{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:59:24Z","timestamp":1773154764039,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1109\/sp.2008.31","type":"proceedings-article","created":{"date-parts":[[2008,5,29]],"date-time":"2008-05-29T14:03:27Z","timestamp":1212069807000},"page":"129-142","source":"Crossref","is-referenced-by-count":450,"title":["Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Halperin","sequence":"first","affiliation":[]},{"given":"Thomas S.","family":"Heydt-Benjamin","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Ransford","sequence":"additional","affiliation":[]},{"given":"Shane S.","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Benessa","family":"Defend","sequence":"additional","affiliation":[]},{"given":"Will","family":"Morgan","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Maisel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1001\/jama.295.16.1901"},{"key":"17","article-title":"may 2000. last viewed","year":"2007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1001\/jama.294.8.955"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.4108\/bodynets.2007.181"},{"key":"15","article-title":"the a5 cracking project: practical attacks on gsm using gnu radio and fpgas","author":"lackey","year":"2007","journal-title":"Chaos Communication Camp"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/1031495.1031515","article-title":"tinysec: a link layer security architecture for wireless sensor networks","author":"karlof","year":"2004","journal-title":"Proceedings of the second ACM Conference on Embedded Networked Sensor Systems (SenSys) '04"},{"key":"14","author":"kuhn","year":"2003","journal-title":"Compromising emanations Eavesdropping risks of computer displays"},{"key":"11","article-title":"vulnerabilities in first-generation rfid-enabled credit cards","volume":"4886","author":"heydt-benjamin","year":"2007","journal-title":"LNCS"},{"key":"12","article-title":"initial sram state as a fingerprint and source of true random numbers for rfid tags","author":"holcomb","year":"2007","journal-title":"Proceedings of the Conference on RFID Security"},{"key":"21","year":"0","journal-title":"Medtronic Maximo"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"24","year":"0"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2007.346163"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2005.1423241"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_29"},{"key":"28","article-title":"bluesniff: eve meets alice and bluetooth","author":"spill","year":"2007","journal-title":"Proceedings of USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"29","first-page":"172","article-title":"the resurrecting duckling: security issues for ad-hoc wireless networks","author":"stajano","year":"1796","journal-title":"Proceedings of Security Protocols 7th International Workshop LNCS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"2","article-title":"maximalist cryptography and computation on the wisp uhf rfid tag","author":"chae","year":"2007","journal-title":"Proceedings of the Conference on RFID Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"1","article-title":"secure software updates: disappointments and new challenges","author":"bellissimo","year":"2006","journal-title":"Proceedings of USENIX Hot Topics in Security (HotSec)"},{"key":"30","year":"0","journal-title":"The GNU software radio"},{"key":"7","article-title":"a broad-band intrabody communication system with electro-optic probe","author":"fukomoto","year":"2003","journal-title":"Proceedings of the First International Conference on Appliance Design 2003"},{"key":"6","article-title":"key regression: enabling efficient key distribution for secure distributed storage","author":"fu","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2005.1615297"},{"key":"5","year":"0","journal-title":"The universal software radio peripheral"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICISIP.2006.4286096"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/1160633.1160930","article-title":"implantable medical devices as agents and part of multiagent systems","author":"drew","year":"2006","journal-title":"Proc Fifth Int'l Joint Conf Autonomous Agents and Multiagent Systems"},{"key":"9","article-title":"the s\/key one-time password system","author":"haller","year":"1994","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"8","article-title":"loud and clear: human-verifiable authentication based on audio. cryptology eprint archive","author":"goodrich","year":"2005"}],"event":{"name":"2008 IEEE Symposium on Security and Privacy (sp 2008)","location":"Oakland, CA, USA","start":{"date-parts":[[2008,5,18]]},"end":{"date-parts":[[2008,5,22]]}},"container-title":["2008 IEEE Symposium on Security and Privacy (sp 2008)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4531131\/4531132\/04531149.pdf?arnumber=4531149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T04:37:33Z","timestamp":1497760653000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4531149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/sp.2008.31","relation":{},"ISSN":["1081-6011"],"issn-type":[{"value":"1081-6011","type":"print"}],"subject":[],"published":{"date-parts":[[2008,5]]}}}