Researchers warn hackers could sabotage 4D printed products to cause catastrophic failures

WHY THIS MATTERS IN BRIEF

4D printing lets us create morphing products with special on demand properties which could be sabotaged to cause deadly failures.

 

Love the Exponential Future? Join our XPotential Community, future proof yourself with courses from XPotential Universityconnect, watch a keynote, read our codexes, or browse my blog.

4D printing, a relatively new advanced manufacturing technology that prints parts and products that change shape when exposed to different stimuli, such as heat or water, and which is already being lined up by NASA to print and assemble space stations in orbit, as well as 4D print new materials, robots, and replacement human organs for children, could be vulnerable to a completely new kind of custom attack security researchers have warned.

 

See also
Scientists developed a device that enables two way communication with plants

 

At a recent conference Tuan Le at Rutgers University in the US and his colleagues warned that as 4D printing starts going mainstream companies should seriously consider analysing the technology’s security. They then went on to suggest that using 4D printing in critical applications, such as aircraft and medical devices, could open the door for malicious attackers to cause “catastrophic failures.”

The researchers claim that a hacker who gains access to a computer designing parts or the printer itself could tweak designs.

“The attacker can compromise the controller software that is in charge of the selection of printing materials. This would enable the attacker to implement the attack and embed the smart material in pre-determined spots for delayed activation,” they wrote.

 

See also
Scientists have created a swarm of injectable brain reading nanosensors

 

For example, aircraft propellers could be altered so that they change pitch angle at a certain temperature, potentially causing a fatal crash. In experiments, a propeller with malicious changes produced 42g of thrust at 25 per cent throttle, while the original design produced 55.8g. Yet to the naked eye both propellers appeared identical.

Alternatively, face masks could be modified so that when they are cleaned with water, a tiny channel is formed by dissolving material that allows air and viruses to pass through the filter.

To protect against these threats, the researchers say that CT scans can detect manipulations better than existing approaches. In tests, they found that scans lasting 30 minutes could distinguish hacked propellers from benign ones with 94.6 per cent accuracy.

 

See also
US CDC launches a Cornoavirus self-checker bot to ease pressure on front line staff

 

Adrian Bowyer at 3D printing research company RepRap says that similar attacks have been possible for decades on machines that carve metal parts, and that 4D printing is no different.

“The digital machines doing that could be attacked in exactly the same way, with similar results,” he says. “Any digitally controlled manufacturing process for a complicated multi-part object is equally susceptible, and has been since the invention of computer numerically controlled machines almost 70 years ago.”

Bowyer says he is unaware of a single such attack in the real world though – yet.

 

See also
Revolutionary new IoT chip communicates miles without using any energy

 

“When things are made as one-offs for critical applications, they are rigorously tested. This would reveal the attack,” he says. “When things are made in bulk for critical applications, they are randomly sampled and the samples are rigorously tested. This would also reveal the attack. The sensing techniques that they have developed would probably be a lot more useful to tell when a printer had gone wrong, which is a much more likely eventuality than a deliberate attack.”

Meanwhille, Eujin Pei at Brunel University London says that tiny changes to printing instructions can change the property of even traditional 3D printed parts, but agrees that the best defence is good quality control.

“You need to undergo stringent tests for this type of application,” he says.

Related Posts

Leave a comment

Awesome! You're now subscribed.

Pin It on Pinterest

Share This