Chapter 6
Victor Frankenstein Audits an IoT Insulin Pump
Victor Frankenstein, Bio-Tech Security Engineer at Geneva Labs, is leading the security audit for a next-generation networked insulin pump before FDA submission. The device runs custom firmware on an ARM SoC, communicates over Bluetooth Low Energy with a clinician's tablet, and pulls signed firmware updates from Geneva's CI/CD pipeline.
Three concerns dominate Victor's review. First, the development team built the firmware-signing key into the build server's environment variables — Victor wants the key generation, storage, and signing operations all to happen inside dedicated tamper-resistant hardware. Second, an attacker with brief physical access to the pump should not be able to swap in a malicious firmware image; the device must verify firmware integrity before each boot, and the boot chain itself must be measured so a remote attestation server can detect tampering after the fact. Third, the company's CI/CD pipeline must catch vulnerable open-source dependencies and produce a machine-readable inventory that hospitals can ingest into their own vulnerability programs — particularly relevant after the Log4Shell scramble two years ago.
Victor also has to plan for the day this pump model reaches end-of-life, and he must defend against a known class of attacks where a small device is wedged between a USB port and a peripheral to silently capture data.
Complete Victor's hardware-assurance review by selecting the correct concept for each blank.