Award Abstract # 1329686
TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: TRUSTEES OF DARTMOUTH COLLEGE
Initial Amendment Date: August 14, 2013
Latest Amendment Date: April 24, 2019
Award Number: 1329686
Award Instrument: Continuing Grant
Program Manager: Sol Greenspan
sgreensp@nsf.gov
 (703)292-7841
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2013
End Date: August 31, 2020 (Estimated)
Total Intended Award Amount: $4,000,000.00
Total Awarded Amount to Date: $4,139,814.00
Funds Obligated to Date: FY 2013 = $738,036.00
FY 2014 = $763,744.00

FY 2015 = $817,282.00

FY 2016 = $822,856.00

FY 2017 = $858,082.00

FY 2019 = $139,814.00
History of Investigator:
  • David Kotz (Principal Investigator)
    David.F.Kotz@Dartmouth.edu
  • M. Eric Johnson (Co-Principal Investigator)
  • Lisa Marsch (Co-Principal Investigator)
Recipient Sponsored Research Office: Dartmouth College
7 LEBANON ST
HANOVER
NH  US  03755-2170
(603)646-3007
Sponsor Congressional District: 02
Primary Place of Performance: Dartmouth College
6211 Sudikoff Lab
Hanover
NH  US  03755-3510
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): EB8ASJBCFER9
Parent UEI: T4MWFG59C6R3
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
01001415DB NSF RESEARCH & RELATED ACTIVIT

01001516DB NSF RESEARCH & RELATED ACTIVIT

01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 1594, 7434, 8087, 9150
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud-based services. The interdisciplinary research team includes expertise from computer science, business, behavioral health, health policy, and healthcare information technology to enable the creation of health & wellness systems that can be trusted by individual citizens to protect their privacy and can be trusted by health professionals to ensure data integrity and security. Although these problems are motivated by a nationally important application domain (health and wellness), the solutions have applications far beyond that domain.

This project is developing methods to authenticate clinical staff to tablet computers in a continuous and unobtrusive way, and to provide patients a usable way to control the information that mobile sensors collect about them. One of the goals is to manage security of healthcare devices in the home and in remote clinics, without adding burden on the homeowner or clinical staff; towards this end the investigators are developing methods to verify medical directives issued to remote devices. One approach being investigated is segmenting access to medical records from mobile devices to limit information exposure, and developing methods to audit behavior of this complex ecosystem of devices and systems. The investigators will design tools to handle genomic data in the cloud while enabling patient control over information, detect malware in medical devices through power analysis, and provide contextual information to those who use health data collected in the field.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 17)
Aarathi Prasad and David Kotz. "ENACT: Encounter-based Architecture for Contact Tracing." ACM Workshop on Physical Analytics (WPA) , v.June , 2017
Burns, A.J., M. Eric Johnson, and Peter Honeyman "A Brief Chronology of Medical Device Security" Communications of the ACM , v.59 , 2016
David Kotz, Carl A. Gunter, Santosh Kumar, and Jonathan P. Weiner "Privacy and Security in Mobile Health - A Research Agenda" IEEE Computer , v.49 , 2016 , p.22 10.1109/MC.2016.185
Jemal, Jay and Kornegay, Kevin T. "Security Assessment of Blockchains in Heterogenous IoT Networks : Invited Presentation" Proceedings of the Annual Conference on Information Sciences and Systems (CISS) , 2019 10.1109/CISS.2019.8693034 Citation Details
J. Jemal and K. T. Kornegay "Security Assessment of Blockchains in Heterogenous IoT Networks: Invited Presentation" Proceedings of the Annual Conference on Information Sciences and Systems (CISS) , 2019 , p.1 10.1109/CISS.2019.8693034
Kotz, D., Gunter, C., Kumar, S., Weiner, J. "Privacy and Security in Mobile Health: A Research Agenda." Computer , v.49 , 2016 , p.22 http://doi.ieeecomputersociety.org/10.1109/MC.2016.185
Rui Liu, Cory Cornelius*, Reza Rawassizadeh, Ron Peterson, David Kotz "Poster: Vocal Resonance as a Passive Biometric" The 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys?17) , 2017 10.1145/3081333.3089304
Rui Liu, Reza Rawassizadeh, David Kotz "Toward Accurate and Efficient Feature Selection for Speaker Recognition on Wearables" The 3rd ACM Workshop on Wearable Systems and Applications (WearSys?17) , 2017 3089351.3089352
Sen, Sougata and Kotz, David "VibeRing: Using vibrations from a smart ring as an out-of-band channel for sharing secret keys" Proceedings of the International Conference on the Internet of Things (IoT) , 2020 https://doi.org/10.1145/3410992.3410995 Citation Details
Shrirang Mare and Reza Rawassizadeh and Ronald Peterson and David Kotz "Continuous Smartphone Authentication using Wristbands" Proc. of the Workshop on Usable Security (USEC) , 2019 10.14722/usec.2019.23013
Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz "SAW: Wristband-based authentication for desktop computers" Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (Ubicomp) , v.2 , 2018 , p.125 10.1145/3264935
(Showing: 1 - 10 of 17)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

 

The mission of the Trustworthy Health and Wellness (THaW) project was to enable the promise of health and wellness technology by innovating mobile- and cloud-computing systems that respect the privacy of individuals and the trustworthiness of medical information.

Our long-term goal was to facilitate the creation of health and wellness systems that can be trusted by individual citizens to protect their privacy and can be trusted by health professionals to ensure data integrity and security.

Intellectual merit: THaW research spanned a wide range of topics related to security and privacy for mobile and cloud technology in health and wellness contexts, including authentication, access control, intrusion detection, privacy-preserving databases, wearable devices, genomic privacy, hardware security, and more.  The team published more than 118 papers, 10 PhD dissertations, and 19 other documents and books. Most of these publications are online, as is a collection of videos related to our research, at thaw.org. Here are some examples of the THaW project’s scientific contributions, in no particular order.

  • We developed Wanda, a novel method for introducing new medical devices (or more generally, the Internet of Things) to a home or enterprise network, in a secure and usable manner.

  • We developed a technique for performing queries on sensitive medical data without exposing the data in clear form outside of a trusted server by using a novel application of homomorphic encryption. 

  • We surveyed techniques to protect the privacy of genomic data.

  • We identified key security concerns in mHealth apps.

  • We explored the relationship between data breaches and hospital advertising expenditures, and whether meaningful-use attestation policies improve information security performance.

  • We identified cybersecurity vulnerabilities of cardiac implantable electronic devices.

  • We demonstrated the danger of smartphone side-channels for smartphones.

  • We discovered risks to voice-controlled systems, such as intelligent personal assistants and smart speakers, that may be posed by an adversary using a laser to inject sound into the device microphone.

  • We discovered that mechanical components in magnetic hard disk drives behave as microphones with sufficient precision to extract and parse human speech.

  • We demonstrated that adversaries can remotely manipulate the temperature sensor measurements of infant incubators and other medical devices by exploiting a vulnerability of electrical components, and how to effectively mitigate the effect to ensure security and safety of these systems.

  • We developed CSAW, a novel way to verify the actual user of a desktop computer or smartphone, by comparing the person’s wrist movements with the keystrokes, mouse movements, or phone movements.

  • We discovered a new ‘vocal resonance’ method for using a person’s internal body voice (the sound of their voice as measured on the surface of their body) to enable their wearable devices to automatically recognize them – for example, to verify that the correct patient is wearing a medical sensor.

  • We developed Sentinel, a tool for protecting connected medical devices by monitoring their internal communication lines for anomalous behavior.

  • We built the first systematization of knowledge about analog attacks against sensor circuitry and defenses. The model allows a quantification of risk for designing and evaluating sensors, predicting new attack vectors, and establishing defensive design patterns that make sensors more resistant to analog attacks.

Broader impacts: THaW involved dozens of undergraduate and graduate students in research, engaged high-school classes with mobile-health devices, hosted weekend gatherings for diverse college students interested in pursuing graduate study in computing, hosted international workshops to bring computer-science and health-care communities together around the topic of cybersecurity, established workshops to train medical-device engineers in cybersecurity, provided expertise to government leaders and national societies, convened CISOs from across the industry to engage in information sharing and brainstorming future approaches to securing healthcare platforms, patented several of its innovations, and spun off a start-up company to commercialize THaW technology. Specific examples:

  • We conducted several outreach programs involving high-school students in Maryland and New Hampshire, in which the students wore Fitbit activity trackers and learned about the technology inside, as well as the privacy issues that arise from such technology.

  • Over 80 students and postdocs engaged in THaW research activities, mentored by the THaW faculty, including at least 10 undergraduate students, 29 graduate students, and 8 postdoctoral scholars.  Many of these mentees are from groups traditionally under-represented in computing, including women and underrepresented minorities.

  • We submitted more than 11 patent applications, several of which have already been granted, to encourage and enable eventual commercialization of THaW technology.

  • The Archimedes Center for Medical Device Security in Michigan offered a twice-annual training conference on how to integrate THaW security principles into the design of medical devices to clinical engineers and CISOs from hospitals and medical device manufacturers. Over 10,000 people and more than 100 industry organizations attended the events. In addition, we conducted on-site security training for more than 500 medical device engineers over the years.

For more information about the THaW project, please see thaw.org.


Last Modified: 12/18/2020
Modified by: David F Kotz

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page