Abstract
In cyber-physical systems, due to the tight integration of the computational, communication, and physical components, most of the information in the cyber-domain manifests in terms of physical actions (such as motion, temperature change, etc.). This leads to the system being prone to physical-to-cyber domain attacks that affect the confidentiality. Physical actions are governed by energy flows, which may be observed. Some of these observable energy flows unintentionally leak information about the cyber-domain and hence are known as the side-channels. Side-channels such as acoustic, thermal, and power allow attackers to acquire the information without actually leveraging the vulnerability of the algorithms implemented in the system. As a case study, we have taken cyber-physical additive manufacturing systems (fused deposition modeling-based three-dimensional (3D) printer) to demonstrate how the acoustic side-channel can be used to breach the confidentiality of the system. In 3D printers, geometry, process, and machine information are the intellectual properties, which are stored in the cyber domain (G-code). We have designed an attack model that consists of digital signal processing, machine-learning algorithms, and context-based post processing to steal the intellectual property in the form of geometry details by reconstructing the G-code and thus the test objects. We have successfully reconstructed various test objects with an average axis prediction accuracy of 86% and an average length prediction error of 11.11%.
- Adobe Photoshop CC. 2015. Retrieved from www.adobe.com.Google Scholar
- Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. 2016. Acoustic side-channel attacks on additive manufacturing systems. In Proceedings of the 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS’16). IEEE, 1--10. Google ScholarDigital Library
- Warwick Ashford. 2014. 21 percent of manufacturers hit by intellectual property theft. (August 2014). Retrieved from http://www.computerweekly.com/news/2240226840/IP-theft-hit-21-of-manufacturers-in-past-year-study-shows.Google Scholar
- Michael Backes et al. 2010. Acoustic side-channel attacks on printers. In Proceedings of the USENIX Security Symposium. 307--322. Google ScholarDigital Library
- Dan Barry et al. 2004. Real-time sound source separation: Azimuth discrimination and resynthesis. In Proceedings of the Audio Engineering Society Convention 117. Audio Engineering Society.Google Scholar
- Tania Branigan. 2010. Google to end censorship in China over cyber attacks. The Guardian (2010), 01--12.Google Scholar
- Abe Davis et al. 2014. The visual microphone: Passive recovery of sound from video. ACM Trans. Graph. 33, 4 (2014), 79. Google ScholarDigital Library
- Economics and Statistics Administration. 2012. Intellectual Property and the U.S. Economy: Industries in Focus.Google Scholar
- Ian Gibson, David W. Rosen, Brent Stucker, et al. 2010. Additive Manufacturing Technologies. Springer.Google Scholar
- Jacek F. Gieras, Chong Wang, and Joseph Cho Lai. 2005. Noise of Polyphase Electric Motors. CRC Press.Google Scholar
- Zoom H6 Handy Recorder. 2015. Retrieved from www.zoom-na.com.Google Scholar
- Bedřich Heller and Václav Hamata. 1977. Harmonic Field Effects in Induction Machines. Elsevier Science & Technology.Google Scholar
- Timothy R. Holbrook and Lucas Osborn. 2014. Digital patent infringement in an era of 3D printing. UC Davis Law Review, Forthcoming.Google Scholar
- A. Hughes and P. J. Lawrenson. 1975. Electromagnetic damping in stepping motors. In Proceedings of the Institution of Electrical Engineers, Vol. 122. IET, 819--824.Google Scholar
- Mara Hvistendahl. 2016. 3D printers vulnerable to spying. Science 352, 6282 (2016), 132--133.Google Scholar
- Takashi Kenjō and Akira Sugawara. 1994. Stepping Motors and Their Microprocessor Controls. Oxford University Press, USA.Google Scholar
- Barbara Leukers et al. 2005. Hydroxyapatite scaffolds for bone tissue engineering made by 3D printing. J. Mater. Sci.: Mater. Med. 16, 12 (2005), 1121--1124.Google ScholarCross Ref
- MATLAB. 2015. (R2015b). The MathWorks Inc., Natick, Massachusetts.Google Scholar
- NDIA. 2014. Cyber Security for Advanced Manufacturing. Technical Report. National Defense Industrial Association.Google Scholar
- Alan V. Oppenheim et al. 1989. Discrete-time Signal Processing. Vol. 2. Prentice-hall Englewood Cliffs. Google ScholarDigital Library
- Michael S. Pedersen et al. 2007. A survey of convolutive blind source separation methods. Multichannel Speech Processing Handbook (2007), 1065--1084.Google Scholar
- F. Pedregosa et al. 2011. Scikit-learn: Machine learning in python. J. Machine Learn. Res. 12 (2011), 2825--2830. Google ScholarDigital Library
- ISS Platform and Feedstock Recycling. 2014. NASA advanced manufacturing technology.Google Scholar
- Printrbot 3D Printers. 2015. (2015). Retrieved from www.printrbot.com.Google Scholar
- Python 2.7.10. 2015. (2015). Retrieved from www.python.org.Google Scholar
- Cohn Reznick. 2015. Manufacturing: A persistent and prime cyber attack target. Retrieved from www.cohnreznick.com.Google Scholar
- Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. 2016. KCAD: Kinetic cyber attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design. ACM, 74. Google ScholarDigital Library
- Sujit Rokka Chhetri, Sina Faezi, and Mohammad Abdullah Al Faruque. 2017. Fix the leak! an information leakage aware secured cyber-physical manufacturing system. In Proceedings of the 2017 Conference on Design, Automation & Test in Europe. EDA Consortium. Google ScholarDigital Library
- Billy Short. 2015. Quality Metal Additive Manufacturing (QUALITY MADE) Enabling Capability. Retrieved from www.navy.mil.Google Scholar
- SketchUp Make. 2015. Retrieved from www.sketchup.com.Google Scholar
- E. C. T. So, R. G. D. Williams, and S. J. Yang. 1993. A simple model to calculate the stator radial vibration of a hybrid stepping motor. In Proceedings of the Industry Applications Society Annual Meeting, Conference Record of the 1993 IEEE. IEEE, 122--129.Google Scholar
- François-Xavier Standaert et al. 2009. A unified framework for the analysis of side-channel key recovery attacks. In Proceedings of the European Conference on Advances in Cryptology (EUROCRYPT’09). Springer, 443--461.Google Scholar
- L. D. Sturm et al. 2014. Cyber-physical vulnerabilities in additive manufacturing systems. Context 7 (2014), 8.Google Scholar
- Sergios Theodoridis et al. 2010. Introduction to Pattern Recognition: A Matlab Approach: A Matlab Approach. Academic Press. Google ScholarDigital Library
- László Timár-Peregrin Timár-P and P. L. Tímár. 1989. Noise and Vibration of Electrical Machines. Vol. 34. North Holland.Google Scholar
- Ehsan Toreini, Brian Randell, and Feng Hao. 2015. An acoustic side-channel attack on enigma. Computing Science, Newcastle University. http://www.cs.ncl.ac.uk/publications/trs/papers/1455.pdf.Google Scholar
- Hannah Vincent et al. 2015. Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing. Elsevier.Google Scholar
- David S. Wall and Majid Yar. 2010. Intellectual property crime and the internet: Cyber-piracy and stealing information intangibles. In Handbook of Internet Crime. Willan, 255.Google Scholar
- T. T. Wohlers, Wohlers Associates, and T. Caffrey. 2014. Wohlers report 2014-3D printing and additive manufacturing-state of the industry annual worldwide progress report. Wohlers Associates. https://books.google.com/books?id=iCamoAEACAAJ.Google Scholar
- Mark Yampolskiy et al. 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM, 7. Google ScholarDigital Library
- S. J. Yang. 1981. Low-noise Electrical Motors. Vol. 13. Oxford University Press.Google Scholar
Index Terms
- Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems
Recommendations
KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)Additive Manufacturing (AM) uses Cyber-Physical Systems (CPS) (e.g., 3D Printers) that are vulnerable to kinetic cyber-attacks. Kinetic cyber-attacks cause physical damage to the system from the cyber domain. In AM, kinetic cyber-attacks are realized by ...
Thermal side-channel forensics in additive manufacturing systems: poster abstract
ICCPS '16: Proceedings of the 7th International Conference on Cyber-Physical SystemsAdditive manufacturing systems leak cyber-related information (such as G-code, M-code, etc.) from the side-channels (such as acoustic, power, thermal, etc.). In our work, we have successfully demonstrated the vulnerability of additive manufacturing to ...
Acoustic side-channel attacks on additive manufacturing systems
ICCPS '16: Proceedings of the 7th International Conference on Cyber-Physical SystemsAdditive manufacturing systems, such as 3D printers, emit sounds while creating objects. Our work demonstrates that these sounds carry process information that can be used to indirectly reconstruct the objects being printed, without requiring access to ...
Comments