Recently, a scientist at the University of Buffalo in the United States hacked into a 3D printer with just one smartphone. The move highlights the possibility of deliberate intrusion by hackers to steal the 3D printing systems product design, intellectual property and trade secrets.
It is understood that Dr. Wenyao Xu, an assistant professor in the Department of Computer Science and Engineering at the school, has spent a lot of time trying to invade the 3D printing ecosystem. Now he has discovered a method that only needs one. A simple smartphone can be blacked into a 3D printer without leaving a trace.
Dr. Wenyao Xu of the Department of Computer Science and Engineering at the University of Buffalo, but these machines still have unknown security risks, making their intellectual property protection vulnerable. "He says.
Although most companies currently have some form of protection against system security, such as simple alarm systems, encryption and watermarking, it is enough to defeat violent intrusions. But Dr. Xu has proven that you can steal information without having to enter the system.
The scientist used a reprogrammed smartphone to measure the sound and electromagnetic waves emitted by the 3D printer during printing. With a relatively simple software program, they can reverse engineer the position of the print nozzle at any time and gain further information on the entire product design.
Although this technology is currently not perfect, even when the smartphone is only 20 cm away from the 3D printer (this distance is enough to cause people to be alert), it is possible to copy a simple door stop with 94% accuracy, and for more complicated For medical and automotive parts, this accuracy will be further reduced to approximately 90%.
In addition, as the distance from the 3D printer increases, this accuracy will further decrease. When the research team placed the smartphone 30 cm away from the 3D printer, its accuracy dropped to 87%; at 40 cm, the number dropped to 66%.
Still, such a possibility still opens the door to industrial espionage. “Tests show that smartphones have the ability to capture enough data to put sensitive information at risk,†said Dr. Kui Ren, a collaborator of the study and a professor of computer and engineering at the school. Obviously, for many companies, it is necessary to prohibit employees from using smartphones in sensitive areas for security reasons.
According to the researchers, because the main way for "hackers" to obtain information comes from electromagnetic waves, distance is a key factor in this experiment. If a 3D printer can maintain a safe distance from other devices and use specialized devices to shield electromagnetic waves and sound waves, Then this kind of attack can't be realized.
Increasing print speed also helps to thwart this industrial espionage because the signals from 3D printers easily overlap, so the smartphone may not receive a clear signal that accurately reflects the position of the printhead. Other precautions include changing the print speed through software, setting your own electromagnetic wave and sonic interference modes to effectively encrypt 3D printer signals.
Dr. Wenyao Xu, Assistant Professor, Department of Computer Science and Engineering, University of Buffalo
It is reported that Dr. Xu's team will present their research results at the 23rd Annual Computer and Communication Security Conference held next month. The report title is - "My smartphone knows what you are printing: 3D printers." My Smartphone Knows What You Print: Exploring Smartphone-based Side-Channel Attacks Against 3D Printers.
Soundproof Drum Booth,Soundproof Porta Cabin,Portable Sound Booths,Soundproof Room For Drums
Guangzhou Mingli Intelligent Equipment Co.,Ltd , https://www.minglibooth.com