Safety-Focused Security Requirements Elicitation for Medical Device Software

被引:5
|
作者
Lindvall, Mikael [1 ]
Diep, Madeline [1 ]
Klein, Michele [1 ]
Jones, Paul [2 ]
Zhang, Yi [2 ]
Vasserman, Eugene [3 ]
机构
[1] Fraunhofer CESE, College Pk, MD USA
[2] US FDA, Silver Spring, MD USA
[3] Kansas State Univ, Manhattan, KS 66506 USA
关键词
Medical device safety and security; requirements elicitation; sequence based enumeration;
D O I
10.1109/RE.2017.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security attacks on medical devices have been shown to have potential safety concerns. Because of this, stakeholders (device makers, regulators, users, etc.) have increasing interest in enhancing security in medical devices. An effective means to approach this objective is to integrate systematic security requirements elicitation and analysis into the design and evaluation of medical device software. This paper extends the sequence-based enumeration approach, a systematic approach for defining the behavior of embedded software, to analyze the requirement documents of a medical device for the purpose of eliciting security requirements. As a proof of concept, we apply our approach on a concrete case study, which shows that the extended approach is useful for identifying sequences of medical device events that might be harmful to the patient, for example because the events are initiated by an active adversary trying to use the device in a malicious way. We then show how security requirements may be formulated based on the identified threats. By exploring these sequences systematically, the developers can reliably assess what, where, and how the security threats may manifest in their system, what the safety implications are, and finally they can evaluate the resulting requirements and mitigations.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [21] REQUIREMENTS FOR PROGRAMMING-LANGUAGES IN SAFETY AND SECURITY SOFTWARE STANDARDS
    WICHMANN, BA
    COMPUTER STANDARDS & INTERFACES, 1992, 14 (5-6) : 433 - 441
  • [22] A Safety-Focused System Architecting Framework for the Conceptual Design of Aircraft Systems
    Jeyaraj, Andrew K.
    Liscouet-Hanke, Susan
    AEROSPACE, 2022, 9 (12)
  • [23] A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling
    ZHU Danjiang
    YAO Shuzhen
    TAN Huobin
    ChineseJournalofElectronics, 2021, 30 (04) : 676 - 685
  • [24] A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling
    ZHU, Danjiang
    YAO, Shuzhen
    TAN, Huobin
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (04) : 676 - 685
  • [25] ELICITATION OF SAFETY REQUIREMENTS FOR PROCESS AUTOMATION
    TOOLA, A
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 1992, 35 (03) : 209 - 215
  • [26] USING ONTOLOGIES FOR DISAMBIGUATION OF SOFTWARE ARTIFACTS IN SOFTWARE REQUIREMENTS ELICITATION
    Gomez Arias, Sebastin Alonso
    Alberto Guzman-Luna, Jaime
    QUID-INVESTIGACION CIENCIA Y TECNOLOGIA, 2014, (22): : 23 - 29
  • [27] Security Requirements Elicitation and Assessment Mechanism (SecREAM)
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
  • [28] Requirements Elicitation and Derivation of Security Policy Templates
    Rudolph, Manuel
    Feth, Denis
    Doerr, Joerg
    Spilker, Joerg
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
  • [29] Requirements elicitation for software-based systems
    Brereton, P
    Budgen, D
    Nwana, H
    SOFTWARE ENGINEERING JOURNAL, 1996, 11 (03): : 148 - 148
  • [30] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781