sb-as logo
Story image

Researchers report cyber security risks in 3D printing

19 Jul 2016

A team of researchers has recently reported cyber security risks in 3D printing.

Their discovery was found by examining two aspects – printing orientation and insertion of fine defects.

The findings were published in the journal of the Minerals, Metals and Materials Society by Mechanical Engineering. Essentially, they were based on the fact that because Computer-Aided Drafting (CAD) files – used in the analysis, modification or optimisation of a design – don’t give instructions for the printer-head orientation, malefactors could alter the process without being detected.

This isn’t to mention that sub-millimetre defects between printed layers with exposure to fatigue and the elements were also found to be undetectable

"These are possible foci for attacks that could have devastating impact on users from the end product, and economic impact in the form of recalls and lawsuits," says Nikhil Gupta, an associate professor of Mechanical Engineering. "Minus a clear directive from the design team, the best orientation for the printer is one that minimises the use of material and maximises the number of parts you can print in one operation," he said.

According to their research, the orientation of the product during printing could make as much as a whopping 25 percent difference in its final strength.

Said Karri, a cyber security researcher, affirms that in the increasingly digital world, there are more and more backdoors for malicious activity. Provided the printer is connected to the Internet, hackers can make their way in and introduce internal defects as the component is being printed.

"With the growth of cloud-based and decentralised production environments, it is critical that all entities within the additive manufacturing supply chain be aware of the unique challenges presented to avoid significant risk to the reliability of the product,” Karri concludes.

Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Unbound seeks channel growth with new partner programme
Those who sign up will have access to Unbound’s security solutions, sales and partner enablement, deal registration and partner portal.More
Story image
Research: Younger cybersecurity pros more fearful of being replaced by AI
According to the findings, 53% of respondents under 45 years old either agreed or strongly agreed that AI and ML are a threat to their job security, despite 89% of this demographic believing that it would improve their jobs.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
DDoS attacks a wake up call for complacent businesses - Imperva
When distributed denial of service attacks created mayhem around the world in August, they left many organisations scrambling to protect themselves.More