{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T12:45:53Z","timestamp":1652273153027},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11623-022-1603-x","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T11:05:15Z","timestamp":1652267115000},"page":"276-283","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sicherheit medizintechnischer Protokolle im Krankenhaus"],"prefix":"10.1007","volume":"46","author":[{"given":"Christoph","family":"Saatjohann","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Ising","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Gierlings","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Noss","sequence":"additional","affiliation":[]},{"given":"Sascha","family":"Schimmler","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Klemm","sequence":"additional","affiliation":[]},{"given":"Leif","family":"Grundmann","sequence":"additional","affiliation":[]},{"given":"Tilman","family":"Frosch","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schinzel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"1603_CR1","unstructured":"Agnew, Joe: Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline. Bericht, Rapid7, April 2019. https:\/\/www.rapid7.com\/blog\/post\/2019\/04\/29\/medical-device-security-how-toscan-devices-without-letting-safety-flatline."},{"key":"1603_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30370-3","volume-title":"Principles of Health Interoperability","author":"T Benson","year":"2016","unstructured":"Benson, Tim; Grieve, Graham: Principles of Health Interoperability. Springer Verlag London, 3. Auflage, 2016.","edition":"3"},{"key":"1603_CR3","unstructured":"Blobel, Bernd; Spiegel, Volker; Pharow, Peter; Engel, Kjeld; Krohn, Rolf: Standard Guide for EDI (HL7) Communication Security. 1999. https:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=238."},{"key":"1603_CR4","doi-asserted-by":"crossref","unstructured":"Bhargavan, Karthikeyan; Leurent, Ga\u00ebtan: On the Practical (In-)Security of 64-Bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201916, Association for Computing Machinery, New York, NY, USA, S. 456\u2013467, 2016.","DOI":"10.1145\/2976749.2978423"},{"key":"1603_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Open Vulnerability Assessment System (OpenVAS). https:\/\/www.bsi.bund.de\/EN\/Topics\/Industry_CI\/ICS\/ Tools\/OpenVAS\/OpenVAS_node.html, abgerufen am 20.09.2021."},{"key":"1603_CR6","unstructured":"Bundesgesetzblatt Jahrgang 2015: Gesetz f\u00fcr sichere digitale Kommunikation und Anwendungen im Gesundheitswesen sowie zur \u00c4nderung weiterer Gesetze. Bundesanzeiger Verlag, Kapitel Teil 1, Nr. 54, S. 2408\u20132423, Dezember 2015. http:\/\/www.bgbl.de\/ xaver\/bgbl\/start.xav?startbk=Bundesanzeiger_BGBl&jumpTo=bgbl115s2408.pdf."},{"key":"1603_CR7","doi-asserted-by":"crossref","unstructured":"NHapi. http:\/\/nhapi.sourceforge.net\/home.php, abgerufen am: 09.11.2021.","DOI":"10.21100\/gswr.v1i1.1103"},{"key":"1603_CR8","unstructured":"Dameff, Christian; Bland, Maxwell; Levchenko, Kirill; Tully, Jeff: Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives. In: Blackhat USA 2018. August 2018. https:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Dameff-PestilentialProtocol-How-Unsecure-HL7-Messages-Threaten-Patient-Lives-wp.pdf."},{"key":"1603_CR9","unstructured":"Duggal, Anirudh: HL7 2.X Security. In: HITBSecConf 2017. April 2017. https:\/\/paper.bobylive.com\/Meeting_Papers\/HITB\/2017\/D2T2---AnirudhDuggal---Hacking-Medical-Devices-and-Healthcare-Infrastructure.pdf."},{"issue":"8","key":"1603_CR10","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1016\/j.acra.2020.03.026","volume":"27","author":"M Eichelberg","year":"2020","unstructured":"Eichelberg, Marco; Kleber, Klaus; K\u00e4mmerer, Marc: Cybersecurity Challenges for PACS and Medical Imaging. Academic Radiology, 27(8):1126\u20131139, 2020.","journal-title":"Academic Radiology"},{"key":"1603_CR11","doi-asserted-by":"crossref","unstructured":"Eichelberg, Marco; Kleber, Klaus; K\u00e4mmerer, Marc: Cybersecurity in PACS and Medical Imaging: an Overview. Journal of Digital Imaging, 2020.","DOI":"10.1007\/s10278-020-00393-3"},{"key":"1603_CR12","doi-asserted-by":"crossref","unstructured":"Eichelberg, Marco; Kleber, Klaus; K\u00e4mmerer, Marc: Cybersecurity Protection for PACS and Medical Imaging: Deployment Considerations and Practical Problems. Academic Radiology, 2020.","DOI":"10.1016\/j.acra.2020.03.026"},{"key":"1603_CR13","unstructured":"gematik:SpezifikationKonnektor,Version5.14.0. September2021. https:\/\/fachportal.gematik.de\/fachportal-import\/files\/gemSpec_Kon_V5.14.0.pdf."},{"key":"1603_CR14","unstructured":"OpenVAS \u2013 Open Vulnerability Assessment Scanner. https:\/\/openvas.org, abgerufen am 09.11.2021."},{"key":"1603_CR15","unstructured":"Greenbone Networks GmbH: Sicherheitsbericht \u2013 Ungesch\u00fctzte Patientendaten im Internet. September 2019. https:\/\/www.greenbone.net\/wp-content\/uploads\/ CyberResilienceReport_DE.pdf."},{"key":"1603_CR16","unstructured":"Health Level Seven International: Health Level Seven Version 3. Januar 2017. https:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=186."},{"key":"1603_CR17","unstructured":"Health Level Seven International: HL7 Messaging Standard Version 2.9. Dezember 2019. https:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=516."},{"key":"1603_CR18","doi-asserted-by":"crossref","unstructured":"Joyia, Gulraiz Javaid; Akram, Muhammad Usman; Akbar, Chaudary Naeem; Maqsood, Muhammad Furqan: Evolution of Health Level-7: A Survey. In: Proceedings of the 2018 International Conference on Software Engineering and Information Management. ICSIM2018, Association for Computing Machinery, New York, NY, USA, S. 118\u2013123, 2018.","DOI":"10.1145\/3178461.3178480"},{"key":"1603_CR19","doi-asserted-by":"crossref","unstructured":"Klick, Johannes; Koch, Robert; Brandstetter, Thomas: Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic. In: 2021 13th International Conference on Cyber Conflict (CyCon). S. 73\u201394, 2021.","DOI":"10.23919\/CyCon51939.2021.9468304"},{"key":"1603_CR20","doi-asserted-by":"crossref","unstructured":"Kaliski, B.; Staddon, J.: PKCS #1: RSA Cryptography Specifications Version 2.0. Internet Engineering Task Force (IETF), Oktober 1998. https:\/\/datatracker.ietf.org\/doc\/ html\/rfc2437.","DOI":"10.17487\/rfc2437"},{"key":"1603_CR21","unstructured":"Man\u00e8s, Valentin Jean Marie; Han, HyungSeok; Han, Choongwoo; Cha, Sang Kil; Egele, Manuel; Schwartz, Edward J.; Woo, Maverick: The Art, Science, and Engineering of Fuzzing: A Survey. IEEE Transactions on Software Engineering, S. 1\u20131, 2019."},{"key":"1603_CR22","unstructured":"SharpFuzz: Bringing the power of afl-fuzz to .NET platform. https:\/\/mijailovic.net\/2019\/01\/03\/sharpfuzz\/, abgerufen am: 09.11.2021."},{"key":"1603_CR23","unstructured":"National Electrical Manufacturers Association (NEMA): The DICOM Standard. http:\/\/dicom.nema.org\/medical\/dicom\/2021d\/, 2021. Stand 2021d, abgerufen am 05.11.2021."},{"key":"1603_CR24","unstructured":"NIST: Update to Current Use and Deprecation of TDEA. Juli 2017. https:\/\/csrc.nist.gov\/News\/2017\/Update-to-Current-Use-and-Deprecation-of-TDEA."},{"key":"1603_CR25","unstructured":"DICOM-Toolkit (DCMTK). https:\/\/dcmtk.org\/, abgerufen am: 09.11.2021."},{"key":"1603_CR26","unstructured":"Security Work Group: HL7 Healthcare Privacy and Security Classification System (HCS). Bericht, HL7 International, August 2014. https:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=345."},{"key":"1603_CR27","unstructured":"Sutton, Michael; Greene, Adam; Amini, Pedram: Fuzzing \u2013 Brute Force Vulnerability Discovery. Pearson Education Inc., 2007."},{"key":"1603_CR28","doi-asserted-by":"crossref","unstructured":"Sheffer, Y.; Holz, R.; Saint-Andre, P.: Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Internet Engineering Task Force (IETF), Mai 2015. https:\/\/tools.ietf.org\/pdf\/bcp195.pdf.","DOI":"10.17487\/RFC7525"},{"key":"1603_CR29","doi-asserted-by":"crossref","unstructured":"Somorovsky, Juraj: Systematic Fuzzing and Testing of TLS Libraries. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201916, Association for Computing Machinery, New York, NY, USA, S. 1492\u20131504, 2016.","DOI":"10.1145\/2976749.2978411"},{"key":"1603_CR30","doi-asserted-by":"crossref","unstructured":"Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik: The first collision for full SHA-1. In: Annual international cryptology conference. Springer, S. 570\u2013596, 2017.","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"1603_CR31","unstructured":"Saatjohann,Christoph;Tschirsich,Martin;Brodowski,Christian:Tutmalkurzweh\u2013Neues aus der Gesundheits-IT. In: Remote Chaos Experience (rC3). Dezember 2020. https:\/\/media.ccc.de\/v\/rc3-11342-tut_mal_kurz_weh_neues_aus_der_gesundheits-it."},{"key":"1603_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Zhiqiang; Li, Quanqi; Wang, Yazhe; Liu, Biao; Zhang, Jianyi; Liu, Qixu: Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. In: The 2019 ACM SIGSAC Conference. S. 2549\u20132551, 11 2019.","DOI":"10.1145\/3319535.3363253"},{"key":"1603_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, Xiaoyun; Yu, Hongbo: How to Break MD5 and Other Hash Functions. In (Cramer, Ronald, Hrsg.): Advances in Cryptology \u2013 EUROCRYPT 2005. Springer Berlin Heidelberg, Berlin, Heidelberg, S. 19\u201335, 2005."},{"key":"1603_CR34","unstructured":"american fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/, abgerufen am: 09.11.2021."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1603-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-022-1603-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-022-1603-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T12:16:27Z","timestamp":1652271387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-022-1603-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1603"],"URL":"https:\/\/doi.org\/10.1007\/s11623-022-1603-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5]]},"assertion":[{"value":"11 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}