Understanding and Exploiting Implanted Medical Devices

preview_player
Показать описание
This presentation is the culmination of an 18-month independent case study in implanted medical devices. The presenters will provide detailed technical findings on remote exploitation of a pacemaker systems, pacemaker infrastructure, and a neurostimulator system. Exploitation of these vulnerabilities allow for the disruption of therapy as well as the ability to execute shocks to a patient.

By Billy Rios + Jonathan Butts

Рекомендации по теме
Комментарии
Автор

I have some experience with smart utility meters and these medical device manufacturers should take note of how smart meters work. You can send an attention signal to a smart meter that contains the serial number in plain text but beyond that, all radio traffic is encrypted. Each device has a unique key assigned at the time it is programmed for the customer. All this is just to prevent hackers from cheating on their electric bills.

chiraldude
Автор

how come medical hackers never asked me

tippimaravala
Автор

Its sick bc the ppl harrassing come from jealousy and desperate emotional places . Almost every word i speak they reply and are listening and sending vibration to stay on my brain. Its sick . Like ugh God deliverance i pray . They are thinking to get money bc of county debt and im thinking my purpose . They steal and are doing some crazy things . Earth ya know .

SherryEley-jy