skip to main content
research-article

Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems

Published:14 December 2017Publication History
Skip Abstract Section

Abstract

In cyber-physical systems, due to the tight integration of the computational, communication, and physical components, most of the information in the cyber-domain manifests in terms of physical actions (such as motion, temperature change, etc.). This leads to the system being prone to physical-to-cyber domain attacks that affect the confidentiality. Physical actions are governed by energy flows, which may be observed. Some of these observable energy flows unintentionally leak information about the cyber-domain and hence are known as the side-channels. Side-channels such as acoustic, thermal, and power allow attackers to acquire the information without actually leveraging the vulnerability of the algorithms implemented in the system. As a case study, we have taken cyber-physical additive manufacturing systems (fused deposition modeling-based three-dimensional (3D) printer) to demonstrate how the acoustic side-channel can be used to breach the confidentiality of the system. In 3D printers, geometry, process, and machine information are the intellectual properties, which are stored in the cyber domain (G-code). We have designed an attack model that consists of digital signal processing, machine-learning algorithms, and context-based post processing to steal the intellectual property in the form of geometry details by reconstructing the G-code and thus the test objects. We have successfully reconstructed various test objects with an average axis prediction accuracy of 86% and an average length prediction error of 11.11%.

References

  1. Adobe Photoshop CC. 2015. Retrieved from www.adobe.com.Google ScholarGoogle Scholar
  2. Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic side-channel attacks on additive manufacturing systems. In Proceedings of the 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS’16). IEEE, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Warwick Ashford. 2014. 21 percent of manufacturers hit by intellectual property theft. (August 2014). Retrieved from http://www.computerweekly.com/news/2240226840/IP-theft-hit-21-of-manufacturers-in-past-year-study-shows.Google ScholarGoogle Scholar
  4. Michael Backes et al. 2010. Acoustic side-channel attacks on printers. In Proceedings of the USENIX Security Symposium. 307--322. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dan Barry et al. 2004. Real-time sound source separation: Azimuth discrimination and resynthesis. In Proceedings of the Audio Engineering Society Convention 117. Audio Engineering Society.Google ScholarGoogle Scholar
  6. Tania Branigan. 2010. Google to end censorship in China over cyber attacks. The Guardian (2010), 01--12.Google ScholarGoogle Scholar
  7. Abe Davis et al. 2014. The visual microphone: Passive recovery of sound from video. ACM Trans. Graph. 33, 4 (2014), 79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Economics and Statistics Administration. 2012. Intellectual Property and the U.S. Economy: Industries in Focus.Google ScholarGoogle Scholar
  9. Ian Gibson, David W. Rosen, Brent Stucker, et al. 2010. Additive Manufacturing Technologies. Springer.Google ScholarGoogle Scholar
  10. Jacek F. Gieras, Chong Wang, and Joseph Cho Lai. 2005. Noise of Polyphase Electric Motors. CRC Press.Google ScholarGoogle Scholar
  11. Zoom H6 Handy Recorder. 2015. Retrieved from www.zoom-na.com.Google ScholarGoogle Scholar
  12. Bedřich Heller and Václav Hamata. 1977. Harmonic Field Effects in Induction Machines. Elsevier Science & Technology.Google ScholarGoogle Scholar
  13. Timothy R. Holbrook and Lucas Osborn. 2014. Digital patent infringement in an era of 3D printing. UC Davis Law Review, Forthcoming.Google ScholarGoogle Scholar
  14. A. Hughes and P. J. Lawrenson. 1975. Electromagnetic damping in stepping motors. In Proceedings of the Institution of Electrical Engineers, Vol. 122. IET, 819--824.Google ScholarGoogle Scholar
  15. Mara Hvistendahl. 2016. 3D printers vulnerable to spying. Science 352, 6282 (2016), 132--133.Google ScholarGoogle Scholar
  16. Takashi Kenjō and Akira Sugawara. 1994. Stepping Motors and Their Microprocessor Controls. Oxford University Press, USA.Google ScholarGoogle Scholar
  17. Barbara Leukers et al. 2005. Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing. J. Mater. Sci.: Mater. Med. 16, 12 (2005), 1121--1124.Google ScholarGoogle ScholarCross RefCross Ref
  18. MATLAB. 2015. (R2015b). The MathWorks Inc., Natick, Massachusetts.Google ScholarGoogle Scholar
  19. NDIA. 2014. Cyber Security for Advanced Manufacturing. Technical Report. National Defense Industrial Association.Google ScholarGoogle Scholar
  20. Alan V. Oppenheim et al. 1989. Discrete-time Signal Processing. Vol. 2. Prentice-hall Englewood Cliffs. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Michael S. Pedersen et al. 2007. A survey of convolutive blind source separation methods. Multichannel Speech Processing Handbook (2007), 1065--1084.Google ScholarGoogle Scholar
  22. F. Pedregosa et al. 2011. Scikit-learn: Machine learning in python. J. Machine Learn. Res. 12 (2011), 2825--2830. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. ISS Platform and Feedstock Recycling. 2014. NASA advanced manufacturing technology.Google ScholarGoogle Scholar
  24. Printrbot 3D Printers. 2015. (2015). Retrieved from www.printrbot.com.Google ScholarGoogle Scholar
  25. Python 2.7.10. 2015. (2015). Retrieved from www.python.org.Google ScholarGoogle Scholar
  26. Cohn Reznick. 2015. Manufacturing: A persistent and prime cyber attack target. Retrieved from www.cohnreznick.com.Google ScholarGoogle Scholar
  27. Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. 2016. KCAD: Kinetic cyber attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. ACM, 74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sujit Rokka Chhetri, Sina Faezi, and Mohammad Abdullah Al Faruque. 2017. Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In Proceedings of the 2017 Conference on Design, Automation & Test in Europe. EDA Consortium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Billy Short. 2015. Quality Metal Additive Manufacturing (QUALITY MADE) Enabling Capability. Retrieved from www.navy.mil.Google ScholarGoogle Scholar
  30. SketchUp Make. 2015. Retrieved from www.sketchup.com.Google ScholarGoogle Scholar
  31. E. C. T. So, R. G. D. Williams, and S. J. Yang. 1993. A simple model to calculate the stator radial vibration of a hybrid stepping motor. In Proceedings of the Industry Applications Society Annual Meeting, Conference Record of the 1993 IEEE. IEEE, 122--129.Google ScholarGoogle Scholar
  32. François-Xavier Standaert et al. 2009. A unified framework for the analysis of side-channel key recovery attacks. In Proceedings of the European Conference on Advances in Cryptology (EUROCRYPT’09). Springer, 443--461.Google ScholarGoogle Scholar
  33. L. D. Sturm et al. 2014. Cyber-physical vulnerabilities in additive manufacturing systems. Context 7 (2014), 8.Google ScholarGoogle Scholar
  34. Sergios Theodoridis et al. 2010. Introduction to Pattern Recognition: A Matlab Approach: A Matlab Approach. Academic Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. László Timár-Peregrin Timár-P and P. L. Tímár. 1989. Noise and Vibration of Electrical Machines. Vol. 34. North Holland.Google ScholarGoogle Scholar
  36. Ehsan Toreini, Brian Randell, and Feng Hao. 2015. An acoustic side-channel attack on enigma. Computing Science, Newcastle University. http://www.cs.ncl.ac.uk/publications/trs/papers/1455.pdf.Google ScholarGoogle Scholar
  37. Hannah Vincent et al. 2015. Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing. Elsevier.Google ScholarGoogle Scholar
  38. David S. Wall and Majid Yar. 2010. Intellectual property crime and the internet: Cyber-piracy and stealing information intangibles. In Handbook of Internet Crime. Willan, 255.Google ScholarGoogle Scholar
  39. T. T. Wohlers, Wohlers Associates, and T. Caffrey. 2014. Wohlers report 2014-3D printing and additive manufacturing-state of the industry annual worldwide progress report. Wohlers Associates. https://books.google.com/books?id=iCamoAEACAAJ.Google ScholarGoogle Scholar
  40. Mark Yampolskiy et al. 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM, 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. S. J. Yang. 1981. Low-noise Electrical Motors. Vol. 13. Oxford University Press.Google ScholarGoogle Scholar

Index Terms

  1. Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Cyber-Physical Systems
        ACM Transactions on Cyber-Physical Systems  Volume 2, Issue 1
        Special Issue on ICCPS 2016
        January 2018
        140 pages
        ISSN:2378-962X
        EISSN:2378-9638
        DOI:10.1145/3174275
        • Editor:
        • Tei-Wei Kuo
        Issue’s Table of Contents

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 December 2017
        • Accepted: 1 March 2017
        • Revised: 1 December 2016
        • Received: 1 July 2016
        Published in tcps Volume 2, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format