<node id="686720">
  <nid>686720</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1764776975</created>
  <changed>1765213725</changed>
  <title><![CDATA[What if Hospitals Could Automatically Protect Patients from Cyber Threats?]]></title>
  <body><![CDATA[<p>A software update was missed for the program running your local hospital’s X-ray machines. A hacker now controls all the machines and is demanding $500,000 in cryptocurrency be sent to an anonymous wallet; otherwise, he will shut down the entire radiology department.</p><p>This scenario becomes more likely for hospitals of all sizes as medical technology advances, adding more devices to constantly growing networks.</p><p>With the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H) <a href="https://arpa-h.gov/explore-funding/programs/upgrade">UPGRADE</a> program, a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.&nbsp;</p><p>“This is a new area of security research,” said Associate Professor <strong>Brendan Saltaformaggio</strong>. “We not only have to worry about the cybersecurity aspect, but the physical security as well. Our research must be very accurate to make sure patients are safe from cyberthreats.”&nbsp;</p><p>Starting next month, the team of researchers on the Hospital-Integrated Vulnerability Identification and Proactive Remediation (H-VIPER) project will begin developing a system they are calling the Whole-Hospital Simulation (WHS).</p><p>The system maps out the online network for hospitals of all sizes and enables IT teams to test their cyber capabilities before going live. The system can also identify threats, such as missed software updates, and alert the IT department.</p><p>“Hospitals have thousands of devices connected to their networks, including medical devices,” said Saltaformaggio. “A hospital like Children’s has a huge attack surface. A smaller hospital might have different challenges, but possible entry points are still there.”</p><p>The team has already interviewed IT teams at Children’s Healthcare of Atlanta and Hamilton Health Care System. Their findings have provided them with a better understanding of how to scale the WHS system to meet each hospital’s specific needs.</p><p>“Hospitals IT processes are notoriously sensitive to disruption, because essentially any kind of down time for rebooting a system or lack of availability can create chaos in the clinical environment,” said <strong>Stoddard Manikin</strong>, chief information security officer for Children’s Healthcare of Atlanta.</p><p>“Our goal is to create very smooth processes and workflow for our patient facing staff and providers to deliver the best care possible. This research opportunity gives us a chance to develop news ways where we can look at these sensitive medical devices and things on the IT network in a healthcare environment and potentially remediate vulnerabilities without taking them out of service.”&nbsp;</p><p>Saltaformaggio and his colleagues found that, regardless of size, security remains retroactive and not proactive. By leveraging their diverse expertise, the research team will ensure that the H-VIPER project addresses vulnerabilities at every layer of hospital technology, from the network to the hardware.&nbsp;</p><p>The <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> will lead this initiative, with faculty from the H-VIPER project also representing the <a href="https://www.cc.gatech.edu/">College of Computing</a>, the <a href="https://coe.gatech.edu/">College of Engineering</a>, the <a href="https://ece.gatech.edu/">School of Electrical and Computer Engineering</a>, the <a href="https://www.scs.gatech.edu/">School of Computer Science</a>, and the <a href="https://gtri.gatech.edu/">Georgia Tech Research Institute</a>, along with support from their Ph.D. students and postdoctoral researchers.&nbsp;</p><p>Around 30 Georgia Tech researchers will partner with <a href="https://www.emory.edu/home/index.html">Emory University</a>, <a href="https://www.choa.org">Children’s Healthcare of Atlanta</a>, <a href="https://vitruvianhealth.com/locations/hamilton-medical-center/">Hamilton Health Care System</a>, <a href="https://www.tufts.edu/">Tufts University</a>, <a href="https://www.iastate.edu/">Iowa State University</a>, and <a href="https://narfindustries.com/">Narf Industries</a>.&nbsp;</p><p>Georgia Tech faculty working on the project are:</p><ul><li>Associate Professor <strong>Brendan Saltaformaggio</strong></li><li>Regents’ Professor <strong>Wenke Lee</strong></li><li>Professor <strong>Taesoo Kim</strong></li><li>Professor <strong>Fabian Monrose</strong></li><li>Assistant Professor <strong>Frank Li</strong></li><li>Associate Professor <strong>Saman Zonouz</strong></li><li>Associate Professor<strong> Daniel Genkin</strong></li><li>Research Professor <strong>Sukarno Mertoguno</strong></li><li>Senior Research Scientist <strong>Trevor Lewis</strong> &nbsp;</li></ul>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2025-12-03T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[With the help of a contract award for up to $12 million from ARPA-H, a team of researchers led by the School of Cybersecurity and Privacy at will begin developing an advanced cybersecurity platform to protect hospitals. ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>With the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H), a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.&nbsp;</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="678753">
            <nid>678753</nid>
            <type>image</type>
            <title><![CDATA[Cyfi-Lab-Brendan.jpg]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>262827</fid>
                  <filename><![CDATA[Cyfi-No-Dict-1.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2025/12/03/Cyfi-No-Dict-1.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/12/03/Cyfi-No-Dict-1.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[A man points to a rack of computer monitors. Another man sits in front of a laptop with his back to the camera. ]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>John Popham&nbsp;Communications Officer II | School of Cybersecurity and Privacy</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>1188</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>71891</tid>
        <value><![CDATA[Health and Medicine]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>1188</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[Research Horizons]]></item>
          <item><![CDATA[School of Cybersecurity and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>365</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>193109</tid>
        <value><![CDATA[arpa-h]]></value>
      </item>
          <item>
        <tid>2634</tid>
        <value><![CDATA[grant]]></value>
      </item>
          <item>
        <tid>127901</tid>
        <value><![CDATA[Contract]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>344</tid>
        <value><![CDATA[cyber]]></value>
      </item>
          <item>
        <tid>3532</tid>
        <value><![CDATA[impact]]></value>
      </item>
          <item>
        <tid>4499</tid>
        <value><![CDATA[hospitals]]></value>
      </item>
          <item>
        <tid>179869</tid>
        <value><![CDATA[partners]]></value>
      </item>
          <item>
        <tid>340</tid>
        <value><![CDATA[collaboration]]></value>
      </item>
          <item>
        <tid>1129</tid>
        <value><![CDATA[healthcare]]></value>
      </item>
          <item>
        <tid>194701</tid>
        <value><![CDATA[go-resarchnews]]></value>
      </item>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
