-
♪ preroll music ♪
-
Angel: The next talk will start now
-
and will be 'Unpatchable -
-
living with a vulnerable
implanted device'
-
by Dr. Marie Moe and Eireann Leverett.
-
Give them a warm round
of applause please.
-
applause
-
heart monitor beep sounds start
-
So, we are here today
-
to talk to you about a subject
-
that is really close to my heart.
-
I have a medical implant.
-
A pacemaker, that is generating
-
every single beat of my heart.
-
But how can I trust my own heart,
-
when it's being controlled by a machine,
-
running a proprietary code,
-
and there is no transparency?
-
So I'm a patient,
-
but I'm also a security researcher.
-
I'm a hacker, because I like
-
to figure out how things work.
-
That's why I started a project
-
on breaking my own heart,
-
together with Eireann
-
and a couple of friends.
-
Because I really want to know
-
what protocols are running
-
in this machine inside my body.
-
Is the crypto correctly implemented?
-
Does it even have crypto?
-
So I'm here to inspire you today.
-
I want more people
to hack to save lives.
-
Because we are all becoming
-
more and more dependent on machines.
-
Maybe some of you in the audience
-
also have medical implants,
-
maybe you know someone
-
that's also depending on
medical implants
-
Imagine that this is your heartbeat
-
and it's being controlled by a device.
-
A device, that might fail.
-
Due to software bugs,
-
due to hardware failures.
-
additional background sound:
real heartbeat
-
Wouldn't you also like to know
-
if it has security vulnerabilities?
-
If it can be trusted?
-
sounds stop
beeeeep
-
E: Something to think about, right?
-
M: Yeah.
-
E: Marie is an incredibly
brave women.
-
When she asked me to give this talk
-
it made me nervous, right?
-
It's such a personal story.
-
Such a journey as well.
-
And she's gonna talk to you
-
about a lot of things, right?
-
Not just hacking medical devices
-
from a safety point of view
-
but also some of the
privacy concerns,
-
some of the transparency concerns,
-
some of the consent concerns.
-
So, there's a lot to get trough
-
in the next hour.
-
But I think you're gonna enjoy it
-
quite a lot.
-
M: So, let me tell you
-
the story about my heart.
-
So, 4 years ago
-
I got my medical implant.
-
It was a kind of emergency situation
-
because my heart was starting to beat
-
really slow,
-
so i needed to have the pacemaker.
-
I had no choice.
-
After I got the implant,
-
since I was a security researcher,
-
of course I started to
-
look up information about how it worked.
-
And I googled for information.
-
I found a technical manual
-
of my pacemaker
-
and I started to read it.
-
And i was quite surprised
-
when I learned that
-
my pacemaker has 2 wireless interfaces.
-
There is one interface, that is really
-
close field communication,
-
near field communication
-
that is being used when I'm at checkups
-
at the hospital,
-
where the technician,
-
the pacemaker technician or doctor
-
uses a programming device
-
and places it
-
really close to my pacemaker.
-
And it's possible to use that
-
communication to adjust the settings.
-
But it also has another
-
wireless interface,
-
that I was not aware of,
-
that I was not informed of
as a patient.
-
It has a possibility for remote monitoring
-
or telemetry,
-
where you can have an
access point in your house
-
that will communicate
-
with the pacemaker
-
at a couple of meters distance.
-
And it can collect logs from the pacemaker
-
and send them to a server
-
at the vendor.
-
And there is a web interface
-
where the doctor can log in
-
and retrieve my information.
-
And I have no access the data
-
that is being collected
-
by my device.
-
E: So imagine for a moment
-
that you are buying a new phone
-
or buying a new laptop.
-
You would do your homework, right?
-
You would understand
what interfaces where there.
-
But in Marie's case she's just
-
given a device,
and then later she gets
-
to go and read the manual, right?
-
So she's the epitome
of a informed consumer
-
in this space
-
and we want a lot more
informed consumers
-
in this space,
-
which is why we are giving this talk.
-
Now, I don't know about you,
-
but I'm used to hacking
-
industrial systems.
-
I haven't done as
much medical research
-
in the past.
-
So, when I first
started this project
-
I knew literally nothing
-
about Marie's heart.
-
Or even my own.
-
And she had to teach me
how the heart works
-
and how her pacemaker works.
-
So, would you mind explaining
-
some details to the audience
that will be relevant
-
through the rest of the presentation?
-
M: Actually I think
we're going to show you
-
a video of
how the heart works.
-
So, it's a little bit of
biology introduction here
-
before we start
with the technical details.
-
So, this.. play the video.
-
Video: A normal heart beat rate
-
and rhythm is called
'Normal Sinus Rhythm'.
-
The heart's pumping action
-
is driven by electrical stimulation
-
within the heart muscle.
-
the heart's electrical system
-
allows it to beat in an
-
organized, synchronized pattern.
-
Every normal heart beat
-
has 4 steps.
-
Step 1:
-
As blood flows into the heart
-
an electrical impulse
-
from an upper area of the right atrium
-
also known as the sinus node
-
causes the atria to contract.
-
When the atria contract
-
they squeeze the blood
-
into the ventricles.
-
Step 3:
-
There is a very short pause
-
only about a fraction of a second.
-
and Step 4:
-
The ventricles contract
-
pumping the blood to the body.
-
A heart normally beats
-
between 60-100 times/min.
-
Electrical signals in your heart
-
can become blocked or irregular,
-
causing a disruption
-
in your hearts normal rhythm.
-
When the heart's rhythm is too fast,
-
too slow or out of order,
-
an arrhythmia,
-
also called a rhythm disorder occurs.
-
When your heart beats out of rhythm,
-
it may not deliver enough blood
-
to your body.
-
Rhythm disorders can be caused
-
by a number of factors
-
including disease, heredity,
-
medications or other factors.
-
E: So for those of you
who are already aware of that,
-
apologies.
-
But I needed to learn that.
-
I needed to learn the basics
-
before we even got started, right?
-
So...
-
M: So this is a diagram of the
-
electrical system of the heart.
-
So, as you see,
this is the sinus node
-
that is generating the pulse.
-
And in my case
-
I had a problem with the signal
-
being generated by the sinus node
-
not reaching the lower
heart chamber.
-
It's something called an AV block
or a heart block
-
So, occasionally this will cause
-
an arrhythmia that makes
the heart pause.
-
If you don't have a heart beat
-
for, like ... 8-10 seconds,
-
you lose your consciousness.
-
And that was, what happened to me.
-
I just suddenly found myself
-
lying on the floor
-
and I didn't remember how I got there.
-
And it turned out that it was my heart
-
that had taken a break.
-
So that's how I discovered
-
that I had this issue.
-
So, this is where the signal is blocked
-
on the way down to the lower heart chamber
-
But there's a backup function
-
in the heart that can make
-
a so called backup pulse.
-
And I had that backup pulse
-
when I went to the
emergency room.
-
So I had a pulse
around 30-40 beats/min.
-
And that's generated by some cells
-
in the lower heart chamber.
-
So, after I got the pacemaker
-
my heart started to become
-
a little bit more lazy.
-
So it is not certain,
-
that I will have this backup pulse
-
anymore if the pacemaker
stops working.
-
So currently
-
my heart is 100% running
on the pacemaker.
-
So, let's also look at
how the pacemaker works.
-
I have another video of that.
-
So, this is my little friend
-
that is running my heart.
-
Video: A pacemaker
is a miniaturized computer
-
that is used to treat
a slow heart beat.
-
It is about the size
-
of a couple of stacked silver dollars
-
and weights approximately 17-25 grams.
-
It is usually surgically placed
-
or implanted just under the skin
-
in the chest area.
-
The device sends
a tiny electrical pulse
-
down a thin coated wire,
-
called a lead, into your heart.
-
This stimulates the heart to beat.
-
This impulses are very tiny
-
and most people
do not feel them.
-
While the device
helps your heart
-
maintain its rhythm,
-
it also stores information
-
about your heart that can be
-
retrieved by your doctor
-
to program the device.
-
E: Remember that!
-
M: Yeah... Did you see
-
the ones and zeros at the end
-
of the video?
-
That's what we want
to know more about.
-
Because this information
-
that is being collected
by the pacemaker,
-
how it works,
-
how the code looks like,
-
it's all closed source,
-
it's all proprietary information.
-
And that's why we need more
-
security researchers,
-
we need more 3rd party testing,
-
to be sure that we can trust this code.
-
E: And you can imagine that
-
we're doing some of
this research as well.
-
But I'm not gonna break
Marie's heart on stage,
-
I'm not gonna drop 0-day
-
on some medical devices,
-
so if you came for that,
-
it's not worth staying.
-
The rest of the presentation
-
will be about some of
the things we found
-
and how this works and
-
how you might approach this research.
-
And some of the people
who did this research before,
-
because there's plenty of others,
-
and we like to give a shout-out
-
to those who've done
great research in advance.
-
But essentially this point is
-
very relevant.
-
That the internet
of medical things
-
is already here.
-
And Marie is wired into it.
-
She's a bit younger than the average
-
pacemaker patient, but, you know,
-
she was thrust into this situation
-
where she had to think about things
-
in a very different way.
-
Like, you did a Masters,
breaking crypto,
-
and also a PHD in Information Security.
-
Did you imagine, that
things you learned
-
about SSH and
network security
-
might one day apply to your
heart and your own body?
-
M: No, I never
figured out that
-
my research would eventually
end up inside my own body.
-
That's something I never
thought about.
-
And also, there's a lot of
-
people that don't think about
-
how the medical devices
actually work.
-
So, when I asked this question
-
to health care professionals
-
they look at me like I'm crazy,
-
they don't ... they have never
thought about this before.
-
That there's actually code
inside my body
-
and someone has
programmed it,
-
someone has
written this code.
-
And, did they think
about, that this
-
would actually control
someone's life,
-
and be my own personal
critical infrastructure?
-
E: Yeah, personal
infrastructure, right?
-
On a physical level.
-
And also, I think, it's...
-
You know, the point that you made
is important to reiterate,
-
that you go and see your doctor
-
and you ask these questions about
-
whether anyone can hack into my heart
-
and they probably look
at you and go like
-
'Don't you worry your pretty
little head about that', right?
-
But Marie used to head up
-
the Norwegian computer
emergency response team
-
for a couple of years
-
and knows a lot of hackers
-
and knows what she's
talking about, right?
-
So, when she asked her doctor
these questions,
-
they're very legitimate questions.
-
And the doctors probably
don't know anything about code,
-
but they need to move
towards a place
-
where they can answer
those questions with some
-
honesty and certainty and
treat them with the dignity
-
that they deserve.
-
Should we show them
a little bit more
-
about the total ecosystem
of devices
-
that we are talking about,
at least in this particular talk?
-
M: Yeah.
-
E: So, this was
all new to me.
-
I mean I've moved around
in networks and done some
-
penetration testing and
some stuff in the past,
-
but I didn't know much about
implantable medical devices.
-
So, we've got a couple
of them there.
-
The ICD, which is the
in-cardio-defibrillator,
-
that's some of the work
that you saw from Barnaby Jack
-
which we will mention later,
-
was on those particular devices,
-
We've got the pacemakers
and of course other devices
-
could be in this diagram as well.
-
Like, we could be talking
about insulin pumps
-
or other things in the future.
-
The device itself speaks
to box number 2,
-
which we will tell you a little bit
more about in a moment,
-
using a protocol, commonly
referred to as 'MICS'.
-
A number of different
devices use this
-
Medical Implant
Communication Service.
-
And Marie shocked me yesterday
-
when she found
a couple devices
-
that potentially use Bluetooth. sighing
laughter
-
So, would you like to tell them
a little bit more about the access point,
-
and I'll join in?
-
M: Yeah, so, the access
point is the device
-
that you can typically have
on your bed stand
-
and that will, depending
on your configuration,
-
contact your pacemaker
as regular intervals,
-
e.g. once during the night.
-
It will start a communication
with the pacemaker,
-
couple of meters distance,
-
and will start
collecting logs.
-
And this logs will
then be sent,
-
it can be via SMS
or other means,
-
to a server.
-
So, there's a lot of my
personal information
-
that can end up different
places in this diagram.
-
So, of course it's
in my own device,
-
it will be then communicated
via this access point
-
and also then
-
via the cellular network.
-
And then it will also be stored
in the telemetry server.
-
Potentially when I go
for the checkups
-
my personal information will
also end up in my
-
doctor workstation
-
or in the electronic
patient records.
-
And there's a lot of things
that can go wrong there.
-
E: Yeah, you
can see, it's using
-
famously secure methods
of communication
-
that have never been backdoored or
compromised by anyone ever before,
-
even here at this conference,
probably even this time around.
-
So these are some things
that are concerning.
-
The data also travels often
to other countries
-
and so there are questions
about the jurisdiction
-
in terms of privacy laws
in terms of some of this data.
-
And some of you can go and
look deeper into that as well.
-
The telemetry store thing
I think is important,
-
some of this is a telemetry store,
such as the server at the vendor.
-
So the vendor owns some
machines somewhere
-
that collect data
from Marie's heart.
-
So you can imagine she goes to see her
doctor and the doctor is like:
-
'Hey, Marie, last weekend, did you, ...
run a half marathon or something?'
-
And she hasn't told him, right?
-
Like, he just can look
at the data and see,
-
that her heart rate was up
for a couple hours.
-
That's true though, right? You
did actually run a half marathon.
-
M: Yeah, I did run a half marathon.
laughing
-
E: So, the telemetry
store is one part,
-
but there's also the
doctors work station
-
which contains a lot of
this medical data.
-
So, from privacy perspective
that's part of the attack surface.
-
But there's also the programmers, right?
-
There's the device's programmers.
-
So that's an interesting point, that
I hope a lot of you are interested in
-
already, that there
is a programmer
-
for these devices.
-
M: So, we actually
went shopping on eBay
-
and we found some
of these devices.
-
E: You can buy them on eBay?
-
M: Yeah.
E: laughing
-
M: So, I found
a programmer
-
that can program
my device, on eBay
-
and I bought it.
-
And I also found a couple of
these access points.
-
So, that's what we're
now starting to look at.
-
E: We just wanna to give
you an overview of this system,
-
and it's fairly similar across the
different device vendors,
-
and we're not going to talk
about individual vendors.
-
But if you're gonna go and
do this kind of research
-
you can see that some of the research
you've already done in the past
-
applies to different parts
of this process.
-
M: And talking about
patient privacy,
-
when we got the
programmer from ebay
-
it actually contained
patient information.
-
So, that's the
really bad thing.
-
E: So, I found
this very odd.
-
I had a similar reaction
to yourselves because
-
I usually do industrial
system stuff.
-
One of my friends picked up
some PLCs recently and
-
they had data from the nuclear plant,
that the PLCs had been used in.
-
So, decommissioning is a problem
in industrial systems
-
but it turns out also
in medical devices, right?
-
I guess that's a useful point
to make as well,
-
about the costs of doing
this kind of research.
-
It is possible to get some
devices, some implants
-
from people who have sadly
passed on,
-
but that comes with a very high
cost of biomedical decontamination.
-
So that raises the cost
of doing this research
-
on the implants themselves,
not necessarily on the rest
-
of the devices.
-
M: Yeah, so, also want
to say, that in this research
-
I had not have not tinkered
with my own device.
-
So, that would not be a good thing ...
-
E: You're not gonna let me,
like, SSH into your heart and just ...
-
M: Um.. No.
E: ... just delete some stuff.. No?
-
M: No.
E: I wouldn't do it anyway,
-
but it's an interesting point, right?
-
So, like, there are a lot of
safety percussions
-
that we and the rest
of the team have to take
-
when we are doing this research.
-
And one of them is
not pairing Marie's pacemaker
-
with any of the devices
that are under test.
-
Do you wanna say a bit more
about connectivity and vulnerability?
-
M: Yeah, so...
-
I was worried
when I discovered that
-
I had this possible connectivity
to the medical internet of things.
-
In my case this is switched off
in the configurations
-
but it's there.
-
It's possible to turn it on,
it's possible for me to be
-
hooked up to the,
this internet of medical things.
-
And for some patients
this is really benefit.
-
So you always have to make
a risk-based decision
-
on whether or not to
make use of this
-
connectivity.
-
But I think it's really important
that you make an informed decision
-
about that and that the patient
-
is informed and has given
his or her consent
-
to have this feature.
-
The battery lifetime of my pacemaker
is around 10 years.
-
So in 6 years time
-
I will have to have a
replacement surgery
-
and I'm going to be
a really difficult patient laughing
-
laughter
-
So, ...
applause
-
E: Right on.
-
M: I really want to know
-
how the devices work
by then and
-
I want to make an informed
decision on whether or not
-
to have this connectivity.
-
But of course for lot of patients
the benefit of having this
-
outweighs the risk.
-
Because people that had other
heart problems than me
-
they have to go for more
frequent checkups.
-
I only have to go once a year.
-
So, for patients that need to go
frequently for checkups,
-
it's really good for them
to have the possibility
-
of having telemetry and
having connectivity to
-
have remote patient monitoring.
-
E: Yeah, imagine you
have mobility problems or
-
you even just live far
-
from a major city.
-
And making the journey
to the hospital is quite arduous,
-
then this kind of remote
telemetry allows your doctor
-
to keep track of
what's going on.
-
And that's very important,
we don't wanna, like...
-
have a big scary testosterone
filled talk where we, like,
-
hack some pacemakers.
-
We wanna talk about
how there's a dual use thing
-
going on here.
-
And that there is a lot of value
in having this devices
-
but we also want them to be safe
and secure and preserve our privacy
-
and a lot of other things.
-
So, these are some
of the issues.
-
Of course the last one,
the remote assassination scenario,
-
that' s everyone favorite one
to fantasize about
-
or talk about, or make
movies about, but
-
we think there's a lot of
other issues in here
-
that are more interesting,
-
some quality issues even, right,
-
that we'll talk about
in a little bit.
-
Battery exhaustion,
-
again something many people
don't think about. But...
-
I'm very interested in
cyber-physical exploitation
-
and so some of this elements
were interesting to me
-
that you might use the device
in a way that wasn't expected.
-
M: So personally I'm not afraid
of being remotely assassinated.
-
E: I've actually never known
you to be afraid of anything
-
M: laughing
-
I'm more worried about
software bugs in my device,
-
the things that can malfunction,
-
E: Is that just theoretical?
-
M: No, actually software bugs
-
have killed people.
-
So, think about that!
-
People that are not here,
-
they don't have their voice
and they can't really
-
give there story.
-
But there are stories about persons
depending on medical devices
-
dying because their
device malfunctioned.
-
E: There's even some
great research
-
from academics about
how the user interface design
-
of medical devices can have
an impact on patients safety
-
and how designing UX
-
much more clearly
and concisely
-
specifically for the
medical profession
-
might improve
the care of patients.
-
Do you wanna say more
about this slide or should we
-
go on to the previous work,
should we... go ahead!
-
M: Yeah, I think it's really
important also to...
-
the issue of trusting the vendors.
-
So, as a patient I'm
expected to just, you know,
-
trust, that my device
is working correctly,
-
every security vulnerability
has been corrected by the vendor
-
and it's safe.
-
But I want to have more
third party testing,
-
I want to have more security
research on medical implants.
-
And as a lot things, like ...
history has shown
-
we can't always trust that
the vendors do the right thing.
-
E: I think this is a good
opportunity for us to ask
-
a very fun question, which is:
-
Any fans of DMCA in the room?
-
laughter
-
No? No fans? Alright.
-
Well, you then you'll really enjoy this.
-
Marie has some very exciting news
about DMCA exemptions.
-
M: Yeah, so... October, this year
-
there was a ruling of
an DMCA exemption for
-
security research
on medical devices
-
also for automotive security research.
-
So, this means, that
-
as researchers you can
-
actually do reverse engineering
of medical implants
-
without infringing copyright laws.
-
It will take effect
I think October next year.
-
E: Yeah.
M: That is really a big
-
step forward in my opinion.
-
And I hope that this will
encourage more research.
-
And I also want to mention
that there are
-
fellow activist patients
like myself
-
that was behind that proposal
of having this exemptions.
-
So, Jay Radcliff who hacked
his own insulin pump,
-
Karen Sandler, who is a free and
open software advocat.
-
And Hugo Campos, who has
an ICD implant, he is very ...
-
he wants to have access
to his own data
-
for quantified self reasons.
-
So this patients,
they actually
-
made this happen,
that you're allowed to do
-
security research
on medical devices.
-
I think that's really great.
-
applause
-
E: Do you wanna say something
about Scott Erven's presentation
-
that you saw at DEF CON?
-
M: Yeah, that was a really
interesting presentation about
-
how medical devices have
really poor security.
-
And they have, like,
hard coded credentials,
-
and you can find them
using Shodan on the internet.
-
This were not pacemakers,
but other types of
-
different medical devices.
-
There are, like, hospital networks
that are completely open
-
and you can access
the medical equipment
-
using default passwords that
you can find in the manuals.
-
And the vendors claim that
-
no, these are not hard coded,
these are default,
-
but then the manuals say:
Do not change this password...
-
E: Because they want to
integrate with other stuff, right? So...
-
I've heard that excuse from SCADA,
so I wasn't having it.
-
M: They also put up some
medical device honeypots
-
to see if there were
targeted hacking attempts
-
but they only picked up regular malware
on them, which is also ...
-
E: Only!
M: ... of course of a concern laughing
-
E: Anything else,
about prior art, Kevin?
-
M: I guess we should mention
that the academic research
-
on hacking pacemakers,
which was started by
-
a group led by Kevin Fu
-
and they had this
first paper in 2008
-
that they also followed up
with more academic research
-
and they showed that it's
possible to hack a pacemaker.
-
They showed that...
this was possible on a, like
-
a couple of centimeters
distance only,
-
so, like, the attack scenario
would be, if you have a
-
device similar to the
programmers device
-
and you attack me with it
you can laughing
-
turn off my pacemaker.
-
That's not really scary,
-
but then we have the research
by Barnaby Jack
-
where this range of the attack
is extended to several meters
-
so you have someone with
an antenna in a room
-
scanning for pacemakers
-
and starting to program them.
-
E: We have a saying
at Cambridge about that.
-
Some of the other people at the
university have been doing attacks
-
a lot longer than I have, and
one of the things they say is:
-
'Attacks only get worse,
they never get better.'
-
So, the range might be short one year,
then a couple of years later it's worse.
-
M: The worst case scenario
I think would be remotely,
-
via the internet being able to
hack pacemakers.
-
but there's no research so far
indicating that that's possible.
-
E: And we don't wanna
hype that up. We don't wanna...
-
M: No.
E: ... get that kind of an angle
-
on this talk. We wanna make the
point that hacking can save lives,
-
that hackers are global citizen's
resource to save lives, right? So...
-
M: Yeah, so, this is the result
of hacking of the drug infusion pumps.
-
Earlier this year
-
the FDA actually issued the first ever
recall of a medical device
-
based on cyber security concerns.
-
E: I think that's amazing, right?
They've recalled products
-
because of cyber security concerns. They
used to have to wait until someone died.
-
In fact, they had to show
something like 500 deaths
-
before you could recall a product.
So now they can ...
-
the FDA, at least in the US,
they can recall products
-
just based on security
considerations.
-
M: So, this is also,
-
I guess the first example
of that type of pro-active
-
security research,
where you can
-
make a proof of concept
without killing any patients
-
and then that closes
the security holes.
-
And that potentially
saves lives.
-
And no one has been hurt
in the research.
-
I think that's great.
-
E: I'm also really excited
because we give a lot of presentations
-
about security that are filled with
doom and gloom and depression,
-
so it's nice to have two major victories
in medical device research
-
in the last few years.
One being the DMCA exemptions
-
and the other being
actual product recalls.
-
M: Yeah, and the FDA are starting
to take these issues seriously and
-
they are really focusing on the cyber
security of medical implants now.
-
I'm going to go to a workshop
arranged by the FDA in January
-
and participate on a panel discussing
cyber security of medical implants.
-
And it's great to have this
type of interaction between
-
the security committee, medical
device vendors and the regulators.
-
So, things are happening.
-
E: Yeah. How do you feel
as an audience,
-
are you glad that she's going to be
your representative in Washington
-
for some of these issues?
-
applause
-
And we want you to get
involved as well, right?
-
This is not just about Marie
and myself and the other people
-
who worked on this
project, it's meant say
-
you too can do this research.
And you should be.
-
You have to be a little sensitive,
a little bit precise and articulate
-
about concerns.
-
We take some inspiration from the
former research around hygiene.
-
Imagine the first time some scientist
went to some other scientist and said
-
'There is this invisible stuff,
and it's on your hands,
-
and if you don't wash your hands
people get infections!'
-
And everyone thought
they were crazy.
-
Well, it's kind of the same with us
talking about industrial systems
-
or talking about medical devices
or talking about hacking in general.
-
People just didn't, sort of,
believe it was possible at first.
-
And so we have to articulate ourselves
very, very carefully.
-
So, we draw inspiration from
that early hygiene movement
-
where they had a couple simple rules
that started to save people's lives
-
while they explained germ theory
to the masses.
-
M: Yeah, so, this type of research
is kind of low hanging fruits
-
where you just, so...
-
what we show here is an example,
-
where there's a lot of medical
device networks in hospitals
-
that are open to the internet
and that can get infected
-
by normal type of malware,
like banking trojans or whatever.
-
And this is potentially a safety issue.
-
So, if your MR scanner or some other
-
more life-critical device
is being unavailable because of
-
a virus on it,
-
that's a real concern for patient
security and safety.
-
So we need to think more about
the hygiene also in terms of
-
computer viruses, not only
just normal viruses.
-
E: Yeah. So, you know, some
times people will treat you like
-
this is an entirely theoretical
concern, but
-
I think this is one of the best
illustrations that we've found
-
of how that should
be a concern,
-
and I think all of you will get it,
-
but I wanna give you a moment to kind of
read what's about to come up on the slides.
-
So I'll just let you enjoy
that for a moment.
-
So if it's not clear or it's not your
first language or something,
-
this guy basically sharded patient data
across a bunch of amazon clusters.
-
And then it was unavailable.
And they were very concerned
-
about the unavailability of their
costumer patient data
-
sharded across amazon instances.
-
He was complaining to support, like
'Can I get support to fix this?' laughing
-
M: So, all the data of the ...
-
... the monitoring data of the cardiac
patients is unavailable to them
-
because of the service
being downed.
-
And, well, do you want to outsource your
patient's safety to the cloud? Really?
-
I don't want that.
Okay.
-
E: I wanna get into some other details.
We have sort of 10 min left if we can ...
-
so we can have a lot of questions,
and I'm sure there will be some.
-
But I want you to talk to them about
this very personal story.
-
This is... Remember before, when we
said, is this stuff theoretical?
-
I want you to pay a lot of
attention to this story.
-
It really moved me
when she first told me.
-
M: I know how it feels to have
my body controlled by a device
-
that is not working correctly.
-
So, I think it was around 2 or 3
weeks after I had the surgery.
-
I felt fine.
-
But I hadn't really done
any exercise yet.
-
The surgery was pretty easy,
I only had 2 weeks sick leave
-
and then I came back to work
-
and I went to London
-
to participate in a course
in ethical hacking and
-
I did take the London Underground
together with some of my colleges
-
and we went of at this station
at Covent Garden
-
And I don't know if you
have been there but
-
that particular station is
really low underground.
-
They have elevators that you
can use to get up,
-
but usually there are, like,
long queues to the elevators...
-
E: You always have to do
things the hard way, right?
-
M: You had to take the stairs, or
-
they were just heading for the stairs
and I was following them and
-
we were starting to climb the stairs and
I didn't read this warning sign, which is:
-
'Those with luggage, pushchairs & heart
conditions, please use the lift' laughing
-
Because I was feeling fine,
-
and this was the first time that I
figured out there's something wrong
-
with my pacemaker or with my heart.
-
Because I came like
half way up this stairs
-
and I felt like I was going to die.
-
It was a really horrible feeling.
-
I didn't have any more breath left,
-
I felt like I wasn't able
to complete the stairs.
-
I didn't know what was
happening to me, but
-
somehow I managed to
drag myself up the stairs
-
and my heart was really...
-
it didn't feel right.
-
So, first thing when I came
back from this course
-
I went to my doctor
-
and we started to try
debug me, tried to find out
-
what was wrong with my pacemaker.
-
And this is how that looks like.
E: laughing
-
M: So, there's a stack
of different programmers
-
- this is not me by the way, but it's
a very similar situation.
-
E: And we'll come back to those
programmers in a moment.
-
M: Yeah.
E: But the bit I want you
-
to focus on is, like, they're
debugging your pacemaker?
-
Inside you?
M: Yeah, I didn't know
-
what was happening
at the time.
-
We were just trying to
get the settings right
-
and it took like 2 or 3 months before
we figured out what was wrong.
-
And what happened was, that my
operate limit was set to low for me,
-
for my age. So, the normal pacemaker
patient is maybe around 80 years old
-
and the default operate
limit was 160 beats/min.
-
And that's pretty low for
a young person.
-
E: So, imagine, like, you're younger
and you're really fit and you know
-
how to do something really well,
like swimming or skiing or skateboarding
-
or whatever. You're fantastic at it.
And then a couple years go past
-
and you know, you gain some weight
and you're not as good at it, right?
-
But now imagine that
happens in 3 seconds.
-
While you're walking
up a set of stairs.
-
M: So, what happens is that
the pacemaker detects
-
'Oh, you have a really high pulse'.
And there's a safety mechanism
-
that will cut your pulse in half ...
E: In half!
-
laughter
M: laughing So in my case it went
-
from 160 beats/min to 80 beats/min.
In a second, or less than a second,
-
and that felt really, really horrible.
-
And it took a long time
to figure out what was wrong.
-
It wasn't until they put me on
an exercise bike and
-
had me on monitoring that they
figured out what was wrong, because
-
the thing was, that what was displayed
on the pacemaker technician's view
-
was not the same settings that
my pacemaker actually had.
-
There was a software bug in the
programmer, that caused this problem.
-
E: So they thought they had updated
her settings to be that of a young person.
-
They were like
'Oh, we've already changed it'.
-
But they lost the view. They couldn't
see the actual state of the pacemaker.
-
And the only way to figure that out
was to put her on a bike
-
and let her cycle until her
heart rate was high enough.
-
You know, literally physically
debugging her to figure out
-
what was wrong.
-
Now stop and think about whether or not
you would trust your doctor
-
to debug software.
-
laughter
-
So, say a little bit more about those
programmers and then we'll move on
-
towards the future.
-
M: Yeah, so, we got hold of one of these
programmers, as mentioned
-
and looked inside it.
-
And, well, we named this talk
'Unpatchable', because
-
originally my hypothesis was that,
if you find a bug in a pacemaker
-
it will be hard to patch it.
-
Maybe it would require surgery.
-
But then when we looked
inside the programmer
-
and we saw that it contained firmware
for pacemakers we realized that
-
it's possible to actually patch the
pacemaker via this programmer.
-
E: One of the other researchers
finds these firmware blobs inside
-
the programmer code and, like,
my heart stopped at that point, right?
-
I was just going 'Really, you can just
update the code on someones pacemaker?'
-
We also wanna say something
about standardization.
-
Look at all those
different programmers.
-
Someone goes into a hospital
with one of these devices
-
they have may different programmers
so they have to make an estimation
-
of which... you know, which
programmer for which device.
-
Like, which one are you running.
-
And, so, some standardization
would be an option laughing
-
perhaps, in this case.
M: Yeah.
-
E: Alright. So, we gonna need
to move quickly through
-
the next few slides to talk
to you about the future,
-
but I hope that drives home that
this is a very real issue for real people.
-
M: So, pacemakers are evolving and
they are getting smaller
-
and this is the type of pacemaker
that you can actually implant
-
inside the heart.
-
So, the pacemaker I have today
is outside the heart and it has
-
leads that are wired to my heart.
-
But in future they are getting
smaller and more sophisticated and
-
I think this is exciting!
-
I think that a lot of you,
also in the audience will
-
benefit from having this type of
technology when you grow older
-
and we can have longer lives and
we can live more healthier lives
-
because of the technology
E: And keep in mind, right?
-
Some of you may already have devices
and already have this issues,
-
but others of you will think 'Ah, that
won't happen to me for quite a long time'
-
But it can be a sudden thing, that,
you know, you don't necessarily
-
have a choice to run code
inside your body.
-
Which OS do you wanna implant?
laughing
-
You wanna tell them about the..
-
M: This is also a quite exciting
-
maybe future type of implants
that you can have.
-
So, this is actually a cardiac sock,
it's 3D-printed and it's making
-
a rabbit's heart beat outside
the body of the rabbit.
-
So, there's a lot of technology
and sensors and things that
-
are going to be implanted
in our bodies
-
and I think more of you will become
cyborgs like me in the future
-
E: And there's a lot of work
that you could be doing.
-
You know, 3D-printing
this devices,
-
and open sourcing as much
of this as possible.
-
There's a lot to say here, right?
-
I think it's time to address
the really scary issue.
-
The informed consent issue
around patching, right?
-
Remember earlier we were
talking about the programmers
-
and we pointed out that there
were firmware blobs in there
-
and that these people,
you know, your doctor or nurse
-
could upgrade the code
running on your medical implant.
-
Now, is there a legal requirement
for them to inform you,
-
before they alter the code
that's running inside your body?
-
As far as we can tell
-
- and we need to look at a lot of
different countries at the same time,
-
so we gonna ask you to help us -
-
as far as we can tell there are not
laws requiring your doctor
-
to tell you that they are upgrading
the firmware in your device.
-
M: Yeah, think about that laughs
-
It's a quite scary thing.
-
I want to know what's happening
to my implant, the code,
-
if someone wants to alter the code
inside my body, I would like to know
-
and I would like to make
an informed decision on that
-
and give my consent
before it happens.
-
E: You might even choose a device
where that's possible or not possible
-
because you're making a risk-based
decision and you're an informed consumer
-
but how do we help people,
who don't wanna understand
-
software and firmware and upgrades
make those decisions in the future as well.
-
Alright.
-
M: So now, if we're going to go through
-
all this, but there's a lot of reasons
why we're in the situations of having
-
insecure medical devices.
-
There's a lot of legacy technology because
there's a long lifetime of this devices
-
and it takes a long time
to get them on the market.
-
And they can be patched,
but in some cases
-
they are not patched or there are
no software updates applied to them.
-
We don't have any third party
security testing of the devices,
-
and that's really needed in my opinion.
-
E: Right, an underwriters laboratory
-
or consumer laboratory that's there
to check some of these details.
-
And I don't think that's unreasonable,
right? That sort of approach.
-
M: And there's a lack of regulations,
also. So there's a lot of things
-
that should be worked on.
-
E: So, there's a lot of
ways to solve this
-
and we're not gonna give you
the answer, because we're not
-
geniuses, so we're
gonna say that
-
these are some different
approaches that we see all
-
playing in a solution space.
-
So, vendor awareness is
obviously important, but
-
that's not the only thing.
A lot of the vendors have been
-
very supportive and
very open to discussion,
-
of transparency, that needs to
happen more in the future, right?
-
Security risk monitoring,
I've been working in the field
-
of cyber insurance, which I'm sure
sounds like insanity to the rest of you,
-
and it is, there are bad days.
But that could play a part
-
in this risk equation in the future.
-
What about medical incidence response,
right? Or medical device forensics.
-
M: If I suddenly drop dead
I really would like to have
-
a forensic analysis
of my pacemaker, to ...
-
E: Please remember that, all of you!
Like, if anything is going to happen
-
to Marie... everyone asked that, right?
Like, 'Aren't you afraid of giving this talk?'
-
And we thought about it,
we talked about it a lot and
-
she's got a lot of support
from her husband and her son
-
and her family and a bunch of us.
If anything happens to this woman
-
I hope that we will all be doing
forensic analysis
-
of everything.
-
applause
-
Cool. So, we'll say a little bit about
'I Am The Cavalry' and social contract
-
and then we'll wrap it up, okay?
-
So, 'I Am The Cavalry' does
a lot of grassroots research
-
and support and lobbying and
tries to articulate these messages.
-
They have a medical implant
arm that has a bunch of
-
different researchers doing
this kind of stuff.
-
Do you wanna say more about them?
-
M: Yeah, so we are both
part of the Cavalry,
-
because no one is coming
to save us from the future
-
of being more depended on
trusting our lives on machines
-
so, that's why we need to step up
and do the research and
-
encourage and inspire the research.
-
So, that's why I joined
'I Am The Cavalry'
-
and I think it's a
good thing to have
-
a collaboration effort between
researchers, between the vendors
-
and the regulators, as they are,
or we are working with.
-
E: We also think that even if you
don't do reverse engineering
-
or you're not interested in
security details or the opcodes
-
that are inside the firmwares
or whatever,
-
this question is a question that
any of you here can talk about
-
for the rest of the congress and
going forward into the future.
-
Right?
-
This is Marie's, so go ahead.
-
M: Yeah, so, I really want to know
what code is running inside my body.
-
And I want to know ...
-
or I want to have a social contract
with my medical doctors and
-
my physician that is giving me
this implants.
-
It needs to be based on a
patient-to-doctor trust relationship.
-
And also between
me and the vendors.
-
So I really want to know that
I can trust this machine inside...
-
E: And we think many of you will
be facing similar questions
-
to these in the future.
-
I have questions.
Some of my questions are serious,
-
some of my questions are
not serious, like this one:
-
Is the code on your dress
from your pacemaker?
-
M: No, actually it's from the
computer game 'Doom'.
-
But ...
laughter
-
once I have the laughing
code of my pacemaker
-
I'm going to make a custom-
ordered dress and get it...
-
E: Which is pretty cool, right?
M: ... get it with my own code.
-
applause
-
So, let's wrap up with... what we
want to have of future research.
-
So, we encourage more research,
and these are some things that
-
could be looked into.
-
Like open source medical devices,
that doesn't really exist,
-
at least not for pacemakers.
-
But I think that's one way
of going forward.
-
E: I think it's also an opportunity
for us to mention a really scary idea,
-
which is, you know, should anyone
have a golden key to Marie's heart,
-
should there be backdoored
encryption inside of her heart?
-
We think no laughing
but that...
-
M: I don't see any reason why
the NSA should be able to
-
have a back door to my heart,
do you?
-
E: You would be an extremist,
that's why you don't want them
-
to have a back door to your heart.
But this is a serious question, right?
-
If you start backdooring
any kind of crypto anywhere,
-
how do you know,
where it's gonna end up.
-
It might end up in medical devices
and we think that's unacceptable.
-
applause
-
M: And we should also mention
that we're not doing this alone,
-
we have other researchers
helping us forward doing this.
-
Angel: So, thank you very much
for this thrilling talk,
-
we're now doing a little
Q&A for 10 min,
-
and for the Q&A please keep in mind
to respect Marie's privacy, so
-
don't ask for details about
-
the implant or
something like that.
-
E: Yeah, the brands and stuff.
-
We're gonna tell you, what OS
she's running.
-
Angel: People, who are now leaving
the room, they will not be able
-
to come back in, because
-
of measures laughing
laughter
-
So, let's start with the Q&A!
Let's start with this microphone there.
-
Q: Hi, first of all thank you very much
for a very fascinating talk.
-
I'm not going to ask you
about specific vendors.
-
However, I thought it was very
interesting what you said, that
-
most vendors were really supportive
I would like to know whether
-
there have been
exceptions to that rule,
-
not who it was or anything like that
but what kind of arguments
-
you may have heard from vendors
e. g. have they referred to anything
-
such as trade secrets or copyright
or any other legal reasons
-
why not to give you,
or not to give public access
-
to information about devices?
Thank you.
-
E: So, we haven't had any legal
issues so far in this research.
-
And in general they haven't been
concerned about copyright.
-
I think they're more concerned
about press, bad press,
-
and a hype, you know, what
they would see as hype.
-
they don't wanna see us scaring
people away from these things
-
with, you know, these stories.
-
M: Yeah, that's also something
I'm concerned of, of course,
-
as a patient. I don't want to
scare my fellow patients
-
from having life-critical
implants in their body.
-
Because a lot of people need
them, like me, to survive.
-
So, the benefit clearly
outweighs the risk in my case.
-
E: But that seems to be their
main concern, like, you know,
-
'Don't give us too
much bad press'
-
Angel: Ok, next question
from over there.
-
Q: Hello. I wanted to ask you, if you
know about any existing initiatives
-
on open sourcing
the medical devices,
-
on mandating the open sourcing
of the software and firmware
-
through the legal system,
in European Union, in United States
-
because I think I've read
about such initiatives
-
about 1 year ago or so,
but it was just a glimpse.
-
M: So, there are some patients
that have reverse engineered their
-
no audio
-
(insu)lin pumps. I know, that
there are groups of patients
-
like the parents of children
with insulin pumps.
-
They have created
software to be able...
-
to have an app on their
mobile phone to be able
-
to monitor their child's
blood sugar levels.
-
So that's one way of
doing this open source
-
and I think that's great.
-
Q: But nothing
in the legal systems,
-
no initiatives to mandate this,
e.g. on European level?
-
E: Not so far that we've seen,
-
but that's something that
can be discussed now, right?
-
M: I think it's really interesting,
you could look into the legal
-
aspects and the regulations
around this, yeah.
-
Q: Thank you.
-
Angel: Ok, can we have
a question from the internet?
-
Q: Yes, from the IRC someone asks:
-
'Does your pacemaker
have a biofeedback,
-
so in case something bad
happens it starts to defibrillate?
-
M: No, I don't have an ICD,
so in my case I'm not getting a shock
-
in case my heart stops.
Because I have a different condition
-
I only need to have
my rhythm corrected.
-
But there are other
types of conditions,
-
that require pacemakers
that can deliver shocks.
-
Angel: Ok, one question
from that microphone there.
-
Q: Thank you very much.
At one point you mentioned
-
that the connectivity in you
pacemaker is off. For now.
-
And, is that something, that patients
are asked during the process,
-
or is that something,
patients have to require?
-
And generally: What role
do you see for the choice
-
not to have any connectivity
or any security for that matter,
-
that technology would
make available to you?
-
So, how do you see the possibility
to choose a more risky life
-
in terms of trading in
for privacy, whatever?
-
M: Yeah, I think that's
really a relevant question.
-
As we mentioned
in the social contract,
-
I really would like, that the doctors
informed patients about
-
their different wireless interfaces
and that there's an informed decision
-
whether or not to switch it on.
-
So, in my case, I don't
have it switched on and ...
-
I don't need it, so there's no reason
why I need to have it switched on.
-
But then, again, why did I get
an implant that has this capability?
-
I should have had the option of
opting out of it, but I didn't get that.
-
They didn't ask me, or they
didn't inform me of that,
-
before I got the implant.
It was chosen for me.
-
And at that time I hadn't looked
into the security of medical devices,
-
and I needed to
have the implant,
-
so I couldn't really make
an informed decision.
-
A lot of patients that are,
like, older and not so...
-
that don't really understand
the technology,
-
they can't make that
informed decision, like I can.
-
So, it's really a
complex issue
-
and something that we
need to discuss more.
-
Angel: Ok, another
question from there.
-
Q: Yeah, thanks.
-
As a hacker, connected personally
-
and professionally
to the medical world:
-
How can I educate doctors,
nurses, medical people
-
about the security risks presented
by connected medical devices?
-
What can I tell them?
Do you have something
-
from your own experience
I could somehow ...
-
M: Yeah, so, the issue of
software bugs in the devices
-
I think is a real scenario
that can happen and ...
-
E: Yeah, if you can repeat
that story of debugging her,
-
like, I think, that makes the point.
And then try in adopt that
-
hygiene-metaphor that we
had before, where, you know,
-
people didn't believe in germs,
and these problems before,
-
we're in that sort of era,
and we're still figuring out
-
what the scope of potential
security and privacy problems are
-
for medical devices.
In the meantime
-
please be open to new research
on this subject, right?
-
And that story is
a fantastic illustration,
-
that we don't need evil hacker
typer, you know, bond villain,
-
we just need failure to debug
programming station, properly, right?
-
Q: Thank you very much.
-
Angel: Ok, another question
from the internet.
-
Q: Yes, from the IRC:
-
'20 years ago it was common,
that a magnet had to be placed
-
on the patients chest to activate the
pacemakers remote configuration interface.
-
Is that no longer the case today?'
-
E: It's still the case with some devices,
but not with all of them I think.
-
M: Yeah, it varies between the devices,
how they are programmed and
-
how long distance you
can be from the device.
-
Q: Thank you for the talk.
I've some medical devices
-
in myself to, an insulin pump and
sensors to measure the blood sugar levels,
-
I'm busy with hacking that and
to write the software for myself,
-
because the *** doesn't
have the software.
-
Have you ever think about it, to write
your own software for your pacemaker?
-
E: laughing
M: laughing
-
M: No, I haven't thought about
that until now. No. laughing
-
E: Fantastic, I think that deserves
a round of applause, though,
-
because that's exactly
what we're talking about.
-
applause
-
Angel: Another question
from there.
-
Q: First off, I want to say thank you
that you gave this talk, because
-
once it's quite interesting,
but it's not that talk,
-
anyone of that is effected could hold,
-
so, it takes quiet some courage and
-
I want to say thank you. So
-
applause
-
Secondly, thank you for giving me the
-
update. I started medical technology but
-
I finished ten years ago and I didn't work
-
in the area and it's quiet interesting to
-
see what happened in the meantime, but
-
now for my actual question:
-
You said you got devices on ebay, is it
-
possible to get the hole
-
communication chain?
-
So you can make a sandbox test or ..
-
M: Yes it's possible to get devices,
-
it's not so easy to get the pacemaker
-
itself , it's quite expensive.
-
E: And even when we get one,
-
we have some paring issues and like
-
Marie can't be in the same room , when
-
we were doing a curtain types of testing
-
and right, so that last piece is difficult
-
but the rest of the chain is pretty
-
available for the research.
-
Q: Ok, thank you.
-
Angel: So, time is running out, so we,
-
only time left for one question and from
-
there please.
-
Q: Thank you. I'm also involved in
-
software quality checks and software qs
-
here in Germany also
with medical developments
-
and as far as I know, it is the most
-
restricted area of developing products
-
I think in the world,
-
it's just easier to manipulate software
-
in a car X-source system or breaking guard
-
or something like this, where you don't
-
have to show any testing certificate or
-
something like this, the FDA is a very
-
high regulation part there.
-
Do you have the feeling that it's a
-
general issue that patients do not have
-
access to these FDA compliant tests and
-
software q-a-systems?
-
M: Yeah, I think that we should have
-
more openness and more transparency
-
about, around this issues , really.
-
E: I mean, it's fantastic you do quality
-
assurance, i used to be in quality assurance
-
at a large cooperation and I got tiered
-
and landed in strategy and pen testing and
-
then I just thought of myself as paramilitary
-
quality assurence , ..
-
now I just do it on ever I wanne test, so
-
thank you for doing q-a and keep doing it
-
and hopefull you don't have to many regulations
-
but companies sharing more of this
-
information, its really the transparency
-
and the discussion, the open dialogue
-
with patients and doctor and a vendor is
-
really what we wanna focus on and make
-
our final note ?
M: Yeah.
-
M: We see some problems already
-
the last year, the MI Undercover Group has
-
had some great progress on having good
-
discussions with the FDA and also involving
-
the medical device vendors in the discussions
-
about cyber security of medical devices
-
and implants. so thats great and I hope
-
that this will be even better the next year.
-
E: And I think you wanne to say
-
one more thing to congress before we leave
-
which is:
-
M: Hack to save lives!
-
applaus
-
♪ postroll music ♪
-
subtitles created by c3subtitles.de
Join, and help us!