<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Dynamic Cyber Risk Assessment for Connected Medical Devices: the NEMECYS Approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Gencer</forename><surname>Erdogan</surname></persName>
							<email>gencer.erdogan@sintef.no</email>
							<affiliation key="aff0">
								<orgName type="department">Sustainable Communication Technologies</orgName>
								<orgName type="institution">SINTEF Digital</orgName>
								<address>
									<settlement>Oslo</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Laura</forename><surname>Carmichael</surname></persName>
							<email>l.e.carmichael@soton.ac.uk</email>
							<affiliation key="aff2">
								<orgName type="department">IT Innovation Centre</orgName>
								<orgName type="institution">University of Southampton</orgName>
								<address>
									<settlement>Southampton</settlement>
									<country key="GB">U.K</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Steve</forename><surname>Taylor</surname></persName>
							<email>s.j.taylor@soton.ac.uk</email>
							<affiliation key="aff2">
								<orgName type="department">IT Innovation Centre</orgName>
								<orgName type="institution">University of Southampton</orgName>
								<address>
									<settlement>Southampton</settlement>
									<country key="GB">U.K</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Simeon</forename><surname>Tverdal</surname></persName>
							<email>simeon.tverdal@sintef.no</email>
							<affiliation key="aff0">
								<orgName type="department">Sustainable Communication Technologies</orgName>
								<orgName type="institution">SINTEF Digital</orgName>
								<address>
									<settlement>Oslo</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><forename type="middle">Neverdal</forename><surname>Skytterholm</surname></persName>
							<email>andrea.skytterholm@sintef.no</email>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Software Engineering</orgName>
								<orgName type="department" key="dep2">Safety and Security</orgName>
								<orgName type="institution">SINTEF Digital</orgName>
								<address>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Dynamic Cyber Risk Assessment for Connected Medical Devices: the NEMECYS Approach</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">3C8C8A2C72356B47173D2DB623067941</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:49+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>cybersecurity, cyber risk, dynamic, risk assessment, connected medical devices Orcid 0000-0001-9407-5748 (G. Erdogan)</term>
					<term>0000-0001-9391-1310 (L. Carmichael)</term>
					<term>0000-0002-9937-1762 (S. Taylor)</term>
					<term>0000-0003-1660-4127 (S. Tverdal)</term>
					<term>0000-0001-7507-6366 (A. N. Skytterholm)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Connected Medical Devices (CMDs) face many critical cybersecurity challenges. Cybersecurity risk assessment is the industry de facto standard process to assess and mitigate potential cybersecurity risks. However, current cybersecurity risk assessments in the CMD domain are typically static, and many situations are highly dynamic involving changing circumstances of patient care priorities or new vulnerabilities detected at runtime. Thus, there is a clear need to support dynamic, runtime cybersecurity risk assessment where new events are reflected automatically in risk levels, and appropriate controls are recommended for unacceptable risks to return the residual risk to an acceptable level. In the EU project NEMECYS, we are developing an approach to dynamic cyber risk assessment for CMDs. The objective of this paper is to provide a high-level introduction to the NEMECYS project, and then explain in more detail our proposed dynamic cyber risk assessment approach for CMDs.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Cybersecurity of medical devices connected to the internet (CMDs) faces three main critical challenges. These are: A) complex and evolving standards-The guidelines for medical device cybersecurity are complex, overly broad, and incomplete, struggling to keep pace with the rapidly evolving cyber threats and the need for integration in advanced, multi-institutional, and multi-device healthcare environments. B) cost vs. care trade-off -Implementing and maintaining cybersecurity measures is expensive, and an excessive focus on cybersecurity can detract from other aspects that are also critical to high-quality healthcare delivery, such as focus on operational efficiencies and providing person-centred care. C) lifecycle and connectivity challenges-Medical devices must be inherently secure, but connecting them introduces additional vulnerabilities, especially from other devices with unknown weaknesses, complicating the https://nemecys.eu/ overall security landscape. In the EU project NEw MEdical CYbersecurity assessment and design Solutions (NEMECYS), we are addressing these three critical challenges. Table <ref type="table" target="#tab_0">1</ref> shows the project information including funding, duration, and a URL for the project homepage.</p><p>The expected tangible outputs of the project are a set of toolboxes to assess the cybersecurity of CMDs in multi-stakeholder scenarios with different domains of control, as well as help relevant stakeholders to follow security by design best practices and meet regulations. Case studies in NEMECYS include home dialysis treatment, wearable devices for continuous monitoring of movement disorders, software as a medical device, and hospital based point-of-care testing. The toolboxes are grouped in the following three categories.</p><p>1. Tools that dynamically balance the analysis of cyber risks and benefits to ensure the security provided is appropriate, considering both the clinical advantages and ethical considerations, without adding unnecessary and expensive security measures. 2. Tools that help manufacturers follow the best practice and meet regulations to make sure their connected medical devices comply with cybersecurity requirements set by the EU Medical Devices Regulation (MDR) and the EU In Vitro Diagnostic Medical Devices Regulation (IVDR), while minimising the cost. 3. Tools that help medical device manufacturers, CMD system integrators and operators (e.g. hospitals) to design, build, and deploy security into medical devices and connected medical device scenarios, in a cost-effective way.</p><p>This paper focuses mainly on Point 1 above, where we present the work related to dynamic cyber risk assessment for CMDs. The relevance of this work to the Research Challenges in Information Science conference topics are information security, risk management, and e-health, as well as model-driven engineering, web-based applications and services, cyber-physical systems, and (medical) internet of things.</p><p>From a research challenge perspective, we are addressing two main limitations in the state of the art. First, current cybersecurity risk assessments are typically static, and many situations are highly dynamic involving changing circumstances of patient care priorities or new vulnerabilities detected at runtime. There is a clear need to support dynamic, runtime cybersecurity risk management where new events are reflected automatically in risk levels, alarms raised when risk rises unacceptably, and appropriate controls recommended to return the residual risk to an acceptable level <ref type="bibr" target="#b0">[1]</ref>. Second, existing cybersecurity risk analysis schemes are mainly concerned with controlling risks and do not consider benefits and trade-offs between cybersecurity risks and clinical benefits. Existing risk/benefit methodologies for medical devices, e.g. ISO 14971 <ref type="bibr" target="#b1">[2]</ref> are focused on clinical risk/benefit, and only superficially concerned with cybersecurity risks.</p><p>The proposed dynamic cyber risk assessment approach for connected medical devices builds on our existing work CORAS <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and Spyderisk <ref type="bibr" target="#b4">[5]</ref>. Section 2 briefly describes CORAS and explains how it is extended to support dynamic risk assessment for CMDs. Section 3 briefly describes Spyderisk and how it is extended to support automated risk assessment for CMDs. Section 4 explains how CORAS and Spyderisk will collaborate to provide dynamic and automated cyber risk assessment for connected medical devices. Section 5 relates our work to existing work, while Section 6 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">CORAS Risk Indicators</head><p>CORAS is a method for conducting security risk assessment <ref type="bibr" target="#b2">[3]</ref> in line with ISO 27005 <ref type="bibr" target="#b5">[6]</ref>. CORAS provides a customized language for threat and risk modelling and comes with detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of security risk assessment. The CORAS method provides a web-based tool <ref type="bibr" target="#b6">[7]</ref> designed to support documenting, maintaining, and reporting assessment results through risk modelling. The tool is also available as open source <ref type="bibr" target="#b7">[8]</ref>. The reader is referred to the aforementioned sources for further details about CORAS.</p><p>CORAS is extended and specialized for the CMD domain with respect to method, language, and tool in the NEMECYS project. From a method perspective, we introduce a step to identify domain-specific cyber-risk indicators, as part of risk assessment. From a language perspective, we introduce the concept of indicators in the conceptual model of CORAS and extend the CORAS modelling language with a graphical construct for indicators to capture CMD specific risk indicators. From a tool perspective, we extend the CORAS web-based modelling tool to support dynamic risk assessment based on indicator values obtained through other tools, such as monitoring and testing tools.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> shows an excerpt CORAS threat model, featuring indicators developed within the NEMECYS project. This model pertains to a use case involving medical patches for monitoring hydration and daily bodily changes in patients. Before we explain the threat scenario captured in Figure <ref type="figure" target="#fig_0">1</ref>, we need to clarify central concepts in CORAS <ref type="bibr" target="#b2">[3]</ref>.</p><p>• A threat is a potential cause of an unwanted incident. We distinguish between deliberate human threat, accidental human threat, and non-human threat such as malware or failure. • A threat scenario is a chain or series of events that is initiated by a threat and that may lead to an unwanted incident. • A vulnerability is a weakness, flaw or deficiency that opens for, or may be exploited by, a threat to cause harm to or reduce the value of an asset. • An unwanted incident is an event that harms or reduces the value of an asset.</p><p>• An asset is something to which a party assigns value and hence for which the party requires protection. • A party is an organisation, company, person, group or other body on whose behalf the risk assessment is conducted. • An indicator is a piece of information that is relevant for assessing the risk level. An indicator may be assigned to any risk-model element. Figure <ref type="figure" target="#fig_0">1</ref> illustrates cyber risks caused by the two deliberate human threats T1: Insider via the assembly line (third party) and T2: Insider in the organization. Threat T1 exploits the weakness (that can become a vulnerability) CWE-1220: Insufficient granularity of access control <ref type="bibr" target="#b8">[9]</ref> and initiates the threat scenario TS1: Program the patch with vulnerable code before it is fully assembled as a patch. One potential motivation of the attacker is to extract data from many patches, thus, the threat scenario TS2: Attempts to extract sensor data, which in turn may lead to the unwanted incident UI1: Insider successfully extracts sensor data. This unwanted incident may in turn cause harm to the assets A1: Confidentiality of data and thus harm asset A2: Privacy of patient.</p><p>Threat T2 also exploits the vulnerability CWE-1220 to initiate the threat scenario TS3: Programs malicious firmware or credentials into tester computer to later disable encryption in the patch. The tester computer is a computer developers use to test the patches. Next, the insider exploits three vulnerabilities that lead to the threat scenario TS4: The compromised tester computer injects the patch with firmware and credentials. The exploited vulnerabilities are CWE-183: Permissive list of allowed inputs, CWE-184: Incomplete list of disallowed inputs, and CWE-20: Improper input validation. Threat scenario TS4 may then lead to the threat scenarios TS2 or TS5: Attempts to modify sensor data, where the former may lead to unwanted incident UI1, and the latter may lead to unwanted incident UI2. As mentioned above, unwanted incident UI1 may cause harm to the assets A1 and A2, while unwanted incident UI2 may cause harm to assets A3: Integrity of data and thus harm asset A4: Health of patient.</p><p>The indicators are defined as yes/no questions, for example, IN1: Is the access control policy too broad allowing access from unauthorized personnel? Indicator values may be obtained by different means. In some cases it is sufficient to base the indicator value on expert knowledge provided by someone who knows the target system well to decide the value, while in other situations it may be necessary to carry out security tests or monitor the application layer or the network layer in order to derive indicator values based on continuous monitoring. ). We also have an indicator category based on network layer monitoring and an indicator category based on unconventional data sources (not shown in the threat model in Figure <ref type="figure" target="#fig_0">1</ref>). The latter category is to be further explored in the NEMECYS project and is intended to collect data from unconventional data sources, such as data from marketplaces, forums, blogs, and social media <ref type="bibr" target="#b9">[10]</ref>. CORAS threat models with indicators, such as the example in Figure <ref type="figure" target="#fig_0">1</ref>, facilitates dynamic risk assessment for CMDs in the following manner. First, we translate the model into an executable Bayesian network or multi-attribute decision tree script because CORAS diagrams are directed acyclic graphs and can be schematically translated into these formalisms <ref type="bibr" target="#b3">[4]</ref>. Second, we use the indicator values (yes/no) as input parameters to the script and execute the script to obtain a propagated likelihood value, via the chain of threat scenarios, for an unwanted incident. Third, we rerun the script each time the indicator values are updated and thereby dynamically calculate new likelihood levels. We may, of course, input continuous indicator values to the scripts and define logic that returns more fine-grained likelihood values. An unwanted incident that harms one asset represents one risk. The consequence value for a risk is expected to be provided by the party. The risk level is calculated with respect to the likelihood value of an unwanted incident and its consequence value on an asset.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Spyderisk Automated Risk Assessment</head><p>Spyderisk is an automated risk assessment tool providing a systematic cause-and-effect modelling of threats <ref type="bibr" target="#b4">[5]</ref>. Spyderisk follows the ISO 27005 standard for information security, cybersecurity and privacy protection <ref type="bibr" target="#b5">[6]</ref>. The Spyderisk System Modeller provides a web-based graphical interface that can be used to create a model of assets and relations for the target system under test <ref type="bibr" target="#b10">[11]</ref>. The knowledge base is then used to identify threats and their consequences, and threat likelihoods and risk levels are calculated. The end user can then decide what security controls to add (from those proposed) to the model to reduce the likelihood of threats, and re-calculate risks. After this, the end user "can choose to add or change the controls", "re-design the system", or "accept the system design" <ref type="bibr" target="#b10">[11]</ref>. Spyderisk is also an open project <ref type="bibr" target="#b11">[12]</ref>. The reader is referred to the aforementioned sources for further information about Spyderisk.</p><p>As part of the NEMECYS project, the Spyderisk knowledge base is being extended for the CMD domain. Such domain-specific knowledge is being acquired from multiple sources, including desk-based research, and project discussions driven by threat modelling in CORAS and system modelling in Spyderisk related to CMD use cases. Given that cybersecurity of CMD is a "patient safety concern" <ref type="bibr" target="#b12">[13]</ref>, one key area of focus for such extensions is understanding the various types of patient harm that may result from cybersecurity risks. For instance, cybersecurity breaches have the potential to affect the "safe operation" of CMDs that could cause injuries to patients and in some cases "threaten human life" <ref type="bibr" target="#b13">[14]</ref>. As a further example, consider how loss of integrity and loss of availability of data and systems can "indirectly lead to a serious deterioration of health" through "indirect harm", such as "a misdiagnosis", "a delayed diagnosis", "delayed treatment", "inappropriate treatment", "absence of treatment", and "transfusion of inappropriate materials" <ref type="bibr" target="#b14">[15]</ref>. Cybersecurity breaches may also compromise confidentiality of data related to CMDs.</p><p>Of course, cyber risk assessment for CMDs also needs to take account of the "tensions" <ref type="bibr" target="#b15">[16]</ref> between "patient safety", "security design", and "usability" of CMDs <ref type="bibr" target="#b16">[17]</ref>. For example, in some cases, specified control strategies aiming to mitigate cybersecurity risks could compromise the usability of a CMD and increase patient safety risks <ref type="bibr" target="#b16">[17]</ref>, such as in "emergency" situations or as part of other types of "clinical workflow" <ref type="bibr" target="#b15">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Integrated Dynamic Risk Assessment</head><p>As illustrated in Figure <ref type="figure" target="#fig_2">2</ref>, some of the results from CORAS will be used by Spyderisk, and some results from Spyderisk will be used by CORAS. One principal focus for collaboration is that of knowledge acquisition. For instance, the information being captured as part of the CORAS threat models for CMDs relates to key concepts in Spyderisk, such as threats, vulnerabilities, assets and consequences. Information generated through CORAS therefore can be used as an input to Spyderisk domain modelling activities, helping to inform extensions of the Spyderisk knowledge base for the CMD domain, and contributing to the wider Spyderisk Open Project. Another important area of collaboration is enriching threat models for CMDs. The Spyderisk System Modeller provides models of the target system and can generate numerous potential attack paths with respect to the target system model. This information can be used to identify new threat scenarios and indicators for CMDs in the CORAS threat models.</p><p>In addition to risk assessment tools, the NEMECYS project develops other tools, such as vulnerability scanners, firmware fuzzing, and procurement and compliance tools, which all will be used to provide values to the relevant indicators identified in the CORAS threat models. This information will help both CORAS and Spyderisk to calculate risk estimates. Together, CORAS and Spyderisk will produce a cyber risk assessment report for the stakeholders of CMDs. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Work</head><p>To the best of our knowledge, there are only two closely related approaches that have a specific focus on dynamic risk assessment for connected medical devices. Leite et al. <ref type="bibr" target="#b17">[18]</ref> introduce an approach based on dynamic risk assessment and control for medical cyber-physical systems (MCPS). Their approach gathers and uses safety data, patient characteristics, and other relevant information in runtime to dynamically and continuously optimize the system performance and maintain safety. In their later work, Leite et al. expanded their method to better identify risk factors and build risk assessment models using Bayesian networks <ref type="bibr" target="#b18">[19]</ref>. This model accounts for both changes in the patient's health and the system's ability to detect and respond to these changes.</p><p>Li et al. <ref type="bibr" target="#b19">[20]</ref> propose a dynamic medical risk assessment model, for capturing the impacts of factors on the occurrence of adverse events. The authors use static fault trees to show risk scenarios and use Dynamic Bayesian network and Bayesian inference to analyze the operations of medical devices, in consideration of their failures, repairs, and human errors over time.</p><p>While these approaches assess safety risks caused by operational errors in the target system, our approach assesses cybersecurity risks that may compromise the security of medical devices, which in turn may harm patient treatment. Moreover, our approach assesses cybersecurity risks of the context in which connected medical devices are deployed and operate, such as the corruption of data monitored and gathered by medical devices used for treatment, the unavailability of critical services, and the compromise of private patient data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>There is a clear need to support dynamic and runtime cybersecurity risk management for connected medical devices (CMDs), and help existing risk/benefit methodologies for medical devices to explicitly address cybersecurity risks. In the EU project NEMECYS, we are addressing these challenges. We propose a dynamic cyber risk assessment approach for connected medical devices by combining risk indicator capabilities of CORAS <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and automatic risk assessment capabilities of Spyderisk <ref type="bibr" target="#b4">[5]</ref>. The approach helps stakeholders including manufacturers, operators (hospitals) and integrators of CMDs to dynamically and automatically assess and mitigate cybersecurity risks while at the same time understanding the various types of patient harm that may result from cybersecurity risks. In the next phase of the NEMECYS project, our proposed approach will be validated in case studies provided by the stakeholder partners in the project.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: CORAS threat model with indicators.</figDesc><graphic coords="4,89.29,84.19,416.69,186.14" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1</head><label>1</label><figDesc>Figure1illustrates cyber risks caused by the two deliberate human threats T1: Insider via the assembly line (third party) and T2: Insider in the organization. Threat T1 exploits the weakness (that can become a vulnerability) CWE-1220: Insufficient granularity of access control<ref type="bibr" target="#b8">[9]</ref> and initiates the threat scenario TS1: Program the patch with vulnerable code before it is fully assembled as a patch. One potential motivation of the attacker is to extract data from many patches, thus, the threat scenario TS2: Attempts to extract sensor data, which in turn may lead to the unwanted incident UI1: Insider successfully extracts sensor data. This unwanted incident may in turn cause harm to the assets A1: Confidentiality of data and thus harm asset A2: Privacy of patient.Threat T2 also exploits the vulnerability CWE-1220 to initiate the threat scenario TS3: Programs malicious firmware or credentials into tester computer to later disable encryption in the patch. The tester computer is a computer developers use to test the patches. Next, the insider exploits three vulnerabilities that lead to the threat scenario TS4: The compromised tester computer injects the patch with firmware and credentials. The exploited vulnerabilities are CWE-183: Permissive list of allowed inputs, CWE-184: Incomplete list of disallowed inputs, and CWE-20: Improper input validation. Threat scenario TS4 may then lead to the threat scenarios TS2 or TS5: Attempts to modify sensor data, where the former may lead to unwanted incident UI1, and the latter may lead to unwanted incident UI2. As mentioned above, unwanted incident UI1 may cause harm to the assets A1 and A2, while unwanted incident UI2 may cause harm to assets A3: Integrity of data and thus harm asset A4: Health of patient.The indicators are defined as yes/no questions, for example, IN1: Is the access control policy too broad allowing access from unauthorized personnel? Indicator values may be obtained by different means. In some cases it is sufficient to base the indicator value on expert knowledge provided by someone who knows the target system well to decide the value, while in other situations it may be necessary to carry out security tests or monitor the application layer or the network layer in order to derive indicator values based on continuous monitoring. Figure 1 illustrates five indicators: One indicator based on expert knowledge (IN1), one</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: CORAS and Spyderisk integrated dynamic risk assessment.</figDesc><graphic coords="6,193.47,439.26,208.34,84.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell cols="2">NEMECYS project information</cell></row><row><cell cols="2">Project full name: NEw MEdical CYbersecurity assessment and design Solutions</cell></row><row><cell>Acronym:</cell><cell>NEMECYS</cell></row><row><cell>Funding:</cell><cell>EU Horizon Europe</cell></row><row><cell>Start/end date:</cell><cell>1 January 2023 -31 December 2025</cell></row><row><cell>URL:</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been conducted as part of the NEMECYS project, which is co-funded by the European Union (101094323), by UK Research and Innovation (10065802, 10050933 and 10061304), and by the Swiss State Secretariat for Education, Research and Innovation.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Challenges and Opportunities for Conducting Dynamic Risk Assessments in Medical IoT</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Czekster</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grace</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Marcon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hessel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Cazella</surname></persName>
		</author>
		<idno type="DOI">10.3390/app13137406</idno>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<idno>ISO14971:2019, ISO 14971:2019</idno>
		<ptr target="https://www.iso.org/standard/72704.html" />
		<title level="m">-Medical devices -Application of risk management to medical devices</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Model-Driven Risk Analysis: The CORAS Approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lund</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Solhaug</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Stølen</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-12323-8</idno>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin; Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A method for developing algorithms for assessing cyber-risk cost</title>
		<author>
			<persName><forename type="first">G</forename><surname>Erdogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gonzalez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Refsdal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Seehusen</surname></persName>
		</author>
		<idno type="DOI">10.1109/QRS.2017.29</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Software Quality, Reliability and Security (QRS&apos;17)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="192" to="199" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Automated knowledge-based cybersecurity risk assessment of cyber-physical systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Phillips</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Boniface</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Surridge</surname></persName>
		</author>
		<idno type="DOI">10.36227/techrxiv.24061590.v1</idno>
	</analytic>
	<monogr>
		<title level="j">Authorea Preprints</title>
		<imprint>
			<biblScope unit="page" from="1" to="23" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<idno>ISO/IEC 27005:2022</idno>
		<ptr target="https://www.iso.org/standard/80585.html" />
		<title level="m">-Information security, cybersecurity and privacy protection -Guidance on managing information security risks</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><surname>Coras</surname></persName>
		</author>
		<ptr target="https://coras.tools/" />
		<title level="m">CORAS Web Application Tool</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Coras</forename><surname>Coras</surname></persName>
		</author>
		<author>
			<persName><surname>Github</surname></persName>
		</author>
		<ptr target="https://github.com/stverdal/CORAS-The-Explorer" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><surname>Cwe</surname></persName>
		</author>
		<idno>CWE-1220</idno>
		<ptr target="https://cwe.mitre.org/data/definitions/1220.html" />
		<title level="m">Insufficient Granularity of Access Control</title>
				<imprint>
			<publisher>CWE</publisher>
			<date type="published" when="2024">2024</date>
		</imprint>
		<respStmt>
			<orgName>MITRE</orgName>
		</respStmt>
	</monogr>
	<note>Common Weaknesses Enumeration</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A systematic mapping study on cyber security indicator data</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">H</forename><surname>Meland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tokas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Erdogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Bernsmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Omerovic</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics10091092</idno>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><surname>Spyderisk</surname></persName>
		</author>
		<ptr target="https://spyderisk.org/documentation/modeller/latest/" />
		<title level="m">Spyderisk System Modeller Documentation</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Spyderisk GitHub repository</title>
		<ptr target="https://github.com/Spyderisk" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Cybersecurity in health is an urgent patient safety concern: We can learn from existing patient safety improvement strategies to address it</title>
		<author>
			<persName><forename type="first">N</forename><surname>O'brien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghafur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Durkin</surname></persName>
		</author>
		<idno type="DOI">10.1177/2516043520975926</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Patient Safety and Risk Management</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="5" to="10" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Cybersecurity in healthcare: A narrative review of trends, threats and ways forward</title>
		<author>
			<persName><forename type="first">L</forename><surname>Coventry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Branley</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.maturitas.2018.04.008</idno>
	</analytic>
	<monogr>
		<title level="j">Maturitas</title>
		<imprint>
			<biblScope unit="volume">113</biblScope>
			<biblScope unit="page" from="48" to="52" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">Mdcg</forename><surname>Mdcg</surname></persName>
		</author>
		<ptr target="https://health.ec.europa.eu/system/files/2023-02/mdcg_2023-3_en_0.pdf" />
		<title level="m">Questions and Answers on vigilance terms and concepts as outlined in the Regulation (EU) 2017/745 on medical devices</title>
				<imprint>
			<date type="published" when="2023">2023. 2023</date>
		</imprint>
	</monogr>
	<note>-3</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A H</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Woodward</surname></persName>
		</author>
		<idno type="DOI">10.2147/MDER.S50048</idno>
	</analytic>
	<monogr>
		<title level="j">Medical Devices: Evidence and Research</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="305" to="316" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Cybersecurity for Connected Medical Devices</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ray</surname></persName>
		</author>
		<idno type="DOI">10.1016/C2018-0-03213-2</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>Elsevier Inc</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Dynamic risk management for cooperative autonomous medical cyber-physical systems</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">L</forename><surname>Leite</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Adler</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-99229-7_12</idno>
	</analytic>
	<monogr>
		<title level="m">Computer Safety, Reliability, and Security</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="126" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Dynamic risk assessment enabling automated interventions for medical cyber-physical systems</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">L</forename><surname>Leite</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Adler</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-26601-1_15</idno>
	</analytic>
	<monogr>
		<title level="m">Computer Safety, Reliability, and Security</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="216" to="231" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Dynamic risk assessment in healthcare based on Bayesian approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ress.2019.04.040</idno>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering &amp; System Safety</title>
		<imprint>
			<biblScope unit="volume">189</biblScope>
			<biblScope unit="page" from="327" to="334" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
