Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems (2404.15446v2)

Published 23 Apr 2024 in cs.CR, cs.SY, and eess.SY

Abstract: Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compromises comes from the difficulty in evaluating and benchmarking both identified threat vectors as well as methods for detecting adversarial actions. In this work, we introduce a generalized platform for systematic analysis of attacks against and defenses for 3D printers. Our "OFFRAMPS" platform is based on the open-source 3D printer control board "RAMPS." OFFRAMPS allows analysis, recording, and modification of all control signals and I/O for a 3D printer. We show the efficacy of OFFRAMPS by presenting a series of case studies based on several Trojans, including ones identified in the literature, and show that OFFRAMPS can both emulate and detect these attacks, i.e., it can both change and detect arbitrary changes to the g-code print commands.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (30)
  1. J. K. Placone and A. J. Engler, “Recent Advances in Extrusion-Based 3D Printing for Biomedical Applications,” Advanced Healthcare Materials, vol. 7, no. 8, p. 1701161, 2018.
  2. C. Tawk, H. Zhou, E. Sariyildiz, M. in het Panhuis, G. M. Spinks, and G. Alici, “Design, Modeling, and Control of a 3D Printed Monolithic Soft Robotic Finger With Embedded Pneumatic Sensing Chambers,” IEEE/ASME Transactions on Mechatronics, vol. 26, no. 2, pp. 876–887, Apr. 2021.
  3. O. Lakhal, T. Chettibi, A. Belarouci, G. Dherbomez, and R. Merzouki, “Robotized Additive Manufacturing of Funicular Architectural Geometries Based on Building Materials,” IEEE/ASME Transactions on Mechatronics, vol. 25, no. 5, pp. 2387–2397, Oct. 2020.
  4. B. Blakey-Milner, P. Gradl, G. Snedden, M. Brooks, J. Pitot, E. Lopez, M. Leary, F. Berto, and A. du Plessis, “Metal additive manufacturing in aerospace: A review,” Materials & Design, vol. 209, p. 110008, Nov. 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0264127521005633
  5. J. C. Vasco, “Chapter 16 - Additive manufacturing for the automotive industry,” in Additive Manufacturing, ser. Handbooks in Advanced Manufacturing, J. Pou, A. Riveiro, and J. P. Davim, Eds.   Elsevier, Jan. 2021, pp. 505–530. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B9780128184110000100
  6. S. E. Zeltmann, N. Gupta, N. G. Tsoutsos, M. Maniatakos, J. Rajendran, and R. Karri, “Manufacturing and Security Challenges in 3D Printing,” JOM, vol. 68, no. 7, pp. 1872–1881, Jul. 2016. [Online]. Available: https://doi.org/10.1007/s11837-016-1937-7
  7. P. Mahesh, A. Tiwari, C. Jin, P. R. Kumar, A. L. N. Reddy, S. T. S. Bukkapatanam, N. Gupta, and R. Karri, “A Survey of Cybersecurity of Digital Manufacturing,” Proceedings of the IEEE, pp. 1–22, 2020.
  8. Anonymous, “Offramps repository.” [Online]. Available: https://doi.org/10.5281/zenodo.10279360
  9. N. Gupta, A. Tiwari, S. T. S. Bukkapatnam, and R. Karri, “Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks,” IEEE Access, vol. 8, pp. 47 322–47 333, 2020.
  10. M. Yampolskiy, W. E. King, J. Gatlin, S. Belikovetsky, A. Brown, A. Skjellum, and Y. Elovici, “Security of additive manufacturing: Attack taxonomy and survey,” Additive Manufacturing, vol. 21, pp. 431–457, May 2018. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S221486041730502X
  11. S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin, and Y. Elovici, “dr0wned – {Cyber-Physical} Attack with Additive Manufacturing,” 2017. [Online]. Available: https://www.usenix.org/conference/woot17/workshop-program/presentation/belikovetsky
  12. S. B. Moore, W. B. Glisson, and M. Yampolskiy, “Implications of malicious 3d printer firmware.”   Proceedings of the 50th Hawaii International Conference on System Sciences, 2017.
  13. MarlinFirmware, “Marlin Firmware,” Dec. 2023. [Online]. Available: https://marlinfw.org/
  14. H. Pearce, K. Yanamandra, N. Gupta, and R. Karri, “Flaw3d: A trojan-based cyber attack on the physical outcomes of additive manufacturing,” IEEE/ASME Transactions on Mechatronics, vol. 27, no. 6, pp. 5361–5370, 2022.
  15. J. Gatlin, S. Belikovetsky, Y. Elovici, A. Skjellum, J. Lubell, P. Witherell, and M. Yampolskiy, “Encryption is futile: Reconstructing 3d-printed models using the power side-channel,” in Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, 2021, pp. 135–147.
  16. M. A. Al Faruque, S. R. Chhetri, A. Canedo, and J. Wan, “Acoustic side-channel attacks on additive manufacturing systems,” in 2016 ACM/IEEE 7th international conference on Cyber-Physical Systems (ICCPS).   IEEE, 2016, pp. 1–10.
  17. S. R. Chhetri, A. Canedo, and M. A. Al Faruque, “Kcad: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems,” in 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).   IEEE, 2016, pp. 1–8.
  18. S. Belikovetsky, Y. A. Solewicz, M. Yampolskiy, J. Toh, and Y. Elovici, “Digital audio signature for 3d printing integrity,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1127–1141, 2018.
  19. S. Liang, S. Zonouz, and R. Beyah, “Hiding my real self! protecting intellectual property in additive manufacturing systems against optical side-channel attacks,” in Proceedings 2022 Network and Distributed System Security Symposium. Internet Society, 2022.
  20. M. A. Al Faruque, S. R. Chhetri, A. Canedo, and J. Wan, “Forensics of thermal side-channel in additive manufacturing systems,” University of California, Irvine, vol. 12, no. 13, p. 176, 2016.
  21. J. Gatlin, S. Belikovetsky, S. B. Moore, Y. Solewicz, Y. Elovici, and M. Yampolskiy, “Detecting sabotage attacks in additive manufacturing using actuator power signatures,” IEEE Access, vol. 7, pp. 133 421–133 432, 2019.
  22. M. Wu, Z. Song, and Y. B. Moon, “Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods,” Journal of Intelligent Manufacturing, vol. 30, no. 3, pp. 1111–1123, Mar. 2019. [Online]. Available: https://doi.org/10.1007/s10845-017-1315-5
  23. S. M. Dibaji, M. Pirani, D. B. Flamholz, A. M. Annaswamy, K. H. Johansson, and A. Chakrabortty, “A systems and control perspective of CPS security,” Annual Reviews in Control, vol. 47, pp. 394–411, Jan. 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1367578819300185
  24. A. Humayed, J. Lin, F. Li, and B. Luo, “Cyber-Physical Systems Security—A Survey,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802–1831, Dec. 2017, conference Name: IEEE Internet of Things Journal. [Online]. Available: https://ieeexplore.ieee.org/document/7924372
  25. RepRap, “RAMPS 1.4 - RepRap,” Dec. 2022. [Online]. Available: https://reprap.org/wiki/RAMPS_1.4
  26. C. Beckwith, H. S. Naicker, S. Mehta, V. R. Udupa, N. T. Nim, V. Gadre, H. Pearce, G. Mac, and N. Gupta, “Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files,” IEEE Embedded Systems Letters, vol. 14, no. 3, pp. 111–114, Sep. 2022, conference Name: IEEE Embedded Systems Letters. [Online]. Available: https://ieeexplore.ieee.org/document/9619477
  27. Digilent, “Cmod A7 Reference Manual - Digilent Reference,” Oct. 2019. [Online]. Available: https://digilent.com/reference/programmable-logic/cmod-a7/reference-manual
  28. Arduino, “Mega 2560 Rev3 | Arduino Documentation,” Nov. 2023. [Online]. Available: https://docs.arduino.cc/hardware/mega-2560
  29. J. Prusa, “Original Prusa i3 MK3S+ 3D Printer kit | Original Prusa 3D printers directly from Josef Prusa,” Dec. 2023. [Online]. Available: https://www.prusa3d.com/product/original-prusa-i3-mk3s-3d-printer-kit/
  30. S. Liang, X. Peng, H. J. Qi, S. Zonouz, and R. Beyah, “A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems,” in 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), Jul. 2021, pp. 1075–1087, iSSN: 2575-8411. [Online]. Available: https://ieeexplore.ieee.org/document/9546490

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com