Abstract
The potential for intellectual property theft has been shown in the additive manufacturing industry using acoustic side-channel attacks lately. This paper aims to discuss the rate of success for recreating the G-Code of an object from the acoustic features and further elaborates on regression model analysis that provides the G-Code. Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language. During the attack phase, the created algorithm was used to process new acoustic data and to reconstruct the G-Code. The accuracy of the classification models and the regression models were determined. The classification accuracy was determined with k-fold cross validation, and the regression model accuracy was determined by scoring the regression models within the algorithm. Although classification and regression algorithms developed showed promising results, lower model accuracy was observed when the X and Y motors moved together. In the future, the team hopes to further increase the model accuracy so that an unknown shape can be replicated successfully. While security measures for cyber-security have previously been investigated, very little research has considered acoustic side-channel attacks on their ability to reconstruct G-Code and steal intellectual property. The findings of this novel research project showed some promising preliminary results on a sample case study.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan, (2016). Acoustic side-channel attacks on additive manufacturing systems. In Proceedings of the 7th International Conference on Cyber-Physical Systems (ICCPS '16). IEEE Press, Piscataway, NJ, USA, Article 19
Weller C, Kleer R, Piller F (2015) Economic implications of 3D printing: market structure models in light of additive manufacturing revisited. Int J Prod Econ 164:43–56. https://doi.org/10.1016/j.ijpe.2015.02.020
Sturm L, Williams C, Camelio J, White J, Parker R (2017) Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the .STL file with human subjects. J Manuf Syst 44(Part 1):154–164
Chen F, Mac G, Gupta N (2017) Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Mater Des 128:182–194. https://doi.org/10.1016/j.matdes.2017.04.078
Rao N, Poole S, Ma C, He F, Zhuang J, Yau D (2016) Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal: Int J 36(4):694–710. https://doi.org/10.1111/risa.12362
Petnga Leonard & Xu Huan. (2016). Security of unmanned aerial vehicles: dynamic state estimation under cyber-physical attacks. pp. 811–819. International Conference on Unmanned Aircraft Systems (ICUAS), Unmanned Aircraft Systems (ICUAS), https://doi.org/10.1109/ICUAS.2016.7502663
Taormina, R, Galelli, S, Tippenhauer, N, Salomons, E, & Ostfeld, A, (2017). 'Characterizing cyber-physical attacks on water distribution systems', J Water Resour Plan Manag, 5
Rokka Chhetri Sujit & Al Faruque Mohammad Abdullah. (2017). Side-channels of cyber-physical systems: case study in additive manufacturing. IEEE Design Test 18, PP. 1–1. https://doi.org/10.1109/MDAT.2017.2682225, 4, 25
Kurfess T, Cass W (2014) Rethinking additive manufacturing and intellectual property protection. Res Technol Manag 57(5):35–42. https://doi.org/10.5437/08956308X5705256
Xu Hongwei, Jing Weihua, Li Minjuan, Li Wei (2016). A slicing model algorithm based on STL model for additive manufacturing processes. 1607–1610. https://doi.org/10.1109/IMCEC.2016.7867489
Song, C, Lin, F, Ba, Z, Ren, K, Zhou, C, & Xu, W, (2016). My smartphone knows what you print. Conf Comput Commun Secur, p 895
“Dynamism - Ultimaker 2 Extended ”. (n.d.). Dynamism.com , next-Generation technology, available at: http://www.dynamism.com/3d-printers/ultimaker-2-extended-plus.shtml?APC=P4500&gclid=CjsKDwjw5arMBRDz9cK2uen9ORIkAAqmJewXdeu7lwT8tQ0U22o5n-l95VHsgt8WyC6oiWCD83ohGgLH9vD_BwE (accessed 10 October 2017)
“Zoom H1 Handy Recorder”. (2017), Zoom, 23 June, available at: https://www.zoom-na.com/products/field-video-recording/field-recording/zoom-h1-handy-recorder (accessed 10 October 2017)
Fabris F, Magalhaes J, Freitas A (2017) A review of supervised machine learning applied to ageing research. Biogerontology 2:171
“Welcome to Python.org”. (n.d.). Python.org , available at: https://www.python.org/ (accessed 10 October 2017)
“GCodeSimulator for PC and Android”. (n.d.). GCodeSimulator, available at: http://3dprintapps.de/gcodesimulator.html (accessed 10 October 2017)
Acknowledgements
The authors would like to convey their deepest thanks and appreciation to Nick Russell, Serhat Sahin, Mahmoud Nabil, Justin Medley, Astrit Imeri, Cesar Ortiz, Yolnan Chen, and Kyle Wendt for their help and support during this research study.
Funding
This research was supported by the National Science Foundation Grant Awards 1461179 and 1601587.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mativo, T., Fritz, C. & Fidan, I. Cyber acoustic analysis of additively manufactured objects. Int J Adv Manuf Technol 96, 581–586 (2018). https://doi.org/10.1007/s00170-018-1603-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00170-018-1603-z