Port 22

How to Attack and Defend a Prosthetic Arm

Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arms positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owners knowledge.