Researchers Develop Methods to Detect Hacking of 3D Printers

A team of researchers from Rutgers University-New Brunswick and the Georgia Institute of Technology has developed three strategies for determining if 3D printers have been hacked.

"They will be attractive targets because 3D-printed objects and parts are used in critical infrastructures around the world, and cyberattacks may cause failures in health care, transportation, robotics, aviation and space," said Saman Aliari Zonouz, coauthor of the study and associate professor in the electrical and computer engineering department at Rutgers University-New Brunswick, in a report on the research.

Hackers could conceivably insert tiny defects in printed objects, too small to detect visually, but that nevertheless compromise the integrity of the piece with potentially disastrous consequences. Many organizations outsource their 3D printing needs rather than buying expensive printers themselves, which centralizes and, perhaps, exacerbates the threat.

"The results could be devastating and you would have no way of tracing where the problem came from," said Mehdi Javanmard, study coauthor and assistant professor in the electrical and computer engineering department at Rutgers-New Bruswick, in a prepared satement.

"While anti-hacking software is essential, it's never 100 percent safe against cyberattacks," the university research news organization Futurity recently reported. "So the researchers looked at the physical aspects of 3D printers."

The team eventually developed three ways to detect tampering, either during or after printing an object:

  • Compare the sound of the printer as it operates to a recording of a printer creating a print known to be correct;
  • Compare the physical movement of the printer's parts as it works to a the movements of a printer as it produces a correct print; and
  • Mix gold nanorods with the printing filament, then use Raman spectroscopy and computed tomography to make sure the nanorods are dispersed throughout the object as expected.

In the future, the group plans to find new ways to attack the printers so they can develop new defenses, transfer their methods to industry and refine the techniques they've already developed.

"These 3D printed components will be going into people, aircraft and critical infrastructure systems," said Raheem Beyah, a professor and associate chair in Georgia Tech's School of Electrical and Computer Engineering. "Malicious software installed in the printer or control computer could compromise the production process. We need to make sure that these components are produced to specification and not affected by malicious actors or unscrupulous producers."

The full study is available as a PDF here.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • glowing digital brain above a chessboard with data charts and flowcharts

    Why AI Strategy Matters (and Why Not Having One Is Risky)

    If your institution hasn't started developing an AI strategy, you are likely putting yourself and your stakeholders at risk, particularly when it comes to ethical use, responsible pedagogical and data practices, and innovative exploration.

  • people collaborating around tables with a giant glowing lightbulb, surrounded by futuristic data visuals and technology icons

    California Community Colleges Google, Partner to Provide Students with AI Skills

    A new collaboration between the California Community Colleges system and Google will provide free access to AI tools and training for more than 2 million students and faculty across the state.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • interconnected blocks of data

    Rubrik Intros Immutable Backup for Okta Environments

    Rubrik has announced Okta Recovery, extending its identity resilience platform to Okta with immutable backups and in-place recovery, while separately detailing its integration with Okta Identity Threat Protection for automated remediation.