Protecting E-healthcare Client Devices against Malware and Physical Theft

نویسندگان

  • Daisuke Mashima
  • Abhinav Srivastava
  • Jonathon T. Giffin
  • Mustaque Ahamad
چکیده

The growing adoption of electronic medical records will require that healthcare professionals and patients are able to access health information on devices such as laptops, personal computers, and even smart phones. Due to the sensitive nature of such information, it is important to secure client-side devices used in electronic healthcare systems that handle sensitive medical data. These devices can be targets of several kinds of attacks, including malware-based attacks or physical theft of devices. We present an approach and system architecture to secure client devices against such attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of ‘sensor malware’ has been developing that leverages these sensors to steal information from the physical environment — e.g., researchers have recently demonstrated how malware can ‘listen’ for s...

متن کامل

Client Security in the Enterprise Network: Dell's Perspective

Client computer security is a broad subject that includes securing access to network resources, securing data transfers over private and public networks, and protecting client computers and local data from theft. Security is increasingly important as portable computers, vulnerable to theft, proliferate and the Internet revolutionizes communications and commerce. Applications such as e-commerce,...

متن کامل

A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks

Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to detect and prevent real-time phishing attacks. It uses 2-way authentication and zero-knowledge password proof. Users are recommended to customize their user in...

متن کامل

Probabilistic and Considerate Attestation of IoT Devices against Roving Malware

Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of protecting themselves against infection. Malware that is aware of ongoing or impending attestation and aims to avoid detection can relocate itself during computation of the attestation measurement. In ...

متن کامل

IoTPOT: Analysing the Rise of IoT Compromises

We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010