Abstract
As 3D printing applications in industry verticals increase, researchers have been developing new attacks on additive manufacturing processes and appropriate defense techniques. A major attack category on additive manufacturing processes is printed object sabotage. If an attack causes obvious deformations, the part will be rejected before it is used. However, the inherent layer-by-layer printing process enables malicious actors to induce hidden defects in the internal layers of finished parts. The stealthiness of an attack increases its chances of evading detection and the printed part being used in an operational environment where it can cause harm. Several detection schemes have been proposed for identifying attacks on external and internal features of printed objects, but all these schemes have detection thresholds that are well above printer accuracy. Reducing the attack magnitude to the order of printer accuracy can evade detection.
This chapter describes two infill structure manipulation attacks that are easy to launch at the cyber-physical boundary and evade conventional cyber security tools by employing subtle printed part variations below the detection horizon. Specifically, the magnitudes of the variations fall within the printer resolution and trueness values, rendering it challenging for detection schemes to differentiate printed part modifications from benign printing errors. Destructive testing demonstrates that the infill structure manipulation attacks consistently reduce the strength of printed parts. This chapter also highlights the need to incorporate the physical characteristics of printed parts in attack detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
H. Adjei, T. Shunhua, G. Agordzo, Y. Li, G. Peprah and E. Gyarteng, SSL stripping technique (DHCP snooping and ARP spoofing inspection), Proceedings of the Twenty-Third International Conference on Advanced Communication Technology, pp. 187–193, 2021.
A. Ayub, H. Yoo and I. Ahmed, Empirical study of PLC authentication protocols in industrial control systems, Proceedings of the IEEE Security and Privacy Workshops, pp. 383–397, 2021.
S. Belikovetsky, Y. Solewicz, M. Yampolskiy, J. Toh and Y. Elovici, Digital audio signature for 3D printing integrity, IEEE Transactions on Information Forensics and Security, vol. 14(5), pp. 1127–1141, 2018.
S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin and Y. Elovici, dr0wned – Cyber-physical attack with additive manufacturing, presented at the Eleventh USENIX Workshop on Offensive Technologies, 2017.
S. Chhetri, A. Canedo and M. Al Faruque, KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems, Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2016.
U. Dilberoglu, B. Gharehpapagh, U. Yaman and M. Dolen, The role of additive manufacturing in the era of Industry 4.0, Procedia Manufacturing, vol. 11, pp. 545–554, 2017.
Y. Gao, B. Li, W. Wang, W. Xu, C. Zhou and Z. Jin, Watching and safeguarding your 3D printer: Online process monitoring against cyber-physical attacks, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 2(3), article no. 108, 2018.
G. Goh, S. Sing and W. Yeong, A review of machine learning in 3D printing: Applications, potential and challenges, Artificial Intelligence Review, vol. 54(1), pp. 63–94, 2021.
J. Hanssen, Fortus 360mc/400mc Accuracy Study, Stratasys, Eden Prairie, Minnesota (nanopdf.com/download/fortus-360mc-400mc-accuracy-study_pdf), 2013.
S. Kim, Y. Shin, H. Jung, C. Hwang, H. Baik and J. Cha, Precision and trueness of dental models manufactured with different 3-dimensional printing techniques, American Journal of Orthodontics and Dentofacial Orthopedics, vol. 153(1), pp. 144–153, 2018.
Y. Li, L. Zhu, H. Wang, F. Yu and S. Liu, A cross-layer defense scheme for edge-intelligence-enabled CBTC systems against MitM attacks, IEEE Transactions on Intelligent Transportation Systems, vol. 22(4), pp. 2286–2298, 2021.
Markets and Markets, 3D Printing Market by Offering (Printer, Material, Software, Service), Process (Binder Jetting, Direct Energy Deposition, Material Extrusion, Material Jetting, Powder Bed Fusion), Application, Vertical, Technology and Geography (2021–2026), Market Research Report SE 2936, Northbrook, Illinois (www.marketsandmarkets.com/Market-Reports/3d-printing-market-1276.html), 2021.
M. McCormack, S. Chandrasekaran, G. Liu, T. Yu, S. DeVincent Wolf and V. Sekar, Security analysis of networked 3D printers, Proceedings of the IEEE Security and Privacy Workshops, pp. 118–125, 2020.
S. Moore, W. Glisson and M. Yampolskiy, Implications of malicious 3D printer firmware, Proceedings of the Fiftieth Hawaii International Conference on System Sciences, 2017.
B. Msallem, N. Sharma, S. Cao, F. Halbeisen, H. Zeilhofer and F. Thieringer, Evaluation of the dimensional accuracy of 3D-printed anatomical mandibular models using FFF, SLA, SLS, MJ and BJ printing technology, Journal of Clinical Medicine, vol. 9(3), article no. 817, 2020.
H. Pearce, K. Yanamandra, N. Gupta and R. Karri, FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing, arXiv: 2104.09562 (arxiv.org/abs/2104.09562), 2021.
S. Qasim, A. Ayub, J. Johnson and I. Ahmed, Attacking the IEC-61131 logic engine in programmable logic controllers, in Critical Infrastrucure Protection XV, J. Staggs and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 73–95, 2022.
S. Qasim, J. Lopez and I. Ahmed, Automated reconstruction of control logic for programmable logic controller forensics, in Information Security, Z. Lin, C. Papamanthou and M. Polychronakis (Eds.), Springer, Cham, Switzerland, pp. 402–422, 2019.
S. Qasim, J. Smith and I. Ahmed, Control logic forensics framework using a built-in decompiler of engineering software in industrial control systems, Forensic Science International: Digital Investigation, vol. 33(S), article no. 301013, 2020.
M. Rais, R. Awad, J. Lopez and I. Ahmed, JTAG-based PLC memory acquisition framework for industrial control systems, Forensic Science International: Digital Investigation, vol. 37(S), article no. 301196, 2021.
M. Rais, R. Awad, J. Lopez and I. Ahmed, Memory forensic analysis of a programmable logic controller in industrial control systems, Forensic Science International: Digital Investigation, vol. 40(S), article no. 301339, 2022.
M. Rais, Y. Li and I. Ahmed, Dynamic thermal and localized filament kinetic attacks on a fused-filament-fabrication-based 3D printing process, Additive Manufacturing, vol. 46, article no. 102200, 2021.
M. Rais, Y. Li and I. Ahmed, Spatiotemporal G-code modeling for secure FDM-based 3D printing, Proceedings of the Twelfth ACM/IEEE International Conference on Cyber-Physical Systems, pp. 177–186, 2021.
D. Roach, C. Roberts, J. Wong, X. Kuang, J. Kovitz, Q. Zhang, T. Spence and H. Qi, Surface modification of fused filament fabrication (FFF) 3D printed substrates by inkjet printing polyimide for printed electronics, Additive Manufacturing, vol. 36, article no. 101544, 2020.
L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems, Proceedings of the International Solid Freeform Fabrication Symposium, pp. 951–963, 2014.
S. Vasile, D. Oswald and T. Chothia, Breaking all the things – A systematic survey of firmware extraction techniques for IoT devices, in Smart Card Research and Advanced Applications, B. Bilgin and J. Fischer (Eds.), Springer, Cham, Switzerland, pp. 171–185, 2019.
M. Wu, H. Zhou, L. Lin, B. Silva, Z. Song, J. Cheung and Y. Moon, Detecting attacks in cyber manufacturing systems: Additive manufacturing example, Proceedings of the International Conference on Mechanical, Aeronautical and Automotive Engineering, 2017.
C. Xiao, Security attack on 3D printing, presented at the xFocus Security Conference (www.claudxiao.net/Attack3DPrinting-Claud-en.pdf), 2013.
S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, Manufacturing and security challenges in 3D printing, Journal of the Minerals, Metals and Manufacturing Society, vol. 68(7), pp. 1872–1881, 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rais, M.H., Ahsan, M., Sharma, V., Barua, R., Prins, R., Ahmed, I. (2022). LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XVI. ICCIP 2022. IFIP Advances in Information and Communication Technology, vol 666. Springer, Cham. https://doi.org/10.1007/978-3-031-20137-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-20137-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20136-3
Online ISBN: 978-3-031-20137-0
eBook Packages: Computer ScienceComputer Science (R0)