Your 3D printer is telling people what it’s making

From: cnet.com: In research demonstrating that industrial espionage may be as simple as opening a recording app on your smartphone, a team led by Professor Mohammad Al Faruque at the University of California at Irvine has shown that it is possible to reconstruct a 3D model based solely on audio of the printer in action.

According to the team’s research, the sounds made by a 3D printer can be used to ascertain the position and movements of its extruder. A recording of these sounds can then be used to reverse engineer these positions and use them to recreate a model of the object being printed.

Advanced parts made by 3D printing could be at risk.

Encryption can be used to protect a file. But once the design gets to the printer, the sounds of the motors give it away. Even if a human ear can’t tell the difference, software can be used to decipher the minute changes.

“In many manufacturing plants, people who work on a shift basis don’t get monitored for their smartphones, for example,” Al Faruque, an electrical engineer and computer scientist with the university’s Advanced Integrated Cyber-Physical Systems Lab, said in a statement.

“If process and product information is stolen during the prototyping phases, companies stand to incur large financial losses. There’s no way to protect these systems from such an attack today, but possibly there will be in the future.”

To test their hypothesis, the team used a key-shaped object. By recording the sounds of the 3D printer, they were able to reconstruct the object with 90 percent accuracy.

“My group basically stumbled upon this finding last summer as we were doing work to try to understand the relationship between information and energy flows,” said Al Faruque.

“According to the fundamental laws of physics, energy is not consumed; it’s converted from one form to another — electromagnetic to kinetic, for example. Some forms of energy are translated in meaningful and useful ways; others become emissions, which may unintentionally disclose secret information.”

[Read more]