Skip to main content

A Security Analysis of CNC Machines in Industry 4.0

  • Conference paper
  • First Online:
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2023)

Abstract

Computer numerical control (CNC) machines are extensively used in production plants and are considered a crucial asset for organizations worldwide. These machines require unique controllers that differ from those used in other types of machine tools in terms of software architecture, protocols, and design, so to meet the high precision and accuracy demands of their applications. The growing adoption of network-enabled systems in the industrial domain, driven by Industry 4.0, has resulted in an increased use of CNC machines. These machines have evolved from traditional mechanical machines to full-fledged systems with multiple networking services for smart connectivity. This study investigates the risks associated with this technological development. Using actual machine installations, we conducted the first empirical evaluation of the privacy and security implications of Industry 4.0 in the CNC domain. Our findings revealed that malicious users could conduct five types of attacks: compromise, denial-of-service, damage, hijacking, and theft. We reported our findings to the affected vendors and proposed mitigations to manufacturers, integrators and end-users. Our work aims to provide an opportunity to increase awareness in a domain where security does not appear to be a priority at present.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Computer Aided Manufacturing.

  2. 2.

    The machines are located in different facilities: in Celada, MADE Competence Center, or the Department of Mechanical Engineering of the Polytechnic University of Milan.

  3. 3.

    https://www.haascnc.com/productivity/control/haas-connect.html.

  4. 4.

    https://www.mtconnect.org.

  5. 5.

    https://www.haascnc.com/service/troubleshooting-and-how-to/how-to/machine-data-collection---ngc.html.

  6. 6.

    https://www.heidenhain.com/products/digital-shop-floor/connected-machining.

  7. 7.

    https://www.fanuc.eu/it/en/cnc/development-software/focas-development-libraries.

  8. 8.

    https://www.myokuma.com/.

  9. 9.

    When an attack is reported multiple times is because it consists of variations of the same attack. For example, “change tool geometry” can be leveraged to achieve damage, denial-of-service, or hijacking; this depends on which geometries are changed, the type of machine and the manufacturing process. Vice-versa, distinct attacks can conduct to the same goal. For example, an attacker can take control of the production of an exposed CNC by hijacking a parametric program, by modifying the geometry of a tool to introduce a micro-defect, or by changing the executed program.

  10. 10.

    An extensive list of use cases are provided in our technical report [4].

References

  1. Interchangeable variable block data format for positioning, contouring, and contouring/positioning numerically controlled machines. Electronic Industries Association (1979)

    Google Scholar 

  2. Balduzzi, M., Bongiorni, L., Flores, R., Lin, P., Perine, C., Vosseler, R.: Lost in translation: when industrial protocol translation goes wrong. Trend Micro (2020). https://www.madlab.it/papers/wp-lost-in-translation-when-industrial-protocol-translation-goes-wrong.pdf

  3. Balduzzi, M., Pasta, A., Wilhoit, K.: A security evaluation of AIS automated identification system. In: Proceedings of the 30th Annual Computer Security Applications Conference (2014)

    Google Scholar 

  4. Balduzzi, M., Sortino, F., Castello, F., Pierguidi, L.: The security risks faced by CNC machines in industry 4.0. Trend Micro (2022). https://www.madlab.it/papers/cnc.pdf

  5. Chen, X., Wang, Z., Yang, S.: Research on information security protection of industrial internet oriented CNC system. In: 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) (2022)

    Google Scholar 

  6. Maggi, F., et al.: A security evaluation of industrial radio remote controllers. In: Perdisci, R., Maurice, C., Giacinto, G., Almgren, M. (eds.) DIMVA 2019. LNCS, vol. 11543, pp. 133–153. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22038-9_7

    Chapter  Google Scholar 

  7. Maggi, F., et al.: Smart factory security: A case study on a modular smart manufacturing system. Procedia Comput. Sci. 180, 666–675 (2021)

    Google Scholar 

  8. Niedermaier, M., et al.: You snooze, you lose: Measuring plc cycle times under attacks. In: WOOT@ USENIX Security Symposium (2018)

    Google Scholar 

  9. Pogliani, M., Maggi, F., Balduzzi, M., Quarta, D., Zanero, S.: Detecting insecure code patterns in industrial robot programs. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 759–771 (2020)

    Google Scholar 

  10. Quarta, D., Pogliani, M., Polino, M., Maggi, F., Zanchettin, A.M., Zanero, S.: An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 268–286. IEEE (2017)

    Google Scholar 

  11. Tu, S., Liu, G., Lin, Q., Lin, L., Sun, Z.: Security framework based on trusted computing for industrial control systems of CNC machines. Int. J. Performability Eng. 13, 1336–1346 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Balduzzi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balduzzi, M., Sortino, F., Castello, F., Pierguidi, L. (2023). A Security Analysis of CNC Machines in Industry 4.0. In: Gruss, D., Maggi, F., Fischer, M., Carminati, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2023. Lecture Notes in Computer Science, vol 13959. Springer, Cham. https://doi.org/10.1007/978-3-031-35504-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35504-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35503-5

  • Online ISBN: 978-3-031-35504-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics