Knock! Knock! Who is there? Investigating data leakage from a medical internet of things hijacking attack

Talon Flynn, George Grispos, William Bradley Glisson, William Mahoney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands of healthcare systems through the remote monitoring of patients. However, there are concerns that the emergence of MIoT ecosystems is introducing an assortment of security and privacy challenges. While previous research has shown that multiple vulnerabilities exist within MIoT devices, minimal research investigates potential data leakage from MIoT devices through hijacking attacks. The research contribution of this paper is twofold. First, it provides a proof of concept that certain MIoT devices and their accompanying smartphone applications are vulnerable to hijacking attacks. Second, it highlights the effectiveness of using digital forensics tools as a lens to identify patient and medical device information on a hijacker's smartphone.

Original languageEnglish (US)
Title of host publicationProceedings of the 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020
EditorsTung X. Bui
PublisherIEEE Computer Society
Pages6456-6465
Number of pages10
ISBN (Electronic)9780998133133
StatePublished - 2020
Event53rd Annual Hawaii International Conference on System Sciences, HICSS 2020 - Maui, United States
Duration: Jan 7 2020Jan 10 2020

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2020-January
ISSN (Print)1530-1605

Conference

Conference53rd Annual Hawaii International Conference on System Sciences, HICSS 2020
Country/TerritoryUnited States
CityMaui
Period1/7/201/10/20

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Knock! Knock! Who is there? Investigating data leakage from a medical internet of things hijacking attack'. Together they form a unique fingerprint.

Cite this