Abstract
Defining and analyzing the impact of cyberattacks on novel generations of BCIs.
- Bonaci, T. et al. App stores for the brain: Privacy and security in brain-computer interfaces. IEEE Tech. and Society Mag. 34, 2 (June 2015), 32--39.Google ScholarCross Ref
- Bysani, L.K. and Turuk, A.K. A survey on selective forwarding attack in wireless sensor networks. In 2011 Intern. Conf. on Devices and Communications, 1--5.Google Scholar
- Camara, C., Peris-Lopez, P., and Tapiador, J.E. Security and privacy issues in implantable medical devices: A comprehensive survey. J. of Biomedical Informatics 55 (2015), 272--289.Google ScholarDigital Library
- Denning, T., Matsuoka, Y., and Kohno, T. Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus FOC 27, 1 (2009), E7.Google ScholarCross Ref
- Douceur, J.R. The Sybil attack. In Proceedings of the 1st Intern. Workshop on Peer-to-Peer Systems, P. Druschel, F. Kaashoek, and A. Rowstron (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg (January 2022), 251--260.Google Scholar
- Edwards, C.A. et al. Neurostimulation devices for the treatment of neurologic disorders. Mayo Clinic Proceedings 92, 9 (September 2017), 1427--1444.Google ScholarCross Ref
- Gal, E. et al. Rich cell-type-specific network topology in neocortical microcircuitry. Nature Neuroscience 20, 7 (July 2017), 1004--1013.Google ScholarCross Ref
- Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symp. on Security and Privacy, 129--142.Google Scholar
- Hartmann, C.J. et al. An update on best practice of deep brain stimulation in Parkinson's disease. Therapeutic Advances in Neurological Disorders 12 (January 2019),Google Scholar
- Izhikevich, E.M. Simple model of spiking neurons. IEEE Transactions on Neural Networks 14, 6 (2003), 1569--1572.Google ScholarDigital Library
- Kalfas, I., Kumar, S., and Vogels, R. Shape selectivity of middle superior temporal sulcus body patch neurons. eNeuro 4, 3 (2017).Google Scholar
- Kandel, E. Principles of Neural Science. McGraw-Hill, New York (2013).Google Scholar
- Kriegeskorte, N. Deep neural networks: A new framework for modeling biological vision and brain information processing. Annual Rev. of Vision Science 1, 1 (2015), 417--446.Google ScholarCross Ref
- Kuzovkin, I. et al. Activations of deep convolutional neural networks are aligned with gamma band activity of human visual cortex. Communications Biology 1, 1 (August 2018), 107.Google ScholarCross Ref
- Lindsay, G.W. Convolutional neural networks as a model of the visual system: Past, present, and future. J. of Cognitive Neuroscience 33, 10 (2021), 2017--2031.Google ScholarCross Ref
- López Bernal, S. et al. Security in brain-computer interfaces: State-of-the-art, opportunities, and future challenges. ACM Computing Surveys 54, 1, Article 11 (January 2021).Google ScholarDigital Library
- López Bernal, S. et al. Cyberattacks on miniature brain implants to disrupt spontaneous neural signaling. IEEE Access 8 (2020), 152204--152222.Google ScholarCross Ref
- López Bernal, S., Huertas Celdrán, A., and Martínez Pérez, G. Neuronal jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities. Computers & Security 112 (2022), 102534.Google ScholarDigital Library
- Martinovic, I. et al. On the feasibility of side-channel attacks with brain-computer interfaces. In Proceedings of the 21st USENIX Conf. on Security Symposium (2012), 34.Google ScholarDigital Library
- Musk, E. An integrated brain-machine interface platform with thousands of channels. J. of Medical Internet Research 21, 10 (October 2019), e16194.Google ScholarCross Ref
- Rehman, A., Rehman, S.U., and Raheem, H. Sinkhole attacks in wireless sensor networks: A survey. Wireless Personal Communications 106, 4 (June 1, 2019), 2291--2313.Google ScholarDigital Library
- Stallings, W. Cryptography and Network Security: Principles and Practice (7th ed.). Pearson, London (2017).Google Scholar
- Stimberg, M., Brette, R., and Goodman, D.F.M. Brian 2, an intuitive and efficient neural simulator. eLife 8 (August 2019), e47314.Google Scholar
- Takabi, H., Bhalotiya, A., and Alohaly, M. Brain computer interface (BCI) applications: Privacy threats and countermeasures. In IEEE 2nd Intern. Conf. on Collaboration and Internet Computing. (2016), 102--111.Google ScholarCross Ref
- Vadlamani, S. et al. Jamming attacks on wireless networks: A taxonomic survey. Intern. J. of Production Economics 172 (2016), 76--94.Google ScholarCross Ref
- Wirdatmadja, S.A. et al. Wireless optogenetic nanonetworks for brain stimulation: Device model and charging protocols. IEEE Transactions on NanoBioscience 16, 8 (2017), 859--872.Google ScholarCross Ref
Index Terms
Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity
Comments