NYU Researchers Find Cybersecurity Risks in 3D Printing

A new report from NYU researchers found that printing orientation and insertion of fine defects could affect the outcome of 3D printed products.

The 3D printing industry is currently a $4 billion business, with that number expected to quadruple by 2020. As more and more manufacturers continue to adopt this technology, researchers at New York University (NYU) say that new cybersecurity methods and tools are needed to properly monitor the quality of 3D printed products. A team of cybersecurity and materials engineers at NYU’s Tandon School of Engineering published a paper that explores the potential risks that exist in the cyber-physical environment of 3D printing.

In “Manufacturing and Security Challenges in 3D Printing,” the researchers reported that the process of building a product from a computer assisted design (CAD) file could lead to flaws in the product’s design. They examine two aspects of 3D printing that have cybersecurity implications: printing orientation and insertion of fine defects.

“These are possible foci for attacks that could have devastating impact on users of the end product, and economic impact in the form of recalls and lawsuits," said Nikhil Gupta, a materials researcher on the team and an associate professor of mechanical engineering at NYU, in a statement.

They reported that the orientation of the product while printing could make as much as a 25 percent difference in strength. Since CAD files do not give instructions for printer head orientation, malefactors could potentially alter the process, which could lead to product recalls and lawsuits.

Ramesh Karri, a cybersecurity researcher on the team and a professor of electrical and computer engineering, said that attackers could hack into printers that are connected to the Internet as products are being printed. “New cybersecurity methods and tools are required to protect critical parts from such compromise,” he said in a statement.

In addition, the research team introduced sub-millimeter defects between printer layers and found that defects cannot be detected by common industrial monitoring techniques like ultrasonic imaging. As a result, the defected materials can weaken over time as they are exposed to heat, light and humidity.

The paper was originally published in JOM, the journal for The Minerals, Metals and Materials Society, and is available for purchase on the Springer Link site.  

About the Author

Sri Ravipati is Web producer for THE Journal and Campus Technology. She can be reached at [email protected].

Featured

  • The AI Show

    Register for Free to Attend the World's Greatest Show for All Things AI in EDU

    The AI Show @ ASU+GSV, held April 5–7, 2025, at the San Diego Convention Center, is a free event designed to help educators, students, and parents navigate AI's role in education. Featuring hands-on workshops, AI-powered networking, live demos from 125+ EdTech exhibitors, and keynote speakers like Colin Kaepernick and Stevie Van Zandt, the event offers practical insights into AI-driven teaching, learning, and career opportunities. Attendees will gain actionable strategies to integrate AI into classrooms while exploring innovations that promote equity, accessibility, and student success.

  • illustrated university campus with modern buildings, glowing binary code streaming straight and dynamically from multiple directions, integrated into the architecture, surrounded by stylized trees, grass, and walkways

    3 Ways Institutions Can Become Data-Driven Organizations

    Faced with declining enrollments and changing demographics, colleges and universities must make use of data and analytics to better serve students.

  • NVIDIA DGX line

    NVIDIA Intros Personal AI Supercomputers

    NVIDIA has introduced a new lineup of AI-powered computing solutions designed to accelerate enterprise workloads.

  • digital network with glowing blue and red lines, featuring multiple red arrows shifting in different directions

    Report: Attackers Change Tactics as Ransomware Payoffs Decline

    Attackers are changing tactics as they collect less money from ransomware payoffs, according to a new report from Chainalysis, a blockchain analytics firm.