3 research outputs found
A Hazard Analysis Technique for Additive Manufacturing
The promise of Additive Manufacturing (AM) includes reduced transportation
and warehousing costs, reduction of source material waste, and reduced
environmental impact. AM is extremely useful for making prototypes and has
demonstrated the ability to manufacture complex parts not possible (or
prohibitively expensive) with conventional machining. Scientists and
manufactures are finding increased uses for AM in creation of all types of
finished products including those built from polymers, biological material, and
metals. Although companies such as GE have been using 3D printing for Additive
Manufacturing for over thirty years to make mandrels for light bulb
manufacturing, application areas of Additive Manufacturing have increased
substantially in recent years, particularly due to the reduction in cost of 3D
printers. Like most emergent technologies, there are bound to be growing pains
with AM. This paper looks at the software that supports AM and 3D printing and
their vulnerability to cyber-attacks, intellectual property theft, defect rates
of AM software (which can cause undesired consequences themselves and also
create vulnerabilities that a hacker may exploit), part reliability and safety
of devices incorporating 3D printed parts (when making mission critical parts),
and security/throughput issues of computer networks. Literature searches,
consulting with technical experts and a relatively new hazard analysis
technique will be used, one especially developed for software intensive systems
called Systemic Theoretic Process Analysis (STPA). The purpose of this white
paper is to identify risks (or hazards for mission critical parts) for AM in
this emergent stage so that mitigations can be applied before accidents occur.
A second purpose of this white paper is to evaluate the effectiveness of STPA
as a hazard analysis technique in a field that is still relatively new.Comment: Better Software East Conference, 201
Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing
Additive Manufacturing (AM, or 3D printing) is a novel manufacturing
technology that is being adopted in industrial and consumer settings. However,
the reliance of this technology on computerization has raised various security
concerns. In this paper we address sabotage via tampering with the 3D printing
process. We present an object verification system using side-channel
emanations: sound generated by onboard stepper motors. The contributions of
this paper are following. We present two algorithms: one which generates a
master audio fingerprint for the unmodified printing process, and one which
computes the similarity between other print recordings and the master audio
fingerprint. We then evaluate the deviation due to tampering, focusing on the
detection of minimal tampering primitives. By detecting the deviation at the
time of its occurrence, we can stop the printing process for compromised
objects, thus save time and prevent material waste. We discuss impacts on the
method by aspects like background noise, or different audio recorder positions.
We further outline our vision with use cases incorporating our approach
A Survey on Limitation, Security and Privacy Issues on Additive Manufacturing
Additive manufacturing (AM) is growing as fast as anyone can imagine, and it
is now a multi-billion-dollar industry. AM becomes popular in a variety of
sectors, such as automotive, aerospace, biomedical, and pharmaceutical, for
producing parts/ components/ subsystems. However, current AM technologies can
face vast risks of security issues and privacy loss. For the security of AM
process, many researchers are working on the defense mechanism to
countermeasure such security concerns and finding efficient ways to eliminate
those risks. Researchers have also been conducting experiments to establish a
secure framework for the user's privacy and security components. This survey
consists of four sections. In the first section, we will explore the relevant
limitations of additive manufacturing in terms of printing capability,
security, and possible solutions. The second section will present different
kinds of attacks on AM and their effects. The next part will analyze and
discuss the mechanisms and frameworks for access control and authentication for
AM devices. The final section examines the security issues in various
industrial sectors and provides the observations on the security of the
additive manufacturing process.Comment: 10 Page