Safety-Focused Security Requirements Elicitation for Medical Device Software

被引:5
|
作者
Lindvall, Mikael [1 ]
Diep, Madeline [1 ]
Klein, Michele [1 ]
Jones, Paul [2 ]
Zhang, Yi [2 ]
Vasserman, Eugene [3 ]
机构
[1] Fraunhofer CESE, College Pk, MD USA
[2] US FDA, Silver Spring, MD USA
[3] Kansas State Univ, Manhattan, KS 66506 USA
关键词
Medical device safety and security; requirements elicitation; sequence based enumeration;
D O I
10.1109/RE.2017.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security attacks on medical devices have been shown to have potential safety concerns. Because of this, stakeholders (device makers, regulators, users, etc.) have increasing interest in enhancing security in medical devices. An effective means to approach this objective is to integrate systematic security requirements elicitation and analysis into the design and evaluation of medical device software. This paper extends the sequence-based enumeration approach, a systematic approach for defining the behavior of embedded software, to analyze the requirement documents of a medical device for the purpose of eliciting security requirements. As a proof of concept, we apply our approach on a concrete case study, which shows that the extended approach is useful for identifying sequences of medical device events that might be harmful to the patient, for example because the events are initiated by an active adversary trying to use the device in a malicious way. We then show how security requirements may be formulated based on the identified threats. By exploring these sequences systematically, the developers can reliably assess what, where, and how the security threats may manifest in their system, what the safety implications are, and finally they can evaluate the resulting requirements and mitigations.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [31] Security Requirements Elicitation from Business Processes
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
  • [32] Users requirements elicitation in the Lyee Software factory
    Rolland, C
    Souveyet, C
    Ayed, MB
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 79 - 84
  • [33] Existing Vulnerability Information in Security Requirements Elicitation
    Amin, Rayhan
    Bhowmik, Tanmay
    2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
  • [34] Design Thinking: Challenges for Software Requirements Elicitation
    Martins, Hugo Ferreira
    de Oliveira Junior, Antonio Carvalho
    Canedo, Edna Dias
    Dias Kosloski, Ricardo Ajax
    Paldes, Roberto Avila
    Oliveira, Edgard Costa
    INFORMATION, 2019, 10 (12)
  • [35] Integration of Software Architecture in Requirements Elicitation for Rapid Software Development
    Gillani, Maryam
    Niaz, Hafiz Adnan
    Ullah, Ata
    IEEE ACCESS, 2022, 10 : 56158 - 56178
  • [36] ENTERPRISE KNOWLEDGE BASED SOFTWARE REQUIREMENTS ELICITATION
    Morkevicius, Aurelijus
    Gudas, Saulius
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 181 - 190
  • [37] Requirements Elicitation Techniques Applied in Software Startups
    Rafiq, Usman
    Bajwa, Sohaib Shahid
    Wang, Xiaofeng
    Lunesu, Ilaria
    2017 43RD EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA), 2017, : 141 - 144
  • [38] Patient Safety-Focused Medication Therapy Management: Challenges Affecting Future Implementation
    Dolor, Rowena J.
    Masica, Andrew L.
    Touchette, Daniel R.
    Smith, Scott R.
    Schumock, Glen T.
    AMERICAN JOURNAL OF MANAGED CARE, 2012, 18 (07): : E238 - E242
  • [39] A review of safety-focused mechanical modeling of commercial lithium-ion batteries
    Zhu, Juner
    Wierzbicki, Tomasz
    Li, Wei
    JOURNAL OF POWER SOURCES, 2018, 378 : 153 - 168
  • [40] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122