Search


  • Categories


  • Archives

    « Home

    Science Codex: UMass Amherst, Harvard experts say better systems needed for medical device cybersecurity

    Science Codex reports on new research that finds better systems are needed to protect the privacy and security of data in medical devices:

    AMHERST, Mass. – Medical devices save countless lives, and increasingly functions such as data storage and wireless communication allow for individualized patient care and other advances. But after their recent study, an interdisciplinary team of medical researchers and computer scientists warn that federal regulators need to improve how they track security and privacy problems in medical devices.

    Researchers from Beth Israel Deaconess Medical Center Harvard Medical School and the University of Massachusetts Amherst analyzed reports from decades of U.S. Food and Drug Administration’s (FDA) databases and found that established mechanisms for evaluating device safety may not be suitable for security and privacy problems. The researchers, members of the Strategic Healthcare IT Advanced Research Projects on Security (SHARPS), report results in the current issue of the PLoS ONE journal. […]

    Computer scientist and medical device security expert Kevin Fu at UMass Amherst and electrophysiologist Daniel Kramer at Harvard recommend that federal surveillance strategies should “rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware,” to improve detection of problems that could affect millions of patients who use such devices for treatment from heart disease to diabetes.

    Fu says that increasingly, wireless communication and Internet connectivity are used to control devices and transmit patients’ information. But little is known about the prevalence of risks. Kramer, Fu and their colleagues set out to evaluate product recalls and adverse event reports in three comprehensive, publicly available databases maintained by the FDA: its own weekly enforcement reports of device recalls, its database of Medical and Radiation Emitting Device Recalls (MREDR) and the Manufacturer and User Facility Device Experience (MAUDE) database.

    They did not find recalls or adverse events directly linked to security or privacy problems, despite a high prevalence of recalls related to software, plus fewer recalls related to patient data storage or wireless communication. While the lack of glaring security or privacy concerns through this search strategy may be reassuring, the authors also conclude that the current classification methods in these databases are not well suited to emerging types of device malfunctions.

    Indeed, to test the effectiveness of the FDA’s adverse event reporting mechanism for security and privacy problems, one co-author also submitted a software vulnerability report for an automated external defibrillator in July 2011. Nine months later, it was processed and made public. “As the time from discovery of a conventional computer security vulnerability to global exploitation of a flaw is often measured in hours, a nine-month processing delay may not be an effective strategy for ensuring the security of software-based medical devices,” Fu and colleagues point out. […]

    The fundamental problem is vulnerabilities in medical devices, not the FDA’s slow handling of them, adds Carl Gunter at the University of Illinois at Urbana-Champaign and director of the SHARPS group. “Of course, in an ideal world, devices would be free of security and privacy vulnerabilities, so it wouldn’t matter if the announcement process is slow. But the technical obstacles are significant and FDA surveillance will be a key line of defense. The authors have done an important service pointing out the need to improve that system.”

    Leave a Reply