The Vulnerability of 3D Printing
Posted on November 2, 2018
Dr. Mark Yampolskiy, assistant professor in the School of Computing at the 天美影视传媒, is gaining international attention for his research into the security of 3D printing, arguing that protection is a necessity for the growing technology.
Yampolskiy has been cited in several publications, most recently by 鈥淚nnovation Toronto,鈥 on the growing need for 3D printer security. That story referred to a 2016 experiment carried out by Yampolskiy and fellow researchers from Israel and Singapore, who hacked into a desktop computer and altered a design file for a quadcopter drone propeller. Later, the drone propeller, which was made using a 3D printer, broke during flight and caused the drone to crash.
鈥淥ur purpose was to demonstrate how people can attack manufacturing systems, and what harm it can cause. Plus, we wanted to show companies and others scientists that the security of 3D printers is a rapidly emerging problem. This was the first realistic instance of such an attack demonstrated in the research literature,鈥 Yampolskiy said. 鈥淭o find ways to protect manufacturing systems, it was necessary to understand first how such systems can be attacked.鈥
The use of 3D printing technology has grown rapidly into a $6 billion industry, printing everything from customized models and functional parts of jet engines to prosthetic devices and tools for the International Space Station. Unfortunately, experience has shown that hackers can usually get into even the most protected of networks.
鈥淚n the U.S., about 16 percent of manufacturing companies already employ 3D printing, and another 16 percent are planning to use it in the near future,鈥 Yampolskiy said. 鈥淔urther, the military is investigating thoroughly its integration into their logistics, to simplify and speed up supplying of replacement parts on demand.鈥
Yampolskiy, who joined South鈥檚 faculty in 2014, is continuing to work with his collaboration partners on solutions that would enable detection of sabotage attacks. For example, partnering with his collaborators from Israel, he is developing solutions based on so-called 鈥渟ide-channels,鈥 such as acoustic emanations or power consumption of a 3D printer. Side-channels of a verifiable benign process can be recorded and transformed to a master signature of a 3D printing process.
According to Yampolskiy, if the same object has to be manufactured again, its side-channel-based signature can be computed and compared with the master signature. Significant difference between both signatures would indicate a potential sabotage attack. This knowledge would prevent such a part from being integrated into a real system, and consequently avoid a potential disaster.
Archive Search
Latest University News
-
Fierce Featherweights
Imagine being able to increase your muscle mass by 40% within a few we...
December 26, 2024 -
South Purchases Traditions Apartment Complex
The 天美影视传媒 expands campus housing with a $20 mill...
December 20, 2024 -
Celebrating 100,000 Graduates
The 天美影视传媒 reaches a milestone at Fall Commenceme...
December 13, 2024 -
USA Hosts Alabama Numeracy Act Workshop
More than 60 higher education leaders from 35 Alabama institutions uni...
December 11, 2024