Digital Audio Signature for 3D Printing Integrity

被引:39
作者
Belikovetsky, Sofia [1 ,2 ]
Solewicz, Yosef A. [1 ,2 ]
Yampolskiy, Mark [3 ]
Toh, Jinghui [4 ]
Elovici, Yuval [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, IL-8410501 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Cyber Secur Res Ctr, IL-8410501 Beer Sheva, Israel
[3] Univ S Alabama, Dept Comp Sci, Mobile, AL 36688 USA
[4] Singapore Univ Technol & Design, ITrust Ctr Res Cyber Secur, Singapore 487372, Singapore
关键词
Additive manufacturing; cyber security; side channels; SECURITY CHALLENGES; SYSTEMS;
D O I
10.1109/TIFS.2018.2851584
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object. Our approach operates on acoustic side-channel emanations generated by the 3D printer's stepper motors, which results in a non-intrusive and real-time validation process that is difficult to compromise. The proposed approach constitutes two algorithms. The first algorithm is used to generate a master audio fingerprint for the verifiable unaltered printing process. The second algorithm is applied when the same 3D object is printed again, and this algorithm validates the monitored 3D printing process by assessing the similarity of its audio signature with the master audio fingerprint. To evaluate the quality of the proposed thresholds, we identify the detectability thresholds for the following minimal tampering primitives: insertion, deletion, replacement, and modification of a single tool path command. By detecting the deviation at the time of occurrence, we can stop the printing process for compromised objects, thus saving time and preventing material waste. We discuss various factors that impact the method, such as background noise, audio device changes, and different audio recorder positions.
引用
收藏
页码:1127 / 1141
页数:15
相关论文
共 31 条
[11]  
Ding C., 2004, P 21 INT C MACH LEAR, P29, DOI DOI 10.1145/1015330.1015408
[12]   A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) :2174-2186
[13]  
Faruque M. A., 2016, P ACM IEEE INT C CYB
[14]  
Frigo M, 1998, INT CONF ACOUST SPEE, P1381, DOI 10.1109/ICASSP.1998.681704
[15]  
Hang X. Z., 2013, P XFOCUS INF SEC C
[16]  
Johnson J., 2013, Journal of Law, Technology Policy, V13, P337
[17]  
Kellner T., 2015, TECH REP
[18]  
Moore S, 2016, 2016 RESILIENCE WEEK (RWS), P46, DOI 10.1109/RWEEK.2016.7573305
[19]  
Moore SB, 2017, PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P6089
[20]  
Muller A., 2016, TECH REP