Hodges, BronwynMcdonald, JeffreyGlisson, WilliamJacobs, MikeVan Devender, MaureenPardue, Harold2020-01-042020-01-042020-01-07978-0-9981331-3-3http://hdl.handle.net/10125/64538The escalating integration of network-enabled medical devices raises concerns for both practitioners and academics in terms of introducing new vulnerabilities and attack vectors. This prompts the idea that combining medical device data, security vulnerability enumerations, and attack-modeling data into a single database could enable security analysts to proactively identify potential security weaknesses in medical devices and formulate appropriate mitigation and remediation plans. This study introduces a novel extension to a relational database risk assessment framework by using the open-source tool OVAL to capture device states and compare them to security advisories that warn of threats and vulnerabilities, and where threats and vulnerabilities exist provide mitigation recommendations. The contribution of this research is a proof of concept evaluation that demonstrates the integration of OVAL and CAPEC attack patterns for analysis using a database-driven risk assessment framework.10 pagesengAttribution-NonCommercial-NoDerivatives 4.0 InternationalMachine Learning and Cyber Threat Intelligence and Analyticscyber threatmedical devicesrisk analysisthreat intelligencevulnerabilitiesAttack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical DevicesConference Paper10.24251/HICSS.2020.796