Q&A: We Must Protect Bionic Bodies From Hacking, Says Kevin Fu

It’s time for manufacturers to get serious about cybersecurity for implanted medical devices

2 min read
Illustration of Kevin Fu.
Illustration: Jacob Thomas

human os icon

illustration of Kevin Fu Illustration: Jacob Thomas

As patients welcome neurostimulators, medical microbots, and other hardware into their bodies, they’re welcoming potential security flaws too. Kevin Fu, an associate professor of electrical engineering and computer science at the University of Michigan, says the medical device industry needs to get serious about cybersecurity now to ensure that life-saving technologies remain safe and trusted in the future.

IEEE Spectrum: Are medical device manufacturers considering security early enough in the design process?

Kevin Fu: Yes and no. Some manufacturers show up to meetings about improving medical device security and participate in good faith. The real problem is that some manufacturers still aren’t showing up.

Yet you and others have shown how medical devices can be compromised.

I don’t see any maliciousness. If you’re a manufacturer and some hacker comes and says the sky is falling, you’d probably laugh it off. The sensationalism has a negative impact. It distracts from the serious engineering.

The U.S. Food and Drug Administration issued the first cybersecurity guidelines for medical devices. What’s in them?

They’re the equivalent of hand washing in medicine—they’re the basics. Cybersecurity hand washing means you enumerate the risks, put in place technical controls to mitigate the risks you’ve identified, and make sure you have the ability to determine if those controls are working effectively. To security professionals this isn’t surprising, but to a biomedical engineer it really is groundbreaking.

What’s the biggest security threat to medical devices today?

The main risk is conventional malware that accidentally breaks into a medical device. That is not your sinister hacking plot. For example, the FDA got a report that a pharmaceutical compounder [a machine that makes liquid drugs] had Conficker, a rather old worm. It turns out the compounder was running Windows XP Embedded, a 10-year-old operating system. It was completely susceptible. This is classic hand washing: Imagine you haven’t washed your hands for 10 years and then you decide to pick your nose.

This article originally appeared in print as “Will Bionic Bodies Get Hacked?”

The Conversation (0)

Video Friday: DARPA Subterranean Challenge Final

1 min read

This week we have a special DARPA SubT edition of Video Friday, both because the SubT Final is happening this week and is amazing, and also because (if I'm being honest) the SubT Final is happening this week and is amazing and I've spent all week covering it mostly in a cave with zero access to Internet. Win-win, right? So today, videos to watch are DARPA's recaps of the preliminary competition days, plus (depending on when you're tuning in) a livestream of the prize round highlights, the awards ceremony, and the SubT Summit with roundtable discussions featuring both the Virtual and Systems track teams.

Keep Reading ↓ Show less

Making 3D-Printed Objects Feel

3D-printing technique lets objects sense forces applied onto them for new interactive applications

2 min read

Researchers from MIT have developed a method to integrate sensing capabilities into 3D printable structures comprised of repetitive cells, which enables designers to rapidly prototype interactive input devices.


Some varieties of 3D-printed objects can now “feel," using a new technique that builds sensors directly into their materials. This research could lead to novel interactive devices such as intelligent furniture, a new study finds.

The new technique 3D-prints objects made from metamaterials—substances made of grids of repeating cells. When force is applied to a flexible metamaterial, some of their cells may stretch or compress. Electrodes incorporated within these structures can detect the magnitude and direction of these changes in shape, as well as rotation and acceleration.

Keep Reading ↓ Show less

Emerging Trends in Wireless Infrastructure

Emerging Trends in Wireless Infrastructure

1 min read
Rohde & Schwarz

This paper describes the emerging infrastructure trends of wireless networks for 4G, 5G, and beyond 5G. These trends provide even more opportunities to service providers for network deployments, network customization, and network optimization. These key trends include (i) spectrum trends, (ii) densification & coverage extension methods, (iii) virtualization and cloudification, and (iv) network customization and intelligence.

Trending Stories

The most-read stories on IEEE Spectrum right now