LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS | SpringerLink
Skip to main content

LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS

  • Conference paper
  • First Online:
Critical Infrastructure Protection XVI (ICCIP 2022)

Abstract

As 3D printing applications in industry verticals increase, researchers have been developing new attacks on additive manufacturing processes and appropriate defense techniques. A major attack category on additive manufacturing processes is printed object sabotage. If an attack causes obvious deformations, the part will be rejected before it is used. However, the inherent layer-by-layer printing process enables malicious actors to induce hidden defects in the internal layers of finished parts. The stealthiness of an attack increases its chances of evading detection and the printed part being used in an operational environment where it can cause harm. Several detection schemes have been proposed for identifying attacks on external and internal features of printed objects, but all these schemes have detection thresholds that are well above printer accuracy. Reducing the attack magnitude to the order of printer accuracy can evade detection.

This chapter describes two infill structure manipulation attacks that are easy to launch at the cyber-physical boundary and evade conventional cyber security tools by employing subtle printed part variations below the detection horizon. Specifically, the magnitudes of the variations fall within the printer resolution and trueness values, rendering it challenging for detection schemes to differentiate printed part modifications from benign printing errors. Destructive testing demonstrates that the infill structure manipulation attacks consistently reduce the strength of printed parts. This chapter also highlights the need to incorporate the physical characteristics of printed parts in attack detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 17159
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 21449
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 21449
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. H. Adjei, T. Shunhua, G. Agordzo, Y. Li, G. Peprah and E. Gyarteng, SSL stripping technique (DHCP snooping and ARP spoofing inspection), Proceedings of the Twenty-Third International Conference on Advanced Communication Technology, pp. 187–193, 2021.

    Google Scholar 

  2. A. Ayub, H. Yoo and I. Ahmed, Empirical study of PLC authentication protocols in industrial control systems, Proceedings of the IEEE Security and Privacy Workshops, pp. 383–397, 2021.

    Google Scholar 

  3. S. Belikovetsky, Y. Solewicz, M. Yampolskiy, J. Toh and Y. Elovici, Digital audio signature for 3D printing integrity, IEEE Transactions on Information Forensics and Security, vol. 14(5), pp. 1127–1141, 2018.

    Google Scholar 

  4. S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin and Y. Elovici, dr0wned – Cyber-physical attack with additive manufacturing, presented at the Eleventh USENIX Workshop on Offensive Technologies, 2017.

    Google Scholar 

  5. S. Chhetri, A. Canedo and M. Al Faruque, KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems, Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2016.

    Google Scholar 

  6. U. Dilberoglu, B. Gharehpapagh, U. Yaman and M. Dolen, The role of additive manufacturing in the era of Industry 4.0, Procedia Manufacturing, vol. 11, pp. 545–554, 2017.

    Google Scholar 

  7. Y. Gao, B. Li, W. Wang, W. Xu, C. Zhou and Z. Jin, Watching and safeguarding your 3D printer: Online process monitoring against cyber-physical attacks, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 2(3), article no. 108, 2018.

    Google Scholar 

  8. G. Goh, S. Sing and W. Yeong, A review of machine learning in 3D printing: Applications, potential and challenges, Artificial Intelligence Review, vol. 54(1), pp. 63–94, 2021.

    Google Scholar 

  9. J. Hanssen, Fortus 360mc/400mc Accuracy Study, Stratasys, Eden Prairie, Minnesota (nanopdf.com/download/fortus-360mc-400mc-accuracy-study_pdf), 2013.

    Google Scholar 

  10. S. Kim, Y. Shin, H. Jung, C. Hwang, H. Baik and J. Cha, Precision and trueness of dental models manufactured with different 3-dimensional printing techniques, American Journal of Orthodontics and Dentofacial Orthopedics, vol. 153(1), pp. 144–153, 2018.

    Google Scholar 

  11. Y. Li, L. Zhu, H. Wang, F. Yu and S. Liu, A cross-layer defense scheme for edge-intelligence-enabled CBTC systems against MitM attacks, IEEE Transactions on Intelligent Transportation Systems, vol. 22(4), pp. 2286–2298, 2021.

    Google Scholar 

  12. Markets and Markets, 3D Printing Market by Offering (Printer, Material, Software, Service), Process (Binder Jetting, Direct Energy Deposition, Material Extrusion, Material Jetting, Powder Bed Fusion), Application, Vertical, Technology and Geography (2021–2026), Market Research Report SE 2936, Northbrook, Illinois (www.marketsandmarkets.com/Market-Reports/3d-printing-market-1276.html), 2021.

    Google Scholar 

  13. M. McCormack, S. Chandrasekaran, G. Liu, T. Yu, S. DeVincent Wolf and V. Sekar, Security analysis of networked 3D printers, Proceedings of the IEEE Security and Privacy Workshops, pp. 118–125, 2020.

    Google Scholar 

  14. S. Moore, W. Glisson and M. Yampolskiy, Implications of malicious 3D printer firmware, Proceedings of the Fiftieth Hawaii International Conference on System Sciences, 2017.

    Google Scholar 

  15. B. Msallem, N. Sharma, S. Cao, F. Halbeisen, H. Zeilhofer and F. Thieringer, Evaluation of the dimensional accuracy of 3D-printed anatomical mandibular models using FFF, SLA, SLS, MJ and BJ printing technology, Journal of Clinical Medicine, vol. 9(3), article no. 817, 2020.

    Google Scholar 

  16. H. Pearce, K. Yanamandra, N. Gupta and R. Karri, FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing, arXiv: 2104.09562 (arxiv.org/abs/2104.09562), 2021.

  17. S. Qasim, A. Ayub, J. Johnson and I. Ahmed, Attacking the IEC-61131 logic engine in programmable logic controllers, in Critical Infrastrucure Protection XV, J. Staggs and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 73–95, 2022.

    Google Scholar 

  18. S. Qasim, J. Lopez and I. Ahmed, Automated reconstruction of control logic for programmable logic controller forensics, in Information Security, Z. Lin, C. Papamanthou and M. Polychronakis (Eds.), Springer, Cham, Switzerland, pp. 402–422, 2019.

    Google Scholar 

  19. S. Qasim, J. Smith and I. Ahmed, Control logic forensics framework using a built-in decompiler of engineering software in industrial control systems, Forensic Science International: Digital Investigation, vol. 33(S), article no. 301013, 2020.

    Google Scholar 

  20. M. Rais, R. Awad, J. Lopez and I. Ahmed, JTAG-based PLC memory acquisition framework for industrial control systems, Forensic Science International: Digital Investigation, vol. 37(S), article no. 301196, 2021.

    Google Scholar 

  21. M. Rais, R. Awad, J. Lopez and I. Ahmed, Memory forensic analysis of a programmable logic controller in industrial control systems, Forensic Science International: Digital Investigation, vol. 40(S), article no. 301339, 2022.

    Google Scholar 

  22. M. Rais, Y. Li and I. Ahmed, Dynamic thermal and localized filament kinetic attacks on a fused-filament-fabrication-based 3D printing process, Additive Manufacturing, vol. 46, article no. 102200, 2021.

    Google Scholar 

  23. M. Rais, Y. Li and I. Ahmed, Spatiotemporal G-code modeling for secure FDM-based 3D printing, Proceedings of the Twelfth ACM/IEEE International Conference on Cyber-Physical Systems, pp. 177–186, 2021.

    Google Scholar 

  24. D. Roach, C. Roberts, J. Wong, X. Kuang, J. Kovitz, Q. Zhang, T. Spence and H. Qi, Surface modification of fused filament fabrication (FFF) 3D printed substrates by inkjet printing polyimide for printed electronics, Additive Manufacturing, vol. 36, article no. 101544, 2020.

    Google Scholar 

  25. L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems, Proceedings of the International Solid Freeform Fabrication Symposium, pp. 951–963, 2014.

    Google Scholar 

  26. S. Vasile, D. Oswald and T. Chothia, Breaking all the things – A systematic survey of firmware extraction techniques for IoT devices, in Smart Card Research and Advanced Applications, B. Bilgin and J. Fischer (Eds.), Springer, Cham, Switzerland, pp. 171–185, 2019.

    Google Scholar 

  27. M. Wu, H. Zhou, L. Lin, B. Silva, Z. Song, J. Cheung and Y. Moon, Detecting attacks in cyber manufacturing systems: Additive manufacturing example, Proceedings of the International Conference on Mechanical, Aeronautical and Automotive Engineering, 2017.

    Google Scholar 

  28. C. Xiao, Security attack on 3D printing, presented at the xFocus Security Conference (www.claudxiao.net/Attack3DPrinting-Claud-en.pdf), 2013.

    Google Scholar 

  29. S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, Manufacturing and security challenges in 3D printing, Journal of the Minerals, Metals and Manufacturing Society, vol. 68(7), pp. 1872–1881, 2016.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irfan Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rais, M.H., Ahsan, M., Sharma, V., Barua, R., Prins, R., Ahmed, I. (2022). LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XVI. ICCIP 2022. IFIP Advances in Information and Communication Technology, vol 666. Springer, Cham. https://doi.org/10.1007/978-3-031-20137-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20137-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20136-3

  • Online ISBN: 978-3-031-20137-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics