CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

Authors: 

Yisroel Mirsky and Tom Mahler, Ben-Gurion University; Ilan Shelef, Soroka University Medical Center; Yuval Elovici, Ben-Gurion University

Abstract: 

In 2018, clinics and hospitals were hit with numerous attacks leading to significant data breaches and interruptions in medical services. An attacker with access to medical records can do much more than hold the data for ransom or sell it on the black market. In this paper, we show how an attacker can use deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical scans. An attacker may perform this act in order to stop a political candidate, sabotage research, commit insurance fraud, perform an act of terrorism, or even commit murder. We implement the attack using a 3D conditional GAN and show how the framework (CT-GAN) can be automated. Although the body is complex and 3D medical scans are very large, CT-GAN achieves realistic results which can be executed in milliseconds. To evaluate the attack, we focused on injecting and removing lung cancer from CT scans. We show how three expert radiologists and a state-of-the-art deep learning AI are highly susceptible to the attack. We also explore the attack surface of a modern radiology network and demonstrate one attack vector: we intercepted and manipulated CT scans in an active hospital network with a covert penetration test.

USENIX Security '19 Open Access Videos Sponsored by
King Abdullah University of Science and Technology (KAUST)

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {236284,
author = {Yisroel Mirsky and Tom Mahler and Ilan Shelef and Yuval Elovici},
title = {{CT-GAN}: Malicious Tampering of 3D Medical Imagery using Deep Learning},
booktitle = {28th USENIX Security Symposium (USENIX Security 19)},
year = {2019},
isbn = {978-1-939133-06-9},
address = {Santa Clara, CA},
pages = {461--478},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/mirsky},
publisher = {USENIX Association},
month = aug
}

Presentation Video