[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3319535.3363253acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology

Published: 06 November 2019 Publication History

Abstract

DICOM is an international standard for medical images and related information, and is a medical image format that can be used for data exchange. The agreement is widely used in medical fields such as radiology and cardiovascular imaging. However, since DICOM libraries have less security considerations in protocol implementation, they have a large number of security risks. Aiming at the security issue of DICOM libraries, the paper conducts research on vulnerability mining technology for DICOM open source libraries, proposes a vulnerability mining framework based on Fuzzing technology, and implements a prototype system named DICOM-Fuzzer, which includes initialization, test case generation, automatic test, exception monitoring and other modules. Finally, the open source library DCMTK was selected for testing, and it was found that data overflow would occur when the content of the received file was greater than 7080 lines. Found that there is a vulnerability that causes the PACS system to refuse service. In conclusion, the DICOM protocol does have risks, and its information security needs to be further improved.

References

[1]
Duggal A. 2017. HL7 2.X Security. In The 8th Annual HITB Security Conference.
[2]
Mike Aizatsky, Kostya Serebryany, Oliver Chang, Abhishek Arya, and Meredith Whittaker. 2016. Announcing oss-fuzz: Continuous fuzzing for open source software. Google Testing Blog (2016).
[3]
Chen Chen, Baojiang Cui, Jinxin Ma, Runpu Wu, Jianchao Guo, and Wenqian Liu. 2018. A systematic review of fuzzing techniques. Computers & Security, Vol. 75 (2018), 118--137.
[4]
Akram Farhadi and Maryam Ahmadi. 2013. The Information Security Needs in Radiological Information Systems-an Insight on State Hospitals of Iran, 2012. Journal of digital imaging, Vol. 26, 6 (2013), 1040--1044.
[5]
Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, and Zuoning Chen. 2018. Collafl: Path sensitive fuzzing. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 679--696.
[6]
Eichelberg M Onken M. 2011. Digital Imaging and Communications in Medicine .Digital Imaging and Communications in Medicine (DICOM).
[7]
Food US and Administration Drug. 2013. Content of premarket submissions for management of cybersecurity in medical devices: draft guidance for industry and food and drug administration staff. Retrieved May, Vol. 1 (2013), 2014.

Cited By

View all
  • (2023)IoT Health Devices: Exploring Security Risks in the Connected LandscapeIoT10.3390/iot40200094:2(150-182)Online publication date: 25-May-2023
  • (2023)Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM CommunicationApplied Sciences10.3390/app13181007213:18(10072)Online publication date: 6-Sep-2023
  • (2022)Sicherheit medizintechnischer Protokolle im KrankenhausDatenschutz und Datensicherheit - DuD10.1007/s11623-022-1603-x46:5(276-283)Online publication date: 11-May-2022
  • Show More Cited By

Index Terms

  1. Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
    November 2019
    2755 pages
    ISBN:9781450367479
    DOI:10.1145/3319535
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2019

    Check for updates

    Author Tags

    1. network security
    2. system security
    3. vulnerability mining

    Qualifiers

    • Poster

    Funding Sources

    • key laboratory of network assessment technology of Institute of Information Engineering, Chinese Academy of Sciences
    • the Fundamental Research Funds for the Central Universities
    • Special fund on education and teaching reform of Besti
    • the National Key Research and Development Plan
    • Key Lab of Information Network Security, Ministry of Public Security

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)35
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)IoT Health Devices: Exploring Security Risks in the Connected LandscapeIoT10.3390/iot40200094:2(150-182)Online publication date: 25-May-2023
    • (2023)Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM CommunicationApplied Sciences10.3390/app13181007213:18(10072)Online publication date: 6-Sep-2023
    • (2022)Sicherheit medizintechnischer Protokolle im KrankenhausDatenschutz und Datensicherheit - DuD10.1007/s11623-022-1603-x46:5(276-283)Online publication date: 11-May-2022
    • (2021)ProFuzzBench: a benchmark for stateful protocol fuzzingProceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3460319.3469077(662-665)Online publication date: 11-Jul-2021
    • (2020)Security of Medical Cyber-physical Systems: An Empirical Study on Imaging DevicesIEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS50562.2020.9162769(997-1002)Online publication date: Jul-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media