Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack

dc.contributor.author Flynn, Talon
dc.contributor.author Grispos, George
dc.contributor.author Glisson, William
dc.contributor.author Mahoney, William
dc.date.accessioned 2020-01-04T08:31:35Z
dc.date.available 2020-01-04T08:31:35Z
dc.date.issued 2020-01-07
dc.description.abstract The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands of healthcare systems through the remote monitoring of patients. However, there are concerns that the emergence of MIoT ecosystems is introducing an assortment of security and privacy challenges. While previous research has shown that multiple vulnerabilities exist within MIoT devices, minimal research investigates potential data leakage from MIoT devices through hijacking attacks. The research contribution of this paper is twofold. First, it provides a proof of concept that certain MIoT devices and their accompanying smartphone applications are vulnerable to hijacking attacks. Second, it highlights the effectiveness of using digital forensics tools as a lens to identify patient and medical device information on a hijacker’s smartphone.
dc.format.extent 10 pages
dc.identifier.doi 10.24251/HICSS.2020.791
dc.identifier.isbn 978-0-9981331-3-3
dc.identifier.uri http://hdl.handle.net/10125/64533
dc.language.iso eng
dc.relation.ispartof Proceedings of the 53rd Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Machine Learning and Cyber Threat Intelligence and Analytics
dc.subject cybercrime
dc.subject forensics
dc.subject hijacking
dc.subject internet of things
dc.subject medical
dc.subject security
dc.title Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack
dc.type Conference Paper
dc.type.dcmi Text
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0638.pdf
Size:
543.11 KB
Format:
Adobe Portable Document Format
Description: