Welcome
Username or Email:

Password:


Missing Code




[ ]
[ ]
Online
  • Guests: 23
  • Members: 0
  • Newest Member: omjtest
  • Most ever online: 396
    Guests: 396, Members: 0 on 12 Jan : 12:51
Members Birthdays:
All today's birthdays', congrats!
Sync (33)
Grant-ZA (58)
FreakyG (56)
brtaman (38)


Next birthdays
04/22 Sync (33)
04/22 Grant-ZA (58)
04/22 FreakyG (56)
Contact
If you need assistance, please send an email to forum at 4hv dot org. To ensure your email is not marked as spam, please include the phrase "4hv help" in the subject line. You can also find assistance via IRC, at irc.shadowworld.net, room #hvcomm.
Support 4hv.org!
Donate:
4hv.org is hosted on a dedicated server. Unfortunately, this server costs and we rely on the help of site members to keep 4hv.org running. Please consider donating. We will place your name on the thanks list and you'll be helping to keep 4hv.org alive and free for everyone. Members whose names appear in red bold have donated recently. Green bold denotes those who have recently donated to keep the server carbon neutral.


Special Thanks To:
  • Aaron Holmes
  • Aaron Wheeler
  • Adam Horden
  • Alan Scrimgeour
  • Andre
  • Andrew Haynes
  • Anonymous000
  • asabase
  • Austin Weil
  • barney
  • Barry
  • Bert Hickman
  • Bill Kukowski
  • Blitzorn
  • Brandon Paradelas
  • Bruce Bowling
  • BubeeMike
  • Byong Park
  • Cesiumsponge
  • Chris F.
  • Chris Hooper
  • Corey Worthington
  • Derek Woodroffe
  • Dalus
  • Dan Strother
  • Daniel Davis
  • Daniel Uhrenholt
  • datasheetarchive
  • Dave Billington
  • Dave Marshall
  • David F.
  • Dennis Rogers
  • drelectrix
  • Dr. John Gudenas
  • Dr. Spark
  • E.TexasTesla
  • eastvoltresearch
  • Eirik Taylor
  • Erik Dyakov
  • Erlend^SE
  • Finn Hammer
  • Firebug24k
  • GalliumMan
  • Gary Peterson
  • George Slade
  • GhostNull
  • Gordon Mcknight
  • Graham Armitage
  • Grant
  • GreySoul
  • Henry H
  • IamSmooth
  • In memory of Leo Powning
  • Jacob Cash
  • James Howells
  • James Pawson
  • Jeff Greenfield
  • Jeff Thomas
  • Jesse Frost
  • Jim Mitchell
  • jlr134
  • Joe Mastroianni
  • John Forcina
  • John Oberg
  • John Willcutt
  • Jon Newcomb
  • klugesmith
  • Leslie Wright
  • Lutz Hoffman
  • Mads Barnkob
  • Martin King
  • Mats Karlsson
  • Matt Gibson
  • Matthew Guidry
  • mbd
  • Michael D'Angelo
  • Mikkel
  • mileswaldron
  • mister_rf
  • Neil Foster
  • Nick de Smith
  • Nick Soroka
  • nicklenorp
  • Nik
  • Norman Stanley
  • Patrick Coleman
  • Paul Brodie
  • Paul Jordan
  • Paul Montgomery
  • Ped
  • Peter Krogen
  • Peter Terren
  • PhilGood
  • Richard Feldman
  • Robert Bush
  • Royce Bailey
  • Scott Fusare
  • Scott Newman
  • smiffy
  • Stella
  • Steven Busic
  • Steve Conner
  • Steve Jones
  • Steve Ward
  • Sulaiman
  • Thomas Coyle
  • Thomas A. Wallace
  • Thomas W
  • Timo
  • Torch
  • Ulf Jonsson
  • vasil
  • Vaxian
  • vladi mazzilli
  • wastehl
  • Weston
  • William Kim
  • William N.
  • William Stehl
  • Wesley Venis
The aforementioned have contributed financially to the continuing triumph of 4hv.org. They are deserving of my most heartfelt thanks.
Forums
4hv.org :: Forums :: General Chatting
« Previous topic | Next topic »   

Medical implant hacks "could kill hundreds"

1 2 
Move Thread LAN_403
Conundrum
Thu Apr 12 2012, 07:17AM Print
Conundrum Registered Member #96 Joined: Thu Feb 09 2006, 05:37PM
Location: CI, Earth
Posts: 4062
Link2

Potentially serious repercussions if say, a well known pacemaker or insulin implant company had its code database unknowingly stolen by hackers exploiting a zero day flaw, then a few weeks later everyone in a major city with one of these implants drops dead or comatose because some terrorists with an axe to grind decided to pick an easy target.

-A
Back to top
Carbon_Rod
Thu Apr 12 2012, 07:39AM
Carbon_Rod Registered Member #65 Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
The probability a nurse or doctor will kill these people though incorrect treatment is an order of magnitude more likely. Additionally, sedentary overweight people will almost always develop diabetes and other more serious health problems later in life.

This kind of sensationalist news does not offer any constructive insights, but does raise the anxiety level of naive consumers.

The anti-virus placebo-protection/snooping racket must be getting less profitable for the company.
Someone will likely root their anti-virus signing-key system for upsetting their grandma...
Back to top
Steve Conner
Thu Apr 12 2012, 09:41AM
Steve Conner Registered Member #30 Joined: Fri Feb 03 2006, 10:52AM
Location: Glasgow, Scotland
Posts: 6706
I'm much more worried about one of my Tesla coils killing a pacemaker user than any of this insane Conundrum FUD. And that's not very worried.
Back to top
Tetris
Thu Apr 12 2012, 04:15PM
Tetris Registered Member #4016 Joined: Thu Jul 21 2011, 01:52AM
Location: Gainesville, FL
Posts: 660
I can picture that happening one day. Instead of nuking a populous city, a plane flies over a city emmitting multiple frequencies. This would happen during the night, so fewer people would see it. They would disguise it as a normal airline, flying over the city each day. Pretty soon, people with the implants will be dropping dead. Or one could sneak a transmitter into a hotel or casino... god that's pretty scary.
Back to top
Conundrum
Thu Apr 12 2012, 06:09PM
Conundrum Registered Member #96 Joined: Thu Feb 09 2006, 05:37PM
Location: CI, Earth
Posts: 4062
I think the main point of the article was that security on these devices is based on obscurity i.e. using low power and propriety codes.
If you happen to know those codes then the security becomes useless.
As they can't be changed due to the device being implanted and hard coded, there is a possibility that someone could:-
1) DDoS the implants when something needed to be changed.
2) Induce the implant to do something bad like drop its cartridge into the bloodstream.
3) Reprogram the implant to cause a boundary condition if a particular series of events is seen.

3) is the worst case scenario as it is not obvious anything is wrong until the logic bomb goes off.
Such as a trigger date and time.

The really nasty scenario is hacking someone's laptop speaker using software to emit the low frequency interference signal via wave interference.
Possibly a combination of modulating the HDD seek coil and speakers at a particular frequency that duplicates the code.

-A

Back to top
Carbon_Rod
Fri Apr 13 2012, 03:54AM
Carbon_Rod Registered Member #65 Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
1. DDoS doesn't work on most "real" RTOS as guaranteed latency schedulers can't be stack smashed without tripping a WDT recovery mode. Usually, a known "safe state" is set by a ROM program, and it ignores such faulty signals to avoid comm collisions as this is part of FCC compliance.

2. The amount of auditing a piece of medical equipment must endure to pass the right ISO standards is ludicrously extensive. Every aspect of the devices component history is placed under scrutiny, and even the company structure undergoes audits.

3. Assuming the person who built the device knows less about it than some malicious individual.
wink

4. Self-auditing backplane monitoring supervisory safety subsystems are not in most consumer equipment, but they have been around for decades.


Real Security:
Link2



Back to top
Steve Conner
Fri Apr 13 2012, 07:22AM
Steve Conner Registered Member #30 Joined: Fri Feb 03 2006, 10:52AM
Location: Glasgow, Scotland
Posts: 6706
I must admit that I hadn't read the original article properly when I replied. Having read it, I'm not worried about this attack being used in the wild. I'm worried at the depths that security researchers will sink to to get publicity.

It is an interesting point though. There are EMC standards for medical implants that protect them against accidental interference, but there aren't any security standards dealing with deliberate interference. Maybe the implants need sanity check routines along the lines of Asimov's laws of robotics. Or maybe they just need to use a near-field radio link with a really short range.
Back to top
Conundrum
Sat Apr 14 2012, 05:27AM
Conundrum Registered Member #96 Joined: Thu Feb 09 2006, 05:37PM
Location: CI, Earth
Posts: 4062
Interesting indeed.
One wonders if they do an EMC test based on "patterned random noise" like say 3 mobile phones at once.
Say one downloading over 3G, one phone call and the third doing something else like using Bluetooth.

Also another useful test, "How can I break it"... otherwise known as the "throw random spanners at it until something bad happens" test.
Such as a badly adjusted inventory control system operating on the wrong frequency with a loose connection.

Another interesting point, these things are usually shielded but there is always some leakage.
So you could hypothetically detect which pacemaker etc someone has by the clock signals, and determine that they have a given heart condition.
Or you could track an individual using their unique paced heartbeat signal thanks to the RF signals emitted.

This article has implications for anyone doing (gasp!) homemade medical implants.
There are real life "bio-hackers" who build into themselves RFID chips and magnets, the next logical step is for someone to do a cardiac and SpO2 monitor that stores the data internally and charges wirelessly.
Or an implanted EEG for higher stability, such things are feasible.

What you don't want is for people to be building these things with an off the shelf micro, implanting them and then finding a year later that some nasty hackers have found a security hole in the microcode or device itself and can now track them or otherwise interfere with the implant.
Say by making it drain the battery and stop working.


-A
Back to top
Carbon_Rod
Sat Apr 14 2012, 08:30PM
Carbon_Rod Registered Member #65 Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
Again, most devices aren't even capable of generating an RF communication link.

People have died from cellphone batteries, joint replacement implants, and even infections from shaving. One simply can't help people who give themselves Nickel poisoning and risk unknown Neodymium toxicity with implanted magnets.

An amusing observation:
Link2
cheesey
Back to top
Steve Conner
Sun Apr 15 2012, 07:13AM
Steve Conner Registered Member #30 Joined: Fri Feb 03 2006, 10:52AM
Location: Glasgow, Scotland
Posts: 6706
I don't have any experience of medical EMC, just the ordinary commercial and industrial sort. The immunity tests are done with a swept carrier, 80% AM modulated with a 1kHz tone.

The space of possible "random spanners" is so huge that it would take a lifetime of EMC testing to explore, so it's not really a productive way to think about the problem. It should be split into two independent problems:

Ordinary EMC testing to make sure that the receiver still works in the presence of interfering signals.

Algorithm design to make sure that the link degrades gracefully when the receiver is jammed for whatever reason. Error correction, encryption, fail-safe settings and so on.

The medical equipment designers will have done this already (I hope!) and so the attack mentioned in this thread would have to be very specifically targeted at the protocol level. It's a case of impersonating the genuine transmitter, using the same frequency and coding scheme, which is not at all the sort of thing that EMC testing addresses.

Yours truly, a monkey in a suit smile
Back to top
1 2 

Moderator(s): Chris Russell, Noelle, Alex, Tesladownunder, Dave Marshall, Dave Billington, Bjørn, Steve Conner, Wolfram, Kizmo, Mads Barnkob

Go to:

Powered by e107 Forum System
 
Legal Information
This site is powered by e107, which is released under the GNU GPL License. All work on this site, except where otherwise noted, is licensed under a Creative Commons Attribution-ShareAlike 2.5 License. By submitting any information to this site, you agree that anything submitted will be so licensed. Please read our Disclaimer and Policies page for information on your rights and responsibilities regarding this site.