Understanding and Exploiting Implanted Medical Devices

This presentation is the culmination of an 18-month independent case study in implanted medical devices. The presenters will provide detailed technical findings on remote exploitation of a pacemaker systems, pacemaker infrastructure, and a neurostimulator system. Exploitation of these vulnerabilities allow for the disruption of therapy as well as the ability to execute shocks to a patient.
By Billy Rios + Jonathan Butts
Full abstract: www.blackhat.com/us-18/briefi...

Пікірлер: 5

  • @phatpants0917
    @phatpants09175 жыл бұрын

    FCC with the FDA should regulate the standards for medical devices like this. Shame on the manufacturer for not taking the steps necessary to protect the livelihood of their users. Insurance companies stop paying once their patients die.

  • @chiraldude
    @chiraldude5 жыл бұрын

    I have some experience with smart utility meters and these medical device manufacturers should take note of how smart meters work. You can send an attention signal to a smart meter that contains the serial number in plain text but beyond that, all radio traffic is encrypted. Each device has a unique key assigned at the time it is programmed for the customer. All this is just to prevent hackers from cheating on their electric bills.

  • @tippimaravala
    @tippimaravala6 ай бұрын

    how come medical hackers never asked me

  • @user-dt2bt9tc6r
    @user-dt2bt9tc6r Жыл бұрын

    Its sick bc the ppl harrassing come from jealousy and desperate emotional places . Almost every word i speak they reply and are listening and sending vibration to stay on my brain. Its sick . Like ugh God deliverance i pray . They are thinking to get money bc of county debt and im thinking my purpose . They steal and are doing some crazy things . Earth ya know .