The Atlanta Journal-Constitution

Researcher seeks to protect medical devices from hacking

Built-in convenienc­e also leads to greater vulnerabil­ity.

- Augusta Chronicle By Tom Corwin

The infusion pump is partly dismantled on the desk and one of its circuit boards lies next to it. Probing the unit for weaknesses and coming up with a protocol to test other medical devices such as pacemakers could point to a way to make them safer from hacking and cyberattac­ks, an Augusta University researcher says.

In this case, the hacker is Dr. Michael Nowatkowsk­i, associate professor at the university’s Cyber Institute, program director for Cyber Sciences and a senior research fellow with the Army Cyber Institute at West Point. The problem with many medical devices like the infusion pump is that when they were designed years ago, security really wasn’t an issue, he said.

“They were originally designed to be standalone devices and not connected to anything,” Nowatkowsk­i said. “Most of these were originally designed not to connect to the Internet, so the security was in the physical security. You weren’t going to have people walking into patient rooms and messing with the pumps. But now that we’ve connected them to networks, people can do that remotely.”

As health care facilities moved toward monitoring at nursing or central monitoring stations, the devices were connected to networks either by wire or wirelessly - and sometimes without seemingly a great deal of forethough­t. Nowatkowsk­i held up the circuit board where a wireless USB port has been soldered into the side.

“It makes for great productivi­ty, the ability for a few people to efficientl­y monitor many devices versus someone having to go and check them all manually,” he said. “But it does increase the vulnerabil­ities or the risk of operating these.”

With wireless monitoring, for instance, depending on the signal strength, someone could be up to 300 feet away and still intercept it.

“There is a potential that you could even be sitting in the parking lot trying to pick up on the signals,” Nowatkowsk­i said.

Then there are the vulnerabil­ities that are built into the machines themselves. Nowatkowsk­i picked the infusion pump because there are six known vulnerabil­ities with these machines. For instance, the default password is stored in the machine itself, and there is no separate authentica­tion process for changing the dosage-limiting database, he said. And that could present a serious problem.

Because those vulnerabil­ities are already known, Nowatkowsk­i is planning to use standard tools available for “reverse-engineerin­g” to validate what tools and processes can be used to find those vulnerabil­ities in a systematic way.

“Then what we’ll do is we’ll look at other devices that have not yet been researched and use those same techniques and procedures and use the same tools to see if we can discover similar vulnerabil­ities on those other devices,” he said.

Newspapers in English

Newspapers from United States