Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Zhiqiang WangQuanqi LiYazhe WangBiao LiuJianyi ZhangQixu LiuPublished in: CCS (2019)
Keyphrases
- security protocols
- medical data
- cryptographic protocols
- authentication protocol
- rfid systems
- security analysis
- security vulnerabilities
- communication protocols
- key exchange protocol
- information security
- key agreement protocol
- security properties
- data encryption
- intrusion detection
- text mining
- risk assessment
- security requirements
- data mining
- provably secure
- security problems
- mobile payment
- buffer overflow
- rfid technology
- security mechanisms
- messages exchanged
- secure routing
- secure multiparty computation
- protocol specification
- homomorphic encryption
- physical layer
- security threats
- security model
- formal analysis
- medical imaging
- lightweight
- access control
- knowledge discovery