Researchers Develop Methods to Detect Hacking of 3D Printers

A team of researchers from Rutgers University-New Brunswick and the Georgia Institute of Technology has developed three strategies for determining if 3D printers have been hacked.

"They will be attractive targets because 3D-printed objects and parts are used in critical infrastructures around the world, and cyberattacks may cause failures in health care, transportation, robotics, aviation and space," said Saman Aliari Zonouz, coauthor of the study and associate professor in the electrical and computer engineering department at Rutgers University-New Brunswick, in a report on the research.

Hackers could conceivably insert tiny defects in printed objects, too small to detect visually, but that nevertheless compromise the integrity of the piece with potentially disastrous consequences. Many organizations outsource their 3D printing needs rather than buying expensive printers themselves, which centralizes and, perhaps, exacerbates the threat.

"The results could be devastating and you would have no way of tracing where the problem came from," said Mehdi Javanmard, study coauthor and assistant professor in the electrical and computer engineering department at Rutgers-New Bruswick, in a prepared satement.

"While anti-hacking software is essential, it's never 100 percent safe against cyberattacks," the university research news organization Futurity recently reported. "So the researchers looked at the physical aspects of 3D printers."

The team eventually developed three ways to detect tampering, either during or after printing an object:

  • Compare the sound of the printer as it operates to a recording of a printer creating a print known to be correct;
  • Compare the physical movement of the printer's parts as it works to a the movements of a printer as it produces a correct print; and
  • Mix gold nanorods with the printing filament, then use Raman spectroscopy and computed tomography to make sure the nanorods are dispersed throughout the object as expected.

In the future, the group plans to find new ways to attack the printers so they can develop new defenses, transfer their methods to industry and refine the techniques they've already developed.

"These 3D printed components will be going into people, aircraft and critical infrastructure systems," said Raheem Beyah, a professor and associate chair in Georgia Tech's School of Electrical and Computer Engineering. "Malicious software installed in the printer or control computer could compromise the production process. We need to make sure that these components are produced to specification and not affected by malicious actors or unscrupulous producers."

The full study is available as a PDF here.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • magnifying glass with AI icon in the center

    Google Releases Learning-Themed AI Mode Features for Search

    Ahead of back-to-school season, Google has introduced new AI Mode features in Search, including image and PDF queries on desktop, a Canvas tool for planning, real-time help with Search Live, and Lens integration in Chrome.

  • student holding a smartphone with thumbs-up and thumbs-down icons, surrounded by abstract digital media symbols and interface elements

    Teaching Media Literacy? Start by Teaching Decision-Making

    Decision-making is a skill that must be developed — not assumed. Students need opportunities to learn the tools and practices of effective decision-making so they can apply what they know in meaningful, real-world contexts.

  • open laptop with various educational materials like charts, quizzes, and documents emerging from the screen

    Pear Deck Learning Debuts New AI Features

    GoGuardian recently introduced new artificial intelligence features within its Pear Deck Learning curriculum and instruction platform, designed to aid educators throughout their teaching journey — from lesson planning to assessment.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.