Research

Sounds odd? Your 3D printer could be hacked

New research from Ben-Gurion University of the Negev in Israel, that previously showed how easy it is to hack 3D printed drones, is proposing the use of “audio fingerprints” to help 3D printing avoid cyber-attacks.

The team’s research is valuable to concerns surrounding the security of 3D printing – a discussion that has tremendous value in industrial additive manufacturing sectors such as aerospace, automotive and defense.

The hacked propeller failing after 2 minute test flight Image via: Yuval Elovici
A sabotaged quadcopter’s 3D printed propeller breaks during flight from the Ben-Gurion University of the Negev dr0wned study. Image via Yuval Elovici/Ben-Gurion University of the Negev

How does that sound?

To start the Ben-Gurion University study, researchers explain “that in FDM technology, the geometry of a printed object is defined by the movements of four stepper motors,” – three for X/Y/Z axes and one for filament extrusion. When 3D printing, these stepper motors generate a unique sound which is directly related to the specifics of the 3D modeled object, i.e. small features/layers yield short, high pitched noises, longer layers create a more prolonged sound.

Example audio fingerprints of two "benign" (unmodified) 3D printed cubes. Image via Ben-Gurion University of the Negev
Example audio fingerprints of two “benign” (unmodified) 3D printed cubes. Image via Ben-Gurion University of the Negev

As such, a perfect version of an object as it is 3D printing will emit a very specific sound. An imperfect version with, for example, internally embedded gaps or voids will sound different.

The Ben-Gurion University team’s idea is to record the sound of a perfect, 3D printed object, and use this as a “master audio fingerprint.” Each time the same object is 3D printed, the sounds of the stepper motors are recorded, and this is compared real-time to the master file to ensure it matches up.

Great variation between the wave pattern of the audio files therefore signifies a potential flaw in its structure. Once detected, prints are stopped in progress saving time and material waste.

Comparison of a master audio fingerprint (blue) and the audio recorded from a part that has been sabotaged. Image via Ben-Gurion University of the Negev

“Highly efficient in detecting cyber-physical attacks”

By using this method, the team have successfully detected 6 potential sabotage attacks of 3D printed parts, including voids, different layer thickness, scale of the 3D printed object, X, Y or Z orientation changes, and fill pattern modification.

The amount of extruded filament however, and a temperature difference, are not detectable by audio fingerprint – though these prints are likely to fail from the offset anyway.

Process of verification of 3D printer audio fingerprints. Image via Ben-Gurion University of the Negev
Process of verification of 3D printer audio fingerprints. Image via Ben-Gurion University of the Negev

Conclusions state that “the proposed detection method is highly efficient in detecting cyber-physical attacks that aim to modify the object’s geometry or the printing process timing.”

The full results of this study, titled “Digital Audio Signature for 3D Printing Integrity“, are published, open access, in IEEE Transactions on Information Forensics and Security journal. The paper is co-authored by Sofia Belikovetsky, Yosef Solewicz, Mark Yampolskiy, Jinghui Toh and Yuval Elovici.

Follow 3D Printing Industry on Twitter, like us on Facebook and subscribe to our regular newsletter for more cutting edge 3D printing research. Sign up to 3D Printing Jobs now to post and search new opportunities in engineering, product development and more.

Featured image shows an original sound wave artwork. Image by TheDigitalArtist on Pixabay