SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
TOP Security!
13 Sep 2016

Top secret designs could be stolen from 3D printers using an ordinary smartphone

In the years to come, 3D printing is going to be used for everything from helping create rocket engines to printing new heart valves.

With those kind of high-stakes — and often highly-valuable–applications, it’s no wonder experts are concerned about the security risk posed by hackers.

One possible threat is explored in a new study by researchers at the University at Buffalo in New York entitled “My Smartphone Knows What You Print: Exploring Smartphone-Based Side-Channel Attacks Against 3D Printers.” A team of computer scientists was able to use a regular smartphone’s built-in sensors to measure the electromagnetic energy and acoustic waves that emanate from a 3-D printer. By doing so, they were then able to gather enough data to replicate 3D-printed objects with accuracy levels of up to 94 percent, depending on the complexity of the object.

“This is the first work to investigate the vulnerability of 3D printers,” Wenyao Xu, assistant professor in the unicersity’s department of computer science and engineering, told. “Considering that 3D printers are the driving force for innovation and an emerging manufacturing approach, it is very critical to make sure 3D printers are secure, and the intellectual property in the 3D design is well-protected.”

Xu said that very few people are aware of the potential danger to 3D printers posed by nothing more sinister than the ubiquitous smartphone. “This attack can happen in both individual and industrial 3D printers,” Xu continued. “Also, it can be applied against bioprinting and metal printing, which are more security sensitive.”

Fortunately, noone can accuse Xu and his fellow researchers of being the kind of folks to point out a problem, then offer no solution. One possible answer involves hardware-based concepts like acoustic and electromagnetic shields. Another may turn out to be even simpler. “We have proposed new path planning algorithms to spoof the side-channel attack,” Xu said. “No extra hardware is needed to prevent this threat.”

Tags:
information leaks Internet of Things
Source:
Digital Trends
1922
Other NEWS
3 Jul 2020 safeum news imgage An encrypted messaging service has been infiltrated by police
4 May 2020 safeum news imgage Two-Factor Authentication ​What Is It and Why You Should Use It
12 Dec 2019 safeum news imgage Encryption is under threat - this is how it affects you
4 Nov 2019 safeum news imgage Should Big Decisions Be Based on Data or Your Intuition?
7 Jun 2018 safeum news imgage VPNFilter malware infecting 500,000 devices is worse than we thought
4 Jun 2018 safeum news imgage Hackers target Booking.com in criminal bid to steal hundreds of thousands from customers
1 Jun 2018 safeum news imgage Operator of World's Top Internet Hub Sues German Spy Agency
30 May 2018 safeum news imgage US says North Korea behind malware attacks
29 May 2018 safeum news imgage Facebook and Google targeted as first GDPR complaints filed
25 May 2018 safeum news imgage A new reason to not buy these cheap Android devices
24 May 2018 safeum news imgage Flaws in smart pet devices, apps could come back to bite owners
23 May 2018 safeum news imgage Google sued for 'clandestine tracking' of 4.4m UK iPhone users' browsing data
21 May 2018 safeum news imgage LocationSmart reportedly leaked phone location data onto the web
18 May 2018 safeum news imgage The SEC created its own scammy ICO to teach investors a lesson
17 May 2018 safeum news imgage Thieves suck millions out of Mexican banks in transfer heist
All news
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015