Back to Results
First PageMeta Content



To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja
Add to Reading List

Document Date: 2015-05-14 18:28:36


Open Document

File Size: 1,68 MB

Share Result on Facebook

City

Seattle / /

Company

University of Washington Institutional Review / Intel / Cyber-Physical Systems / /

Country

Iran / France / United States / Canada / United Kingdom / /

/

Facility

University of Washington / /

IndustryTerm

Sequence number processing / networked control systems / datagram protocols / surgical tools / wireless network / near-by equipment / wireless link / nearby equipment / wireless sensor networks / control software / light-weight software / surgery systems / implantable medical devices / robotic systems / software development / side out-of-band communications / proposed security solutions / public network / robotic surgery systems / satellite networks / temporary ad-hoc wireless / individual hardware / rubber block / rubber blocks / cyberphysical systems / tele-medical applications / wireless links / real-time operation / communication networks / telesurgery protocol / security solutions / co-robotic systems / /

Movie

The Raven II / /

NaturalFeature

Mojave desert / /

OperatingSystem

Windows 7 / Linux / /

Organization

University of Washington / National Science Foundation / Department of Computer Science and Engineering / /

Person

Tariq Yusuf / Raven II / Tamara Bonaci / Raven Attacking / Tadayoshi Kohno / Howard Jay Chizeck / Another / Jeffrey Herron / /

Position

surgeon control inputs / individual surgeon / COMMUNICATION CHANNEL HOSPITAL LEGEND Surgeon / single surgeon / joint controller / surgeon / forward / controller / /

ProgrammingLanguage

C / Python / /

ProvinceOrState

Washington / /

Technology

Interoperable telesurgery protocol / Linux / datagram-based protocols / medical robotics / Operating System / UDP / Core2 Quad CPU processor / Encryption / digital-to-analog conversion / using datagram protocols / /