[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3462223.3485618acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad

Published: 15 November 2021 Publication History

Abstract

It is natural, as the demand for Additive Manufacturing (AM) Security grows, to adopt established approaches from other security research areas. However, such "imports,'' if not done carefully, can be misleading, and sometimes even counterproductive, and thus may negatively affect actual security of AM. We argue that this is the case for the CIA triad (Confidentiality, Integrity, Availability), a fundamental model of data security. To this end, we present arguments showing that the CIA triad cannot substitute concrete threat categories already established in AM. AM is an area which is not "pure data," but rather an area involving software, data files, and transforming data into physical artifacts, where established threats in this ecosystem include: Technical Data Theft, Sabotage, and Illegal Part Manufacturing.

Supplementary Material

MP4 File (AMSec21_Yampolskiy_Deficiencies.mp4)
It is natural, as the demand for Additive Manufacturing (AM) Security grows, to adopt established approaches from other security research areas. However, such "imports,"' if not done carefully, can be misleading, and sometimes even counterproductive, and thus may negatively affect actual security of AM. We argue that this is the case for the CIA triad (Confidentiality, Integrity, Availability), a fundamental model of data security. To this end, we present arguments showing that the CIA triad cannot substitute concrete threat categories already established in AM. AM is an area which is not "pure data,"' but rather an area involving software, data files, and transforming data into physical artifacts, where established threats in this ecosystem include: Technical Data Theft, Sabotage, and Illegal Part Manufacturing.

References

[1]
Mohammad Abdullah Al Faruque, Sujit Rokka Chhetri, Arquimedes Canedo, and Jiang Wan. Acoustic side-channel attacks on additive manufacturing systems. In 2016 ACM/IEEE 7th international conference on Cyber-Physical Systems (ICCPS), pages 1--10. IEEE, 2016.
[2]
Michael Balsamo and Chris for AP News Grygiel. Coalition of states sue over rules governing 3d-printed guns, 2020.
[3]
BBC. Japan man held over '3d-printed guns', 2020.
[4]
Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, and Yuval Elovici. dr0wnedcyber- physical attack with additive manufacturing, 2016.
[5]
Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, and Yuval Elovici. dr0wned -- cyber-physical attack with additive manufacturing. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), page 16, Vancouver, BC, 2017. USENIX Association.
[6]
Adam Brown, Mark Yampolskiy, Jacob Gatlin, and Todd Andel. Legal aspects of protecting intellectual property in additive manufacturing. In International Conference on Critical Infrastructure Protection, pages 63--79. Springer, 2016.
[7]
Siva Chaitanya Chaduvula, Adam Dachowicz, Mikhail J Atallah, and Jitesh H Panchal. Security in cyber-enabled design and manufacturing: A survey. Journal of Computing and Information Science in Engineering, 18(4), 2018.
[8]
Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. Kcad: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design, page 74. ACM, 2016.
[9]
Sujit Rokka Chhetri, Sina Faezi, and Mohammad Abdullah Al Faruque. Information leakage-aware computer-aided cyber-physical manufacturing. IEEE Transactions on Information Forensics and Security, 13(9):2333--2344, 2018.
[10]
Stijn Clijsters, Tom Craeghs, Sam Buls, Karolien Kempen, and J-P Kruth. In situ quality control of the selective laser melting process using a high-speed, real-time melt pool monitoring system. The International Journal of Advanced Manufacturing Technology, 75(5--8):1089--1101, 2014.
[11]
Adam Dachowicz, Siva Chaitanya Chaduvula, Mikhail Atallah, and Jitesh H Panchal. Microstructure-based counterfeit detection in metal part manufacturing. JOM, 69(11):2390--2396, 2017.
[12]
Quang Do, Ben Martini, and Kim-Kwang Raymond Choo. A data exfiltration and remote exploitation attack on consumer 3d printers. IEEE Transactions on Information Forensics and Security, 11(10):2174--2186, 2016.
[13]
Nicolas Falliere, Liam O Murchu, and Eric Chien. W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5(6):29, 2011.
[14]
Yang Gao, Borui Li,WeiWang,Wenyao Xu, Chi Zhou, and Zhanpeng Jin. Watching and safeguarding your 3d printer: Online process monitoring against cyberphysical attacks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(3):1--27, 2018.
[15]
Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, PaulW. Witherell, and Mark Yampolskiy. Encryption is futile: Reconstructing 3dprinted models using the power side channel. In The 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021). ACM, 2021.
[16]
LMG Graves, W King, P Carrion, S Shao, N Shamsaei, and M Yampolskiy. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing, page 102029, 2021.
[17]
Lynne MG Graves, Joshua Lubell, Wayne King, and Mark Yampolskiy. Characteristic aspects of additive manufacturing security from security awareness perspectives. IEEE Access, 7:103833-103853, 2019.
[18]
ASTM International. F2792--12a-standard terminology for additive manufacturing technologies. Rapid Manufacturing Association, 12:10--12, 2013.
[19]
Zachary C Kennedy, David E Stephenson, Josef Christ, Timothy R Pope, Bruce Arey, Christopher A Barrett, and Marvin GWarner. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. Journal of Materials Chemistry C, 5:9570--9578, 2017.
[20]
Edward A Lee. Cyber physical systems: Design challenges. In 2008 11th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC), pages 363--369. IEEE, 2008.
[21]
Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, and Kim- Kwang Raymond Choo. Identifying 3d printer residual data via open source documentation. Computers & Security, 2018.
[22]
Samuel Moore, Phillip Armstrong, Todd McDonald, and Mark Yampolskiy. Vulnerability analysis of desktop 3d printer software. In Resilience Week (RWS), 2016, pages 46--51. IEEE, 2016.
[23]
Samuel Bennett Moore, William Bradley Glisson, and Mark Yampolskiy. Implications of malicious 3d printer firmware. In Proceedings of the 50th Hawaii International Conference on System Sciences, 2017.
[24]
Bureau of Industry and US Department of Commerce Security. Us commerce control list, 2021.
[25]
Donn Parker. Our excessively simplistic information security model and how to fix it. ISSA Journal, 8(7):12--21, 2010.
[26]
Giao N Pham, Suk-Hwan Lee, Oh-Heum Kwon, and Ki-Ryong Kwon. Anti-3d weapon model detection for safe 3d printing based on convolutional neural networks and d2 shape distribution. Symmetry, 10(4):90, 2018.
[27]
Olaf Rehme. Cellular design for laser freeform fabrication, volume 4. Cuvillier Verlag, 2010.
[28]
Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E King, Gabe Guss, and Yuval Elovici. How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective. In Proceedings of the 12th International Conference on Availability, Reliability and Security, page 78. ACM, 2017.
[29]
L Sturm, CB Williams, JA Camelio, J White, and R Parker. Cyber-physical vunerabilities in additive manufacturing systems. Context, 7:8, 2014.
[30]
Nektarios Georgios Tsoutsos, Homer Gamil, and Michail Maniatakos. Secure 3d printing: Reconstructing and validating solid geometries using toolpath reverse engineering. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, pages 15--20. ACM, 2017.
[31]
Hamilton Turner, Jules White, Jaime A Camelio, Christopher Williams, Brandon Amos, and Robert Parker. Bad parts: Are our manufacturing systems at risk of silent cyberattacks? IEEE Security & Privacy, 13(3):40--47, 2015.
[32]
Silvia Vock, Burghardt Klöden, Alexander Kirchner, Thomas Weißgärber, and Bernd Kieback. Powders for powder bed fusion: a review. Progress in Additive Manufacturing, pages 1--15, 2019.
[33]
Johann Wolfgang Von Goethe. Maximen und reflexionen. Jazzybee Verlag, 2012.
[34]
Terry Wohlers. Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates, Inc., Fort Collins, Colorado, USA, 2021. www.wohlersassociates.com.
[35]
Xiao Zi Hang (Claud Xiao). Security attack to 3d printing, 2013. Keynote at XCon2013.
[36]
Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, and Yuval Elovici. Evaluation of additive and subtractive manufacturing from the security perspective. In International Conference on Critical Infrastructure Protection, pages 23--44. Springer, 2017.
[37]
Mark Yampolskiy, Wayne E King, Jacob Gatlin, Sofia Belikovetsky, Adam Brown, Anthony Skjellum, and Yuval Elovici. Security of Additive Manufacturing: Attack Taxonomy and Survey. Additive Manufacturing, 2018.
[38]
Mark Yampolskiy, Lena Schutzle, Uday Vaidya, and Alec Yasinsac. Security challenges of additive manufacturing with metals and alloys. In Critical Infrastructure Protection IX, pages 169--183. Springer, 2015.
[39]
Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A Overfelt, Kenneth R Sloan, and Alec Yasinsac. Using 3D Printers asWeapons. International Journal of Critical Infrastructure Protection, 14:58--71, 2016.
[40]
Alireza Zarreh, HungDa Wan, Yooneun Lee, Can Saygin, and Rafid Al Janahi. Risk assessment for cyber security of manufacturing systems: A game theory approach. Procedia Manufacturing, 38:605--612, 2019.
[41]
Steven Eric Zeltmann, Nikhil Gupta, Nektarios Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri. Manufacturing and security challenges in 3d printing. JOM, pages 1--10, 2016.

Cited By

View all
  • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
  • (2023)Data Security in Additive ManufacturingAdditive Manufacturing Design and Applications10.31399/asm.hb.v24A.a0006962(203-209)Online publication date: 30-Jun-2023
  • (2023)Investigating Cybersecurity Risks and the Responses of Home Workers in Aotearoa New ZealandProceedings of the 35th Australian Computer-Human Interaction Conference10.1145/3638380.3638385(99-107)Online publication date: 2-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security
November 2021
72 pages
ISBN:9781450384803
DOI:10.1145/3462223
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 November 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3d printing
  2. additive manufacturing
  3. cia triad
  4. security

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '21
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)714
  • Downloads (Last 6 weeks)60
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
  • (2023)Data Security in Additive ManufacturingAdditive Manufacturing Design and Applications10.31399/asm.hb.v24A.a0006962(203-209)Online publication date: 30-Jun-2023
  • (2023)Investigating Cybersecurity Risks and the Responses of Home Workers in Aotearoa New ZealandProceedings of the 35th Australian Computer-Human Interaction Conference10.1145/3638380.3638385(99-107)Online publication date: 2-Dec-2023
  • (2023)Beyond the Basics: A Study of Advanced Techniques for Detecting and Preventing SQL Injection Attacks2023 4th International Conference on Smart Electronics and Communication (ICOSEC)10.1109/ICOSEC58147.2023.10276077(628-631)Online publication date: 20-Sep-2023
  • (2023)Major Software Security Risks in Banking Industry: Design Phase Perspective2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)10.1109/ICIPTM57143.2023.10118067(1-4)Online publication date: 22-Feb-2023
  • (2022)State of Security Awareness in the Additive Manufacturing Industry: 2020 SurveyProgress in Additive Manufacturing 202110.1520/STP164420210119(192-212)Online publication date: 1-Dec-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media