Bac

on &

Cis

co &

bac

ondu

jour

.blo

gspo

t.co

m]

9

Eliminative induction: variety of reasons for doubt (Baconian thinking) - John Goodenough

Prof. Kevin Fu

Page 10: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Short History: Medical Devices & SW

12

! Therac-25 analysis [Leveson & Clark, IEEE Computer, 1993]

! Defibrillator cybersecurity [Halperin et al., IEEE Symposium on Security & Privacy, 2008.]

! Insulin pump analysis, 2011 [several]

Photos: Leveson, Fu

! Defib jamming defense [Gollakota et al., ACM SIGCOMM 2011]

! Pacemaker hack reproduced[Barnaby Jack, BlackHat 2012]

! WattsUpDoc defense [Clark et al., USENIX HealthTech 2013]

Page 11: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Short History: Medical Devices & SW

13

! Hospira Infusion Pump Vulnerabilities [Billy Rios and more, 2014-2015]

Photos: Wired

U.S. Food and Drug Administration

Protecting and Promoting Your Health

LifeCare PCA3 and PCA5 Infusion

Pump Systems by Hospira: FDA

Safety Communication - Security

Vulnerabilities

[Posted 05/13/2015]

 

AUDIENCE:Pharmacy, Nursing, Risk Manager, Engineering 

ISSUE: The FDA and Hospira have become aware of security vulnerabilities in Hospira’s LifeCarePCA3 and PCA5 Infusion Pump Systems.  An independent researcher has released informationabout these vulnerabilities, including software codes, which, if exploited, could allow anunauthorized user to interfere with the pump’s functioning. An unauthorized user with maliciousintent could access the pump remotely and modify the dosage it delivers, which could lead toover- or under-infusion of critical therapies. The FDA is not aware of any patient adverse events orunauthorized device access related to these vulnerabilities.

The FDA is actively investigating the situation based on current information and closeengagement with Hospira and the Department of Homeland Security. As new informationbecomes available about patient risks and any additional steps users should take to secure thesedevices, the FDA will communicate publicly.

BACKGROUND: The Hospira LifeCare PCA3 and PCA5 Infusion Pump Systems arecomputerized infusion pumps designed for the continuous delivery of anesthetic or therapeuticdrugs. These systems can be programmed remotely through a health care facility’s Ethernet orwireless network.

RECOMMENDATION: Recommendations for Health Care Facilities:

Follow the recommendations from the Industrial Control Systems Cyber Emergency Response

Page 12: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Short History: Medical Devices & SW

13

! Hospira Infusion Pump Vulnerabilities [Billy Rios and more, 2014-2015]

Photos: Wired

U.S. Food and Drug Administration

Protecting and Promoting Your Health

LifeCare PCA3 and PCA5 Infusion

Pump Systems by Hospira: FDA

Safety Communication - Security

Vulnerabilities

[Posted 05/13/2015]

 

AUDIENCE:Pharmacy, Nursing, Risk Manager, Engineering 

ISSUE: The FDA and Hospira have become aware of security vulnerabilities in Hospira’s LifeCarePCA3 and PCA5 Infusion Pump Systems.  An independent researcher has released informationabout these vulnerabilities, including software codes, which, if exploited, could allow anunauthorized user to interfere with the pump’s functioning. An unauthorized user with maliciousintent could access the pump remotely and modify the dosage it delivers, which could lead toover- or under-infusion of critical therapies. The FDA is not aware of any patient adverse events orunauthorized device access related to these vulnerabilities.

The FDA is actively investigating the situation based on current information and closeengagement with Hospira and the Department of Homeland Security. As new informationbecomes available about patient risks and any additional steps users should take to secure thesedevices, the FDA will communicate publicly.

BACKGROUND: The Hospira LifeCare PCA3 and PCA5 Infusion Pump Systems arecomputerized infusion pumps designed for the continuous delivery of anesthetic or therapeuticdrugs. These systems can be programmed remotely through a health care facility’s Ethernet orwireless network.

RECOMMENDATION: Recommendations for Health Care Facilities:

Follow the recommendations from the Industrial Control Systems Cyber Emergency Response

Page 13: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Short History: Medical Devices & SW

13

! Hospira Infusion Pump Vulnerabilities [Billy Rios and more, 2014-2015]

Photos: Wired

U.S. Food and Drug Administration

Protecting and Promoting Your Health

LifeCare PCA3 and PCA5 Infusion

Pump Systems by Hospira: FDA

Safety Communication - Security

Vulnerabilities

[Posted 05/13/2015]

 

AUDIENCE:Pharmacy, Nursing, Risk Manager, Engineering 

ISSUE: The FDA and Hospira have become aware of security vulnerabilities in Hospira’s LifeCarePCA3 and PCA5 Infusion Pump Systems.  An independent researcher has released informationabout these vulnerabilities, including software codes, which, if exploited, could allow anunauthorized user to interfere with the pump’s functioning. An unauthorized user with maliciousintent could access the pump remotely and modify the dosage it delivers, which could lead toover- or under-infusion of critical therapies. The FDA is not aware of any patient adverse events orunauthorized device access related to these vulnerabilities.

The FDA is actively investigating the situation based on current information and closeengagement with Hospira and the Department of Homeland Security. As new informationbecomes available about patient risks and any additional steps users should take to secure thesedevices, the FDA will communicate publicly.

BACKGROUND: The Hospira LifeCare PCA3 and PCA5 Infusion Pump Systems arecomputerized infusion pumps designed for the continuous delivery of anesthetic or therapeuticdrugs. These systems can be programmed remotely through a health care facility’s Ethernet orwireless network.

RECOMMENDATION: Recommendations for Health Care Facilities:

Follow the recommendations from the Industrial Control Systems Cyber Emergency Response

Root shell on port

23!

Hard-coded local accounts!

Wireless keys stored

unencrypted, accessible via telnet/FTP!

Page 14: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Device Programmer

Implantation of Defibrillator

1. Doctor sets patient info 2. Surgically implants 3. Tests defibrillation 4. Ongoing monitoring

Photos: Medtronic; Video: or-live.com14

Page 15: Interdisciplinary Security: Medical Devices

Privacy??DiagnosisImplanting

physician

Hospital

Also:Device statePatient nameDate of birthMake & modelSerial no.... and more

Page 16: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

! 402-405 MHz MICS band, nominal range several meters ! Command shock sends 35 J in ~1 msec to the T-wave ! Designed to induce ventricular fibrillation ! No RF amplification necessary

16

Wirelessly Induce Fatal Heart Rhythm

[Halperin et al., IEEE Symposium on Security & Privacy 2008]

Page 17: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Hospitals & Malware

[Pho

to:

Med

ical

Rea

l Est

ate

Advi

sors

and

Kev

in F

u]

Page 18: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Secu

rity

Zone

1

Our Border router

Firewall

Fw Router

CONSOLEMGT

LINKTX/RX1000

100

1

0(INT.)

2

3

TX/RXLINK

TX/RXLINK

TRAFFIC

PWR HD TEMP PS FAIL

Secu

rity

Zone

2Se

curit

yZo

ne 3

Internet Connection, there is no filtering of traffic performed at this layer

At the Handoff from the providers border router provides basic filtering of the incoming “noise”

Security Tools System

In-line IPS

Spanneddata

Incoming: Only Our Addressing

Outgoing: No action taken

Incoming: Block non-routing IPS Block ICMP select portsOutgoing: Block outbound various high ports

1 gig hub

Insertion PointCore -A

Insertion PointCore -B

! " Web Servers! " Email Servers! " FTP Servers! " DNS Servers

Protected by firewall only

Secu

rity

Zone

5

Protected by: Firewall IPS

IDS – Passive URL Filter Border rtr ACLs

iBGP Peering router

Secu

rity

Zone

4

CONSOLEMGT

LINKTX/RX1000

100

1

0(INT.)

2

3

TX/RXLINK

TX/RXLINK

TRAFFIC

PWR HD TEMP PS FAIL Border IPS The IPS drops known inbound and outbound malicious traffic

CONSOLEMGT

LINKTX/RX1000

100

1

0(INT.)

2

3

TX/RXLINK

TX/RXLINK

TRAFFIC

PWR HD TEMP PS FAIL

Secu

rity

Zone

6

WAF

General System Counts

Systems with AV…...6398Printers……………...2074Medical equipment...905Misc………………….2460--------------------------------------Total Devices:……..11837

OS Makeup – Medical

Windows 95………..1Windows 98 ……….15Windows 2000……..23Windows CE………..9Windows Vista……...0Windows XP………..600Windows XP SP1…..0Windows XP SP2….15Windows XP SP3…..1--------------------------------------Total……………….. 664

Average Time to Infection

Clinical Systems , 510K, no AV..: 12 daysSystems running AV/Patches…..: 300+ days

Ideally: FDA 510K is updated to include a requirement for the provision of industry accepted security controls for devices utilizing embedded operating systems or other controllers associated with a medical device

Alternatively: The FDA issues a clear statement to the community that FDA 510K is not jeopardized by permitting Anti-Virus or Operating System patching to the supporting systems associated with a certified medical device

Hospitals Stuck With Windows XP

18

[Cou

rtes

y: M

ark

Ols

on, B

IDM

C Bo

ston

]

Last security patch: 2007

Page 19: Interdisciplinary Security: Medical Devices

secure-medicine.org • Prof. Kevin Fu • Archimedes Center for Medical Device Security

Factory-installed malware?

More common than you might think• Vendors with USB drives• Vendors repairing infected machines• Product assembly line

Page 20: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Shoot P0wn Foot w/ Software Update

20

[Pho

to:

Care

Fus

ion,

Nie

ls P

rovo

s]

Page 21: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Shoot P0wn Foot w/ Software Update

20

[Pho

to:

Care

Fus

ion,

Nie

ls P

rovo

s]

Page 22: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Shoot P0wn Foot w/ Software Update

20

[Pho

to:

Care

Fus

ion,

Nie

ls P

rovo

s]

Page 23: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Shoot P0wn Foot w/ Software Update

20

[Pho

to:

Care

Fus

ion,

Nie

ls P

rovo

s]

Page 24: Interdisciplinary Security: Medical Devices

Type to enter text

21

! Health Information Technology (HIT) devices globally rendered unavailable

! Cause: Automated software update went haywire ! Numerous hospitals were affected April 21, 2010

" Rhode Island: a third of the hospitals were forced ``to postpone elective surgeries and stop treating patients without traumas in emergency rooms.”

" Upstate University Hospital in New York: 2,500 of the 6,000 computers were affected.

Cures Worse Than the Disease

Page 25: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Semmelweis to Software Sepsis1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation

23

Dr. Ignaz Semmelweis 1818-1865

Dr. Charles Meigs 1792-1869

Physicians should wash their

hands.

Doctors are gentlemen and

therefore their hands are always clean.

Page 26: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Semmelweis to Software Sepsis1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation

23

Dr. Ignaz Semmelweis 1818-1865

Dr. Charles Meigs 1792-1869

Physicians should wash their

hands.

Doctors are gentlemen and

therefore their hands are always clean.

Medical devices should be

secure.

Doctors are gentlemen and therefore

their computers are always secure.

Page 27: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

←Ways Forward ➚Security shouldbe designed in

not bolted on

Page 28: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Emerging Research:Analog Cybersecurity

Page 29: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Detecting Malware at Power Outlets

26

(a) An Apple advertisement from2009 [6] touts energy-e�ciency gainsthat also happen to reveal keystrokesin power traces.

0

20

40

60

80

100

Pentium 120 MHz Core2 Duo 2.4 GHz Core i5 3.1 GHzMachine

Powe

r (W

)

State

GPU

4 cores

3 cores

2 cores

1 core

idle

(b) An illustration of increasing energy proportionalityfor 3 computers. The oldest computer’s power consump-tion changes very little with resource consumption, butthe newest computer’s power consumption more thandoubles in response to workload changes.

Figure 1.1

of increasing both energy e�ciency and performance for di↵erent workloads. Modern

CPUs and GPUs supporting both clock gating and turbo modes, for example, can

power down one or more processor cores and increase the clock speed on others to

maximize single-threaded performance without violating thermal design power (TDP)

limits.

Both Intel and AMD have also begun to integrate CPUs and GPUs on the same

physical chip in the interest of energy savings. Tighter physical coupling allows de-

signers to use fewer transistors by eliminating redundancies and simplifying data

sharing. AMD even markets their tightly integrated architectures as Application

Processing Units (APUs) [79] rather than CPUs, touting their promise as platforms

for heterogeneous computing frameworks such as OpenCL [41].

While techniques such as DVFS and clock gating are relatively new, the trend

toward greater energy e�ciency extends far into the past. Koomey et al. point

2

Page 30: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Research: WattsUpDoc

27

Page 31: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Now a Product

28

Page 32: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Why do you trust the SENSOR?

Page 33: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Many reports of accidental interference

30

Denis on Lake Michigan“Ghost Talk: Mitigating EMI Signal

Injection Attacks against Analog Sensors” by Foo Kune et al. In Proc. IEEE Symposium on Security and Privacy, 2013.Joint work with Denis Foo Kune (U. Michigan), John Backes (U. Minnesota), Shane Clark (U. Mass Amherst), Dr. Dan Kramer (Beth Israel Deaconess Medical Center), Dr. Matthew Reynolds (Harvard Clinical Research Institute), Yongdae Kim (KAIST), Wenyuan Xu (U. South Carolina)

Page 34: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Many reports of accidental interference

Cellphone +

Oven

New York Times Aug 21 2009

30

Denis on Lake Michigan

Page 35: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Cardiac devices vulnerable to baseband EMI

• Filter high frequency• 800MHz and GHz range: attenuation of up to 40dB

• Can’t filter baseband

P

Q

R

S

TST

SegmentPRSegment

PR Interval

QT Interval

QRS Complex

200 ms

1 mVP"

T"Wave"

Frequency"(Hz)"0" 1" 10" 100" 1"000" 10"000"

0"

10"

100"

2x"

4x"

Signal"amplitu

de"(m

V pAp)"

Sense"am

plificaDo

n"

R"Wave"

P"Wave"

Cohan et al, 200831

Page 36: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Experimental setup: Simulators

32

Synthetic humanSaline bath

Fluoroscope (radiation)

Lead vests

Page 37: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Experimental setup: Devices and emitters

33

Cardiac device

Curved leads

Transmitting antenna

Transmitting antenna

Waveform source and

amplifier

Programmer head over

device

Page 38: Interdisciplinary Security: Medical Devices

Kevin Fu, Intentional Electromagnetic Interference

Results: Waveforms and responses

34

Signal onset

Signal onset

0 0.5 1 1.5 2 2.5−1

−0.5

0

0.5

1

Time (s)

Ampl

itude

0 0.5 1 1.5 2 2.5−1

−0.5

0

0.5

1

Time(s)

Amplitude

Ventricular sense

Ventricular pace

Ventricular sense

Pulsed sinusoid Modulated heart beat

Page 39: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

Z-axis of MEMS gyroscopes

35

! 8 kHz acoustic tone hits resonant frequency of MEMS gyroscope

! Disturbs PID feedback control ! Drone falls from sky

[Son et al., USENIX Security’ 15]

Page 40: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

Sensors: Water Treatment Plant

36

Page 41: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

Sensors: Dams

37

http://www.mpe.ca/project_experience/projects.php?view=28

Page 42: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

Sensors: Oil Pipelines

38

http://www.modcon-systems.com/applications/pipelines/pipeline-scada-security/

Page 43: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

Sensors: BSL-4 Negative Pressure HVAC

39

Page 44: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Analog Cybersecurity?

IAEA sensors for treaty compliance

40

Nuclear inspectors must learn to trust their

colleagues, but during their training they must

learn not to trust others…you never know who might be siphoning off nuclear material to

build a bomb or sell on the black market….

Page 45: Interdisciplinary Security: Medical Devices

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Don’t Trust Your Sensors.

Verify!

Page 46: Interdisciplinary Security: Medical Devices

Type to enter text

spqr.eecs.umich.edu • Prof. Kevin Fu • Medical Device Security

Cybersecurity: A Foreseeable Risk! Biggest risk at the moment:

" Hackers breaking into medical devices " Wide-scale unavailability of patient care " Integrity of medical sensors

! Security can’t be bolted on. " Build it in during manufacturing " Don’t interrupt clinical workflow

! Culture gap " Security specialists often focus on technical controls " Safety specialists often focus on risk management " Trustworthy medical device software requires both

! Emerging research: Analog Cybersecurity " Trust your sensors? Trust, but verify!

42


Recommended