Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack

dc.contributor.authorFlynn, Talon
dc.contributor.authorGrispos, George
dc.contributor.authorGlisson, William Bradley
dc.contributor.authorMahoney, William
dc.date.accessioned2021-09-16T16:45:34Z
dc.date.available2021-09-16T16:45:34Z
dc.date.issued2020-01
dc.descriptionA paper co-authored by William Glisson originally published in Proceedings of the 53rd Hawaii International Conference on System Sciences in 2020.en_US
dc.description.abstractThe amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands of healthcare systems through the remote monitoring of patients. However, there are concerns that the emergence of MIoT ecosystems is introducing an assortment of security and privacy challenges. While previous research has shown that multiple vulnerabilities exist within MIoT devices, minimal research investigates potential data leakage from MIoT devices through hijacking attacks. The research contribution of this paper is twofold. First, it provides a proof of concept that certain MIoT devices and their accompanying smartphone applications are vulnerable to hijacking attacks. Second, it highlights the effectiveness of using digital forensics tools as a lens to identify patient and medical device information on a hijacker’s smartphone.en_US
dc.identifier.citationFlynn, T., Grispos, G., Glisson, W., & Mahoney, W. (2020). Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack. Proceedings of the 53rd Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, p. 6458-6465. https://doi.org/10.24251/hicss.2020.791en_US
dc.identifier.urihttps://hdl.handle.net/20.500.11875/3199
dc.publisherProceedings of the 53rd Hawaii International Conference on System Sciencesen_US
dc.subjectMachine Learning and Cyber Threat Intelligence and Analyticsen_US
dc.subjectcybercrimeen_US
dc.subjectforensicsen_US
dc.subjecthijackingen_US
dc.subjectinternet of thingsen_US
dc.subjectmedicalen_US
dc.subjectsecurityen_US
dc.titleKnock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attacken_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Knock Knock Who is There_OCR.pdf
Size:
552.67 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: