Abstract
Computer numerical control (CNC) machines are extensively used in production plants and are considered a crucial asset for organizations worldwide. These machines require unique controllers that differ from those used in other types of machine tools in terms of software architecture, protocols, and design, so to meet the high precision and accuracy demands of their applications. The growing adoption of network-enabled systems in the industrial domain, driven by Industry 4.0, has resulted in an increased use of CNC machines. These machines have evolved from traditional mechanical machines to full-fledged systems with multiple networking services for smart connectivity. This study investigates the risks associated with this technological development. Using actual machine installations, we conducted the first empirical evaluation of the privacy and security implications of Industry 4.0 in the CNC domain. Our findings revealed that malicious users could conduct five types of attacks: compromise, denial-of-service, damage, hijacking, and theft. We reported our findings to the affected vendors and proposed mitigations to manufacturers, integrators and end-users. Our work aims to provide an opportunity to increase awareness in a domain where security does not appear to be a priority at present.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Computer Aided Manufacturing.
- 2.
The machines are located in different facilities: in Celada, MADE Competence Center, or the Department of Mechanical Engineering of the Polytechnic University of Milan.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
When an attack is reported multiple times is because it consists of variations of the same attack. For example, “change tool geometry” can be leveraged to achieve damage, denial-of-service, or hijacking; this depends on which geometries are changed, the type of machine and the manufacturing process. Vice-versa, distinct attacks can conduct to the same goal. For example, an attacker can take control of the production of an exposed CNC by hijacking a parametric program, by modifying the geometry of a tool to introduce a micro-defect, or by changing the executed program.
- 10.
An extensive list of use cases are provided in our technical report [4].
References
Interchangeable variable block data format for positioning, contouring, and contouring/positioning numerically controlled machines. Electronic Industries Association (1979)
Balduzzi, M., Bongiorni, L., Flores, R., Lin, P., Perine, C., Vosseler, R.: Lost in translation: when industrial protocol translation goes wrong. Trend Micro (2020). https://www.madlab.it/papers/wp-lost-in-translation-when-industrial-protocol-translation-goes-wrong.pdf
Balduzzi, M., Pasta, A., Wilhoit, K.: A security evaluation of AIS automated identification system. In: Proceedings of the 30th Annual Computer Security Applications Conference (2014)
Balduzzi, M., Sortino, F., Castello, F., Pierguidi, L.: The security risks faced by CNC machines in industry 4.0. Trend Micro (2022). https://www.madlab.it/papers/cnc.pdf
Chen, X., Wang, Z., Yang, S.: Research on information security protection of industrial internet oriented CNC system. In: 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) (2022)
Maggi, F., et al.: A security evaluation of industrial radio remote controllers. In: Perdisci, R., Maurice, C., Giacinto, G., Almgren, M. (eds.) DIMVA 2019. LNCS, vol. 11543, pp. 133–153. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22038-9_7
Maggi, F., et al.: Smart factory security: A case study on a modular smart manufacturing system. Procedia Comput. Sci. 180, 666–675 (2021)
Niedermaier, M., et al.: You snooze, you lose: Measuring plc cycle times under attacks. In: WOOT@ USENIX Security Symposium (2018)
Pogliani, M., Maggi, F., Balduzzi, M., Quarta, D., Zanero, S.: Detecting insecure code patterns in industrial robot programs. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 759–771 (2020)
Quarta, D., Pogliani, M., Polino, M., Maggi, F., Zanchettin, A.M., Zanero, S.: An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 268–286. IEEE (2017)
Tu, S., Liu, G., Lin, Q., Lin, L., Sun, Z.: Security framework based on trusted computing for industrial control systems of CNC machines. Int. J. Performability Eng. 13, 1336–1346 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Balduzzi, M., Sortino, F., Castello, F., Pierguidi, L. (2023). A Security Analysis of CNC Machines in Industry 4.0. In: Gruss, D., Maggi, F., Fischer, M., Carminati, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2023. Lecture Notes in Computer Science, vol 13959. Springer, Cham. https://doi.org/10.1007/978-3-031-35504-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-35504-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35503-5
Online ISBN: 978-3-031-35504-2
eBook Packages: Computer ScienceComputer Science (R0)