{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:37:58Z","timestamp":1773787078830,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T00:00:00Z","timestamp":1369785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,29]]},"DOI":"10.1145\/2463209.2488750","type":"proceedings-article","created":{"date-parts":[[2013,5,28]],"date-time":"2013-05-28T16:35:41Z","timestamp":1369758941000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Balancing security and utility in medical devices?"],"prefix":"10.1145","author":[{"given":"Masoud","family":"Rostami","sequence":"first","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Wayne","family":"Burleson","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, MA"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX"}]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[{"name":"RSA Laboratories, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228364"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.294.8.955"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_4_1","first-page":"150","volume-title":"Conf. on e-Health Networking Applications and Services","author":"Li C.","year":"2011","unstructured":"C. Li , A. Raghunathan , and N. K. Jha , \" Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system,\" in IEEE Int . Conf. on e-Health Networking Applications and Services , pp. 150 -- 156 , 2011 . C. Li, A. Raghunathan, and N. K. Jha, \"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system,\" in IEEE Int. Conf. on e-Health Networking Applications and Services, pp. 150--156, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"e_1_3_2_1_6_1","first-page":"172","volume-title":"Workshop of Security Protocols","author":"Stajano F.","year":"1999","unstructured":"F. Stajano and R. Anderson , \" The resurrecting duckling: Security issues for ad-hoc wireless networks,\" in Int . Workshop of Security Protocols , pp. 172 -- 194 , 1999 . F. Stajano and R. Anderson, \"The resurrecting duckling: Security issues for ad-hoc wireless networks,\" in Int. Workshop of Security Protocols, pp. 172--194, 1999."},{"key":"e_1_3_2_1_7_1","first-page":"3837","volume-title":"Interoperability and security in wireless body area network infrastructures,\" in IEEE Engineering in Medicine and Biology Society","author":"Warren S.","year":"2005","unstructured":"S. Warren , J. Lebak , J. Yao , J. Creekmore , A. Milenkovic , and E. Jovanov , \" Interoperability and security in wireless body area network infrastructures,\" in IEEE Engineering in Medicine and Biology Society , pp. 3837 -- 3840 , 2005 . S. Warren, J. Lebak, J. Yao, J. Creekmore, A. Milenkovic, and E. Jovanov, \"Interoperability and security in wireless body area network infrastructures,\" in IEEE Engineering in Medicine and Biology Society, pp. 3837--3840, 2005."},{"key":"e_1_3_2_1_8_1","first-page":"5453","volume-title":"Security and privacy issues with health care information technology,\" in IEEE Engineering in Medicine and Biology Society","author":"Meingast M.","year":"2006","unstructured":"M. Meingast , T. Roosta , and S. Sastry , \" Security and privacy issues with health care information technology,\" in IEEE Engineering in Medicine and Biology Society , pp. 5453 -- 5458 , 2006 . M. Meingast, T. Roosta, and S. Sastry, \"Security and privacy issues with health care information technology,\" in IEEE Engineering in Medicine and Biology Society, pp. 5453--5458, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2049204"},{"key":"e_1_3_2_1_10_1","unstructured":"K. Zetter \"DigiNotar files for bankruptcy in wake of devastating hack \" Wired 20 Sept. 2011.  K. Zetter \"DigiNotar files for bankruptcy in wake of devastating hack \" Wired 20 Sept. 2011."},{"key":"e_1_3_2_1_11_1","first-page":"1862","volume-title":"IMDGuard: Securing implantable medical devices with the external wearable guardian,\" in Proc. of IEEE INFOCOM","author":"Xu F.","year":"2011","unstructured":"F. Xu , Z. Qin , C. Tan , B. Wang , and Q. Li , \" IMDGuard: Securing implantable medical devices with the external wearable guardian,\" in Proc. of IEEE INFOCOM , pp. 1862 -- 1870 , 2011 . F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, \"IMDGuard: Securing implantable medical devices with the external wearable guardian,\" in Proc. of IEEE INFOCOM, pp. 1862--1870, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567031"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0609"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/223904.223940"},{"key":"e_1_3_2_1_15_1","first-page":"5","volume-title":"Body area network security: robust key establishment using human body channel,\" in Proceedings of the USENIX conference on Health Security and Privacy","author":"Chang S.-Y.","year":"2012","unstructured":"S.-Y. Chang , Y.-C. Hu , H. Anderson , T. Fu , and E. Y. Huang , \" Body area network security: robust key establishment using human body channel,\" in Proceedings of the USENIX conference on Health Security and Privacy , pp. 5 -- 5 , 2012 . S.-Y. Chang, Y.-C. Hu, H. Anderson, T. Fu, and E. Y. Huang, \"Body area network security: robust key establishment using human body channel,\" in Proceedings of the USENIX conference on Health Security and Privacy, pp. 5--5, 2012."},{"key":"e_1_3_2_1_16_1","first-page":"432","volume-title":"Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,\" in Parallel Processing Workshop","author":"Cherukuri S.","year":"2003","unstructured":"S. Cherukuri , K. Venkatasubramanian , and S. Gupta , \" Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,\" in Parallel Processing Workshop , pp. 432 -- 439 , 2003 . S. Cherukuri, K. Venkatasubramanian, and S. Gupta, \"Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,\" in Parallel Processing Workshop, pp. 432--439, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0290-42"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/51.917725"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.046107"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037617"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Plethysmogram-based secure inter-sensor communication in body area networks,\" in IEEE Military Communications Conference","author":"Venkatasubramanian K. K.","year":"2008","unstructured":"K. K. Venkatasubramanian , A. Banerjee , and S. Gupta , \" Plethysmogram-based secure inter-sensor communication in body area networks,\" in IEEE Military Communications Conference , pp. 1 -- 7 , 2008 . K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, \"Plethysmogram-based secure inter-sensor communication in body area networks,\" in IEEE Military Communications Conference, pp. 1--7, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.926434"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777410"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27890-7_17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_28_1","article-title":"Body area network security: A fuzzy attribute-based signcryption scheme","author":"Liao X.","year":"2013","unstructured":"X. Liao , \" Body area network security: A fuzzy attribute-based signcryption scheme ,\" IEEE Journal on Selected Areas in Communications, To Appear , 2013 . X. Liao, \"Body area network security: A fuzzy attribute-based signcryption scheme,\" IEEE Journal on Selected Areas in Communications, To Appear, 2013.","journal-title":"IEEE Journal on Selected Areas in Communications, To Appear"},{"key":"e_1_3_2_1_29_1","volume-title":"Absence makes the heart grow fonder: New directions for implantable medical device security,\" in USENIX HotSec","author":"Denning T.","year":"2008","unstructured":"T. Denning , K. Fu , and T. Kohno , \" Absence makes the heart grow fonder: New directions for implantable medical device security,\" in USENIX HotSec , 2008 . T. Denning, K. Fu, and T. Kohno, \"Absence makes the heart grow fonder: New directions for implantable medical device security,\" in USENIX HotSec, 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_3_2_1_31_1","volume-title":"Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time,\" in IEEE Symp. on Security and Privacy","author":"Shen W.","year":"2013","unstructured":"W. Shen , P. Ning , X. He , and H. Dai , \" Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time,\" in IEEE Symp. on Security and Privacy , 2013 . W. Shen, P. Ning, X. He, and H. Dai, \"Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time,\" in IEEE Symp. on Security and Privacy, 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.020111.101219"},{"key":"e_1_3_2_1_35_1","unstructured":"distributed.net \"Project RC5.\" http:\/\/www.distributed.net\/RC5 Referenced 2012.  distributed.net \"Project RC5.\" http:\/\/www.distributed.net\/RC5 Referenced 2012."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_12"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0449"},{"key":"e_1_3_2_1_38_1","volume-title":"Symp. on Circuits and Systems","author":"Koushanfar F.","year":"2011","unstructured":"F. Koushanfar and A. Mirhoseini , \" Hybrid heterogeneous energy supply networks,\" in IEEE Int . Symp. on Circuits and Systems , 2011 . F. Koushanfar and A. Mirhoseini, \"Hybrid heterogeneous energy supply networks,\" in IEEE Int. Symp. on Circuits and Systems, 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.9"}],"event":{"name":"DAC '13: The 50th Annual Design Automation Conference 2013","location":"Austin Texas","acronym":"DAC '13","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 50th Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463209.2488750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2463209.2488750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:28Z","timestamp":1750235968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463209.2488750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,29]]},"references-count":39,"alternative-id":["10.1145\/2463209.2488750","10.1145\/2463209"],"URL":"https:\/\/doi.org\/10.1145\/2463209.2488750","relation":{},"subject":[],"published":{"date-parts":[[2013,5,29]]},"assertion":[{"value":"2013-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}