3D printing cybersecurity: detecting and preventing attacks that seek to weaken a printed object by changing fill level

Prior work by Zeltmann, et al. has demonstrated the impact of small defects and other irregularities on the structural integrity of 3D printed objects. It posited that such defects could be introduced intentionally. The current work looks at the impact of changing the fill level on object structural integrity. It considers whether the existence of an appropriate level of fill can be determined through visible light imagery-based assessment of a 3D printed object. A technique for assessing the quality and sufficiency of quantity of 3D printed fill material is presented. It is assessed experimentally and results are presented and analyzed.

[1]  Sujit Rokka Chhetri Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems , 2016 .

[2]  Richard A. Buswell,et al.  Development of a viable concrete printing process , 2011 .

[3]  C. Chua,et al.  Effects of layer thickness and binder saturation level parameters on 3D printing process , 2011 .

[4]  Marios M. Polycarpou,et al.  Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems , 2015, Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems.

[5]  Krzysztof Okarma,et al.  Application of Structural Similarity Based Metrics for Quality Assessment of 3D Prints , 2016, ICCVG.

[6]  Sophie C Cox,et al.  3D printing of porous hydroxyapatite scaffolds intended for use in bone tissue engineering applications. , 2015, Materials science & engineering. C, Materials for biological applications.

[7]  Arquimedes Canedo,et al.  Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[8]  Jeremy Straub,et al.  Automated testing and quality assurance of 3D printing/3D printed hardware: Assessment for quality assurance and cybersecurity purposes , 2016, 2016 IEEE AUTOTESTCON.

[9]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[10]  Barry Berman,et al.  3D printing: the new industrial revolution , 2012, IEEE Engineering Management Review.

[11]  Carla E. Brodley,et al.  Machine learning techniques for the computer security domain of anomaly detection , 2000 .

[12]  Krzysztof Okarma,et al.  Quality Assessment of 3D Prints Based on Feature Similarity Metrics , 2016, IP&C.

[13]  Andrea Ehrmann,et al.  3D printing of textile-based structures by Fused Deposition Modelling (FDM) with different polymer materials , 2014 .

[14]  Jules White,et al.  Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .

[15]  Guido M. Cortelazzo,et al.  Handheld scanning with 3D cameras , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[16]  G. Witt,et al.  PROCESS MONITORING IN LASER SINTERING USING THERMAL IMAGING , 2011 .

[17]  Arquimedes Canedo,et al.  Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[18]  Carey Nachenberg,et al.  Computer virus-antivirus coevolution , 1997, Commun. ACM.

[19]  Benjamin Kading,et al.  Utilizing in-situ resources and 3D printing structures for a manned Mars mission , 2015 .

[20]  Ryan B. Wicker,et al.  3D Printing for the Rapid Prototyping of Structural Electronics , 2014, IEEE Access.

[21]  Abdulmecit Güldaş,et al.  Experimental study on the 3D-printed plastic parts and predicting the mechanical properties using artificial neural networks , 2017 .

[22]  J. Planell,et al.  High-resolution PLA-based composite scaffolds via 3-D printing technology. , 2013, Acta biomaterialia.

[23]  Jeremy Straub,et al.  Initial Work on the Characterization of Additive Manufacturing (3D Printing) Using Software Image Analysis , 2015 .

[24]  W. Cong,et al.  Additive manufacturing of carbon fiber reinforced thermoplastic composites using fused deposition modeling , 2015 .

[25]  Roman Senkerik,et al.  Artificial Intelligence Trends in Intelligent Systems - Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 1 , 2017, CSOC.

[26]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[27]  Peter Kühmstedt,et al.  Handheld 3D Scanning with Automatic Multi-view Registration Based on Optical and Inertial Pose Estimation , 2014 .

[28]  Masoumeh Aminzadeh,et al.  A machine vision system for in-situ quality inspection in metal powder-bed additive manufacturing , 2016 .

[29]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[30]  Jeremy Straub,et al.  An incremental and approximate local outlier probability algorithm for intrusion detection and its evaluation , 2017 .

[31]  Sergio Vera,et al.  3D Scanning System for In-Vivo Imaging of Human Body , 2014 .

[32]  M. A. Faruque Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .

[33]  J. F. McClary,et al.  NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..

[34]  Michael Eisenberg,et al.  3D printing for children: What to build next? , 2013, Int. J. Child Comput. Interact..

[35]  Gábor Harsányi,et al.  3D Rapid Prototyping Technology (RPT) as a powerful tool in microfluidic development , 2010 .

[36]  Jeremy Straub,et al.  A combined system for 3D printing cybersecurity , 2017, Commercial + Scientific Sensing and Imaging.

[37]  Changshui Zhang,et al.  Incremental multiple instance outlier detection , 2014, Neural Computing and Applications.

[38]  Jorge Vicente Lopes da Silva,et al.  3D Scanning Using RGBD Imaging Devices: A Survey , 2015 .

[39]  Mohsen A. Jafari,et al.  Online defect detection in layered manufacturing using process signature , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[40]  Jean-Pierre Kruth,et al.  In situ quality control of the selective laser melting process using a high-speed, real-time melt pool monitoring system , 2014 .

[41]  M. Alexander,et al.  Desktop 3D printing of controlled release pharmaceutical bilayer tablets. , 2014, International journal of pharmaceutics.

[42]  T. Simpson,et al.  3D Printing Disrupts Manufacturing: How Economies of One Create New Rules of Competition , 2013 .

[43]  Thomas A. Campbell,et al.  3D printing of multifunctional nanocomposites , 2013 .

[44]  R. Landers,et al.  Biofunctional rapid prototyping for tissue‐engineering applications: 3D bioplotting versus 3D printing , 2004 .

[45]  Krzysztof Okarma,et al.  Texture Based Quality Assessment of 3D Prints for Different Lighting Conditions , 2016, ICCVG.

[46]  F. Ribeiro,et al.  3D printing with metals , 1998 .

[47]  Daniel M. Vogt,et al.  Embedded 3D Printing of Strain Sensors within Highly Stretchable Elastomers , 2014, Advanced materials.

[48]  Jeremy Straub,et al.  An approach to detecting deliberately introduced defects and micro-defects in 3D printed objects , 2017, Defense + Security.

[49]  Jeremy Straub,et al.  Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material , 2017, Commercial + Scientific Sensing and Imaging.

[50]  Krzysztof Okarma,et al.  No-reference quality assessment of 3D prints based on the GLCM analysis , 2016, 2016 21st International Conference on Methods and Models in Automation and Robotics (MMAR).

[51]  Pierre Guyomarc'h,et al.  Quantification of Perspective‐Induced Shape Change of Clavicles at Radiography and 3D Scanning to Assist Human Identification , 2014, Journal of forensic sciences.

[52]  Jeremy Straub,et al.  Identifying positioning-based attacks against 3D printed objects and the 3D printing process , 2017, Defense + Security.

[53]  Krzysztof Okarma,et al.  Entropy Based Surface Quality Assessment of 3D Prints , 2017, CSOC.

[54]  Jeremy Straub,et al.  A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems , 2013, Comput..

[55]  Brian Surgenor,et al.  Vision Based Fault Detection of Automated Assembly Equipment , 2011 .

[56]  Pedram Mousavi,et al.  A novel integrated dielectric-and-conductive ink 3D printing technique for fabrication of microwave devices , 2013, 2013 IEEE MTT-S International Microwave Symposium Digest (MTT).

[57]  Cliff Riggs Intrusion Detection Systems , 2003 .

[58]  Phongphun Kijsanayothin,et al.  Cyber-security analysis of smart grid SCADA systems with game models , 2014, CISR '14.

[59]  Ying Zhong,et al.  Direct Formation of Structural Components Using a Martian Soil Simulant , 2017, Scientific Reports.

[60]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[61]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .

[62]  BowyerAdrian,et al.  3D Printing and Humanity's First Imperfect Replicator , 2014 .

[63]  Krzysztof Okarma,et al.  Color Independent Quality Assessment of 3D Printed Surfaces Based on Image Entropy , 2017, CORES.

[64]  Guido Guarnieri,et al.  3D modeling and remote rendering technique of a high definition cultural heritage artefact , 2011, WCIT.

[65]  Jeremy Straub,et al.  Development of a Large, Low-Cost, Instant 3D Scanner , 2014 .

[66]  Yuan Cheng,et al.  Vision-Based Online Process Control in Manufacturing Applications , 2008, IEEE Transactions on Automation Science and Engineering.

[67]  Sara J. Graves,et al.  Cyber Security for Additive Manufacturing , 2015, CISR.

[68]  R. M. Natal Jorge,et al.  Computational Vision and Medical Image Processing: VipIMAGE 2007 , 2007 .

[69]  D. ProfessorPh.,et al.  THE USE OF 3D SCANNING AND RAPID PROTOTYPING IN MEDICAL ENGINEERING , 2013 .

[70]  Bryan Kessel Characterizing and Defending Against Cyber SecurityVulnerabilities in Additive Manufacturing , 2015 .

[71]  Ryan B. Wicker,et al.  3D Printing multifunctionality: structures with electronics , 2014 .

[72]  Klaudius Henke,et al.  Wood based bulk material in 3D printing processes for applications in construction , 2012, European Journal of Wood and Wood Products.

[73]  V. Rao Vemuri,et al.  Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.

[74]  Jeremy Straub,et al.  A very low-cost 3D scanning system for whole-body imaging , 2015, Sensing Technologies + Applications.

[75]  Jeremy Straub,et al.  Design for an in-space 3D printer , 2016, SPIE Defense + Security.

[76]  Liliana-Laura Badita,et al.  3D MEASURING OF COMPLEX AUTOMOTIVE PARTS USING VIDEO-LASER SCANNING , 2013 .

[77]  Vladimir Mironov,et al.  Organ printing: promises and challenges. , 2008, Regenerative medicine.

[78]  Jeremy Straub,et al.  Consideration of materials for creating 3D printed space sensors and systems , 2017, Defense + Security.

[79]  Ivan Poupyrev,et al.  Printed optics: 3D printing of embedded optical elements for interactive devices , 2012, UIST.

[80]  T. Lane,et al.  Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .

[81]  Benjamin Kading,et al.  Characterization of a Large, Low-Cost 3D Scanner , 2015 .

[82]  Tse Nga Ng,et al.  3D Printed Electronics , 2013, NIP & Digital Fabrication Conference.