PrinTracker: Fingerprinting 3D Printers using Commodity Scanners

As 3D printing technology begins to outpace traditional manufacturing, malicious users increasingly have sought to leverage this widely accessible platform to produce unlawful tools for criminal activities. Therefore, it is of paramount importance to identify the origin of unlawful 3D printed products using digital forensics. Traditional countermeasures, including information embedding or watermarking, rely on supervised manufacturing process and are impractical for identifying the origin of 3D printed tools in criminal applications. We argue that 3D printers possess unique fingerprints, which arise from hardware imperfections during the manufacturing process, causing discrepancies in the line formation of printed physical objects. These variations appear repeatedly and result in unique textures that can serve as a viable fingerprint on associated 3D printed products. To address the challenge of traditional forensics in identifying unlawful 3D printed products, we present PrinTracker, the 3D printer identification system, which can precisely trace the physical object to its source 3D printer based on their fingerprint. Results indicate that PrinTracker provides a high accuracy using 14 different 3D printers. Under unfavorable conditions (e.g. restricted sample area, location and process), the PrinTracker can still achieve an acceptable accuracy of 92%. Furthermore, we examine the effectiveness, robustness, reliability and vulnerabilities of the PrinTracker in multiple real-world scenarios.

[1]  Zhi-Li Zhang,et al.  Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[2]  Aditya Singh Rathore,et al.  3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers , 2017, ASPLOS.

[3]  Daisuke Suzuki,et al.  The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes , 2010, CHES.

[4]  E. G. van Putten,et al.  Recognition of paper samples by correlation of their speckle patterns , 2006 .

[5]  Nikita Borisov,et al.  Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.

[6]  Mohan S. Kankanhalli,et al.  Print signatures for document authentication , 2003, CCS '03.

[7]  Song Li,et al.  (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.

[8]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[9]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Benoit M. Macq,et al.  From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: A Survey , 2007, Trans. Data Hiding Multim. Secur..

[11]  D. Adjekum Bio-Fuel Alternatives in South African Airways (SAA) Operations - Is it an Effective Response to Vulnerability over Carbon Taxes and Penalty? , 2015, International Journal of Aviation, Aeronautics, and Aerospace.

[13]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[14]  Ying Su,et al.  A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.

[15]  Zeno Geradts,et al.  Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.

[16]  Julian S. Hatcher Firearms Investigation Identification and Evidence , 2006 .

[17]  Feng Hao,et al.  Texture to the Rescue , 2017, ACM Trans. Priv. Secur..

[18]  Morten Wang Fagerland,et al.  The McNemar test for binary matched-pairs data: mid-p and asymptotic are better than exact conditional , 2013, BMC Medical Research Methodology.

[19]  Z. Kennedy,et al.  Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology , 2017 .

[20]  Nasir D. Memon,et al.  Classification of digital camera-models based on demosaicing artifacts , 2008, Digit. Investig..

[21]  Gabi Nakibly,et al.  Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.

[22]  Nikita Borisov,et al.  Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.

[23]  Markus H. Gross,et al.  The magic lens , 2012, ACM Trans. Graph..

[24]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[25]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[26]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[27]  Adam Finkelstein,et al.  Fingerprinting Blank Paper Using Commodity Scanners , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[28]  Danton Bryans Unlocked and loaded: government censorship of 3D-printed firearms and a proposal for more reasonable regulation of 3D-printed goods , 2015 .

[29]  Xiangyu Liu,et al.  Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound , 2014, CCS.

[30]  Kang G. Shin,et al.  Viden: Attacker Identification on In-Vehicle Networks , 2017, CCS.

[31]  Raheem A. Beyah,et al.  Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.

[32]  Gerald Walther Printing Insecurity? The Security Implications of 3D-Printing of Weapons , 2015, Sci. Eng. Ethics.

[33]  Todd R. Andel,et al.  Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.

[34]  Mikhail J. Atallah,et al.  Microstructure-Based Counterfeit Detection in Metal Part Manufacturing , 2017 .

[35]  Wan-Chi Siu,et al.  A two dimensional camera identification method based on image sensor noise , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[36]  Zhengxiong Li,et al.  My Smartphone Recognizes Genuine QR Codes! , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[37]  Steven M. Bellovin,et al.  A Privacy Analysis of Cross-device Tracking , 2017, USENIX Security Symposium.

[38]  A. K. Karunakar,et al.  Digital camera identification using PRNU: A feature based approach , 2016, Digit. Investig..

[39]  Helena Handschuh,et al.  Hardware intrinsic security from D flip-flops , 2010, STC '10.

[40]  Hon J. Yu,et al.  Quantitative analysis of lesion morphology and texture features for diagnostic prediction in breast MRI. , 2008, Academic radiology.

[41]  Hemant Sengar VoIP Fraud: Identifying a Wolf in Sheep's Clothing , 2014, CCS.

[42]  Gang Xiong,et al.  Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.

[43]  Yang Gao,et al.  Watching and Safeguarding Your 3D Printer , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[44]  Davis Doherty Downloading Infringement: Patent Law as a Roadblock to the 3D Printing Revolution , 2012 .

[45]  Benoit M. Macq,et al.  Applicability of watermarking for intellectual property rights protection in a 3D printing scenario , 2015, Web3D.

[46]  Ansel C. Ugural,et al.  Mechanical Design: An Integrated Approach , 2003 .

[47]  Saman A. Zonouz,et al.  See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing , 2017, USENIX Security Symposium.

[48]  Alaa Eleyan,et al.  Co-occurrence matrix and its statistical features as a new approach for face recognition , 2011, Turkish Journal of Electrical Engineering and Computer Sciences.

[49]  Kang G. Shin,et al.  Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.

[50]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[51]  Xiaofeng Yang,et al.  Ultrasound GLCM texture analysis of radiation-induced parotid-gland injury in head-and-neck cancer radiotherapy: an in vivo study of late toxicity. , 2012, Medical physics.

[52]  Soweon Yoon,et al.  Fingerprint recognition: Models and applications , 2014 .

[53]  Mauro Barni,et al.  Wavelet-based blind watermarking of 3D models , 2004, MM&Sec '04.

[54]  Sviatoslav Voloshynovskiy,et al.  SketchPrint: Physical object micro-structure identification using mobile phones , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[55]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[56]  Jasper L. Tran The Law and 3D Printing , 2015 .

[57]  Wenyao Xu,et al.  My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.

[58]  Joshua R. Smith,et al.  FiberFingerprint Identification , 2002 .

[59]  Jan P. Allebach,et al.  Survey of Scanner and Printer Forensics at Purdue University , 2008, IWCF.

[60]  Yan Dong Analysis of the driving force by friction in a driving structure of FDM , 2003 .

[61]  Chang-Tsun Li,et al.  Source Camera Identification Using Enhanced Sensor Pattern Noise , 2009, IEEE Transactions on Information Forensics and Security.

[62]  C. H. Chen,et al.  Handbook of Pattern Recognition and Computer Vision , 1993 .

[63]  David D. Hernandez,et al.  Factors Affecting Dimensional Precision of Consumer 3D Printing , 2015 .

[64]  Wenyuan Xu,et al.  AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.

[65]  Richard Szeliski,et al.  Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.

[66]  Abdulmotaleb El-Saddik,et al.  From 3D Sensing to Printing , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[67]  Ki-Ryong Kwon,et al.  3D polygonal meshes watermarking using normal vector distributions , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[68]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[69]  Ingrid Verbauwhede,et al.  Physically unclonable functions: manufacturing variability as an unclonable device identifier , 2011, GLSVLSI '11.

[71]  Jan P. Allebach,et al.  Printer Forensics Using SVM Techniques , 2005, NIP & Digital Fabrication Conference.

[72]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[73]  Jorge Guajardo,et al.  Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[74]  Khaled Yakdan,et al.  discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.

[75]  Oliver Benedens,et al.  Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.

[76]  Herbert Wittel,et al.  Roloff/Matek Maschinenelemente , 1994 .

[77]  Leonie Moench,et al.  Introduction To Polymers , 2016 .

[78]  Sviatoslav Voloshynovskiy,et al.  Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features , 2013, 2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA).

[79]  Lakshminarayanan Subramanian,et al.  PaperSpeckle: microscopic fingerprinting of paper , 2011, CCS '11.