Corpus ID: 861069

Implications of Malicious 3 D Printer Firmware

  title={Implications of Malicious 3 D Printer Firmware},
  author={Samuel Bennett Moore and William Bradley Glisson},
The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification and intellectual property protection. This research develops and implements malicious code using Printrbot’s branch of the open source Marlin 3D printer firmware. Implementations of the malicious code were activated based on a specified printer command sent from a desktop… Expand
Security Analysis of Networked 3D Printers
This work presents C3PO, an open-source network security analysis tool that systematically identifies security threats to networked 3D printers, and identified 8 types of network security vulnerabilities such as a susceptibility to low-rate denial of service attacks, the transmission of unencrypted data, and publicly accessible network deployments. Expand
Poster: A Realizable Framework for Intrusion Detection in Additive Manufacturing Systems Using Analog Side-Channels
Additive Manufacturing (AM) relies heavily on computers to work. As a result, they are susceptible to cyberattacks. For example, the firmware of a printer can be compromised such that the printerExpand
Random sampling strategies for multivariate statistical process control to detect cyber-physical manufacturing attacks
A novel random variable-selection approach that is both resilient to malicious cyber-physical attacks and sensitive to shifts over a small subset of characteristics is proposed in this work, based upon random sampling strategies when using multivariate Hotelling T 2 control charts. Expand
Spatiotemporal G-code modeling for secure FDM-based 3D printing
Sophos is a framework to detect nozzle-kinetics, filament-kinetic and thermodynamic attacks on the fused deposition modeling (FDM)-based 3D printing process and can detect the attacks onthe first print using spatiotemporal G-code modeling, aligning it with the Industry 4.0 vision. Expand


Legal Aspects of Protecting Intellectual Property in Additive Manufacturing
This chapter focuses on legal solutions available to intellectual property owners in the United States for blueprints, objects and processes used in additive manufacturing and establishes a baseline for the current federal protection environment. Expand
3-D printing: The new industrial revolution
This article examines the characteristics and applications of 3-D printing and compares it with mass customization and other manufacturing processes. 3-D printing enables small quantities ofExpand
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing
This research examines the problem of Intellectual Property (IP) protection in the case of outsourcing the ALM manufacturing process and introduces a new model for the outsourcing of ALM-based production. Expand
3D printing of porous hydroxyapatite scaffolds intended for use in bone tissue engineering applications.
Characterisation techniques utilised in this study include two funnel flow tests, scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FTIR), compressive strength testing and computed tomography (CT). Expand
Rapid prototyping or rapid production? 3D printing processes move industry towards the latter
Rapid manufacturing – defined as the direct production of finished goods from a rapid prototyping device – remains at present more a goal than reality for industry. The application of 3D printingExpand
The rise of personal fabrication
This paper is an overview of the current state of personal digital fabrication and the trends that are shaping it. Expand
Security Challenges of Additive Manufacturing with Metals and Alloys
The range of application areas and dependence on computerization makes additive manufacturing an attractive target for attackers. Expand
Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks?
To protect manufacturing processes in the future, research will be needed on a number of critical cyber-physical manufacturing security topics. Expand
Investigating Information Security Risks of Mobile Device Use within Organizations
The research contribution is an initial empirical report highlighting examples of corporate policy breaches by users along with providing a foundation for future research on the security risks of the pervasive presence of mobile devices in corporate environments. Expand
Investigating the Impact of Global Positioning System Evidence
Investigation of criminal and civil court cases in the United Kingdom through the inspection of Lexis Nexis, Westlaw, and theBAILII legal databases indicates that GPS evidence in court cases is rising over time. Expand