{"title":"利用核磁共振扫描机漏洞:黎巴嫩案例研究","authors":"Reem A. Nabha, Hassan Sbeyti","doi":"10.1109/ISDFS49300.2020.9116449","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) in the modern healthcare environment is continuously growing to offer a seamless platform to monitor patients in hospitals making our lives easier. Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) systems are commonly connected to hospital networks becoming increasingly vulnerable to cyberattacks such as Ransomware. This paper attempts to discuss vulnerabilities in the MRI scanner that ransomware can exploit to propagate through a system.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study\",\"authors\":\"Reem A. Nabha, Hassan Sbeyti\",\"doi\":\"10.1109/ISDFS49300.2020.9116449\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) in the modern healthcare environment is continuously growing to offer a seamless platform to monitor patients in hospitals making our lives easier. Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) systems are commonly connected to hospital networks becoming increasingly vulnerable to cyberattacks such as Ransomware. This paper attempts to discuss vulnerabilities in the MRI scanner that ransomware can exploit to propagate through a system.\",\"PeriodicalId\":221494,\"journal\":{\"name\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS49300.2020.9116449\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS49300.2020.9116449","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study
Internet of Things (IoT) in the modern healthcare environment is continuously growing to offer a seamless platform to monitor patients in hospitals making our lives easier. Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) systems are commonly connected to hospital networks becoming increasingly vulnerable to cyberattacks such as Ransomware. This paper attempts to discuss vulnerabilities in the MRI scanner that ransomware can exploit to propagate through a system.