More and more devices are (or will be in the near future) connected to other devices or to Information systems (IS) which manage or monitor these devices. This trend calls for new approaches and reinforcement of security and testing procedures in order to protect both side: the device itself with people who use it and the IS which monitor/manage the device. Quite recently (last month and last year), different examples show that investments must be made in this area. The first example is coming from e-health sector ([1] and [2]):
- 1) In one episode of the show Homeland, the Vice President of the USA is assassinated by a group of terrorist that have hacked into the pacemaker controlling his heart. Of course, it is only fiction but …
- 2) A researcher hacked his insulin pump using an Arduino module that cost less than 20 USD and Barnaby Jack (who died few weeks ago), at this time a security researcher at McAfee, demonstrated a system that could scan and compromise insulin pumps that communicate wirelessly.