IDR @ IIT Bhubaneswar

Permanent URI for this communityhttps://idr.iitbbs.ac.in/handle/2008/1

Browse

Search Results

Now showing 1 - 10 of 2582
  • Thumbnail Image
    Item
    Annual Report 2016-17
    (IIT Bhubaneswar, 2017) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2015-16
    (IIT Bhubaneswar, 2016) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2014-15
    (IIT Bhubaneswar, 2015) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2013-14
    (IIT Bhubaneswar, 2014) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2012-13
    (IIT Bhubaneswar, 2013) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2011-12
    (IIT Bhubaneswar, 2012) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2010-11
    (IIT Bhubaeswar, 2011) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2009-10
    (IIT Bhubaneswar, 2010) IIT Bhubaneswar
  • Thumbnail Image
    Item
    Annual Report 2008-09
    (IIT Bhubaneswar, 2009) IIT Bhubaneswar
  • Item
    Securing implantable medical devices with runtime enforcement hardware
    (2019) Pearce H.; Kuo M.M.Y.; Roop P.S.; Pinisetty S.
    In recent years we have seen numerous proof-of-concept attacks on implantable medical devices such as pacemakers. Attackers aim to breach the strict operational constraints that these devices operate within, with the end-goal of compromising patient safety and health. Most efforts to prevent these kinds of attacks are informal, and focus on application- and system-level security-for instance, using encrypted communications and digital certificates for program verification. However, these approaches will struggle to prevent all classes of attacks. Runtime verification has been proposed as a formal methodology for monitoring the status of implantable medical devices. Here, if an attack is detected a warning is generated. This leaves open the risk that the attack can succeed before intervention can occur. In this paper, we propose a runtime-enforcement based approach for ensuring patient security. Custom hardware is constructed for individual patients to ensure a safe minimum quality of service at all times. To ensure correctness we formally verify the hardware using a model-checker. We present our approach through a pacemaker case study and demonstrate that it incurs minimal overhead in terms of execution time and power consumption. � 2019 Association for Computing Machinery.