WELCOME TO EHOST.COM.NP

Wednesday, August 16, 2017

Protecting 3D printers from cyberattacks could be as simple as listening carefully

ads space

As 3D printers grow smarter and continue to embed themselves in manufacturing and product creation processes, they are exposed to online malefactors just like every other device and network. Security researchers suggest a way to prevent hackers from sabotaging the outputs of 3D printers: listen very, very carefully.

Now, you’re forgiven if someone hacking a 3D printer doesn’t strike you as a particularly egregious threat. But they really are starting to be used for more than hobby and prototyping purposes: prosthetics are one common use, and improved materials have made automotive and aerospace applications possible.

The problem, as some security researchers have already demonstrated, is that a hacker could take over the machine and not merely shut it down but introduce flaws into the printed objects themselves. All it takes is a few small air gaps, a misalignment of internal struts or some such tweak, and all of a sudden the part rated to hold 75 pounds only holds 20. That could be catastrophic in many circumstances.

And of course the sabotaged parts may look identical to ordinary ones to the naked eye. What to do?

A team from Rutgers and Georgia Tech suggests three methods, one of which is easy and clever enough to integrate widely — a bit like Shazam for 3D printing. (The other two are still cool.)

I don’t know if you’ve ever been next to a printer while it works, but it makes a racket. That’s because many 3D printers use a moving print head and various other mechanical parts, all of which produce the usual whines, clicks and other noises.

The researchers recorded those noises while a reference print was being made, then fed that noise in bits to an algorithm that classifies sound so it can be recognized again.

When a new print is done, the sound is recorded again and submitted for inspection by the algorithm. If it’s the same all the way through, chances are the print hasn’t been tampered with. Any significant variation from the original sound, such as certain operations ending too fast or anomalous peaks in the middle of normally flat sections, will be picked up by the system and the print flagged.

It’s just a proof of concept, so there’s still room for improvement, lowering false positives and raising resistance to ambient noise.

Or the acoustic verification could be combined with other measures the team suggested. One requires the print head to be equipped with a sensor that records all its movements. If these differ from a reference motion path, boom, flagged.

The third method impregnates the extrusion material with nanoparticles that give it a very specific spectroscopic signature. If other materials are used instead, or air gaps left in the print, the signature will change and, you guessed it, the object flagged.

Like with the DNA-based malware vector, the hacks and countermeasures proposed here are speculative right now, but it’s never too early to start thinking about them.

“You’ll see more types of attacks as well as proposed defenses in the 3D printing industry within about five years,” said Saman Aliari Zonouz, co-author of the study (PDF), in a Rutgers news release.

And like the DNA research, this paper was presented at the USENIX Security Symposium.

Source link

ads space
ADS SPACE

0 comments:

Post a Comment

Categories

Article How-to All Posts WordPress Android Web design Blogger Plugins CSS Google JQuery Plugins Programming Reviews Web Hosting Blogger Blogging Blogging Tips Tricks Web Development Facebook Git Internet Make Money Online Social Plugins Tips Tips and Tricks Tools Tutorials Windows WordPress Plugins Blogging Tips and Tricks Freebies GSM Google Analytics HTML How To's JavaScript Plugin Development S.E.O SEO SMS SmartPhone Social Media Tips amp; Tricks Top-Most Updates Webmaster Tools Whatsapp Applications Apps Blogger Basics Documentary Downloads Entertainment Gadgets Games Gmail Google AdSense Guest Post IPhone Make Money Blogging SVN Security Softwares Web Hosting Tips and Tricks Wordpress Tips Wordpress Tips and Tricks hostgator iOS Advertising Networks Advertising Technology Affiliates Antivirus Audience amp; Traffic Biography Blog post Blog post Blogger Blogger Errors Blogger Tips Blogger Tools Blogger Widget Blogosphere Bogger Widgets CSS selectors CSS symbols CSS3 Computer amp; Internet Content Writing Coupon Codes Data amp; Analytics Deleted blog Design DoubleClick for Publishers Email and newsletter marketting Email marketing Excel Tips Excel Tips and Tricks Facebook Tricks Feed Feedburner Feedburner subscribers Font Fun GitHub Giveaways Gmail primary inbox Gmail tabs Google sign-in Guides HTML amp; CSS HTML5 Infographics Inspirational Instagram Internet Marketing Internet Tips amp; Tricks Job Listings Knowledge Life Hacks Lists Make-Money Monetization amp; Conversion Monetize Navigation Online Marketing Other PHP Tutorials Passport Publishing amp; Content Quotes RSS Sidebar Smartphones Social Networking Status Tech Tech Blog Technology Telegram Themes UI / UX User Psychology amp; Research VB.Net Web Tools Web browser Widget Windows Tips Windows-10 ad viewability admin notice blogging tools bluehost cherry-pick clone cors custom scrollbar customizer dismissible notices duplicate post feed title git branch git clone gpg gpg2 hybridauth iPad icon font notice responsive wordpress theme same origin policy scrollbar signed git commit smartsvn theme customizer vcs wordpress theme wordpress themes

Blog Archive