cybersecurity in additive manufacturing · cybersecurity in additive manufacturing nikhil gupta,...

26
Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity New York University Brooklyn, NY 11201 USA Http://engineering.nyu.edu/composites Email: [email protected] 3DPSecurity.com

Upload: others

Post on 28-Jun-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

Cybersecurity in Additive Manufacturing

Nikhil Gupta, Ph.D.

Mechanical and Aerospace Engineering

Center for Cybersecurity

New York University Brooklyn, NY 11201 USA

Http://engineering.nyu.edu/composites Email: [email protected]

3DPSecurity.com

Page 2: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

Acknowledgments

Collaborators and Contributors Fei Chen (NYU TSoE) - Ph.D researcher Ashish K. Singh (NYU TSoE) - Ph.D. researcher Dr. Ramesh Karri (NYU TSoE) - Cybersecurity Michail Maniatakos (NYUAD) - Cybersecurity Dr. Khaled Shahin (NYUAD) - Metal 3D printing Dr. M. Doddamani (NIT-K, India) - AM of composites Dr. Dirk Lehmhus (IFAM, Bremen) - AM of metals and composites Steven Zeltmann - CEO, 3DP Security, Inc.

2/27/2018 2

Page 3: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

AM fundamental concept

Start

point

Start

point

• An object is sliced into multiple layers

• 2D toolpaths were generated for each layer

• The toolpaths will be translated into an encoder file such as G-code

• Tool can be either filament extrusion or laser 2/27/2018 3

Page 4: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 4

AM Market Size

• Worldwide revenues from AM products were an estimated $2.67 billion in 2016, an increase of 12.9% than in 2015

• AM services grew to an estimated $3.4 billion in 2016, an increase of 21.2% than in 2015

• The AM market has grown by • 21.1% in 2016,

• 33% in 2015,

• 38.9% in 2014, and

• 26.3% in 2013

• McKinsey Global Institute research suggests that it could have an impact of up to $550 billion a year by 2025

Page 5: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

Turbine rotor produced by AM

AM Advantages

2/27/2018 5

• Faster product realization and testing cycles, which accelerate the product development

• Realization of designs that could not be manufactured earlier

• Reduced tooling, assembly and inventory costs

Image courtesy: Dr. Dirk Lehmhus, Fraunhofer IFAM, Bremen, Germany

Jointless assembly of parts produced by AM

Hydraulic crossing

Model cross-sectional view Part produced by AM

Page 6: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 6

Manufacturing

• Development of new feed materials

• Consistent quality of feed materials

• Reducing the waste and cost in powder based processes

• Development of secondary processing methods

Challenges

Security

• Intellectual property compromise

• Product authentication

• Counterfeiting

Page 7: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 7

• Industrial manufacturing requires development of unique compositions of polymers with • Plasticizers, filler, high temperature stabilizers,

color pigments

• Developed a unique approach based on thermo-mechano-rheological properties

New Feed Material Development

Industrial grade high density

polyethylene (HDPE)

Page 8: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 8

New Feed Material Development

Riptide underwater autonomous

vehicle

Syntactic foam filament, density

0.6 g/cm3

Page 9: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 9

Additive Manufacturing Perception

Development of CAD model of desired shape

A top of the Line 3D Printer

Printed part ready for deployment

Page 10: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 10

Additive Manufacturing Perception

Development of CAD model of desired shape

A top of the Line 3D Printer

Printed Part ready for deployment

Actually, this is not a realistic picture, the process is much more involved and complicated

Page 11: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 11

AM Process Chain

Page 12: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 12

AM: Cyber-Physical System

Page 13: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 13

Cybersecurity in AM

• Network security tools • Traffic monitoring, firewalls,

access privileges

• Password protection of files

• File encryption

• Access control (network and physical)

• Security based design thinking

• The CAD model needs to be set up with • Security features to deter printing in high quality

• Product authentication methods

Page 14: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 14

Cybersecurity Risks

Cybersecurity spending in the U.S., percent of GDP and USD billions, 2009-2017

TIA’s 2010-2017 ICT Market Review and Forecast, available at: http://publications.atlanticcouncil.org/cyberrisks//

http://www.nbcnews.com/tech/tech-news/visa-database-found-be-vulnerable-hacking-n549011

• Lawrence Livermore National Laboratory: $2B in unapproved parts in inventory of distributors, airline, and repair stations

• US Senate (2011): counterfeit parts on C-17 transport airplane and the CH-46 helicopter, Theater High-Altitude Area Defense (THAAD) missile defense system

Page 15: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 15

Security Concerns in AM Process Chain

Premature failure under loads

Page 16: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

Encryption and Cryptography

Secure CAD

Models

Embedded Authentication Codes

Codes Obfuscation

Cybersecurity

2/27/2018 16

NYU AM Initiative

Z XY

Page 17: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

Secure CAD files

Start

point

Start

point

• An object is sliced into multiple layers

• 2D toolpaths were generated for each layer

• The toolpaths will be translated into an encoder file such as G-code

• Tool can be either filament extrusion or laser 2/27/2018 17

Page 18: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 18

Secure CAD Models

• Embedded spline feature

• Tessellated induced gaps lead to defective surface

• Printing of the spline split feature or not is orientation-dependent

Tensile bar designed with spline split

Sliced model Tensile testing Standard tensile bar with spline split feature

0

5

10

15

20

25

30

35

0 0.02 0.04 0.06 0.08 0.1

Str

es

s M

Pa

Strain mm/mm

Intact x-z

Spline x-z

Intact x-y

Spline x-y

• Orientation-dependent spline

CAD model

Tessellation induced

gaps

Page 19: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 19

Secure CAD Models

Page 20: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 20

Embedded Authentication Codes

2D QR code

CAD models X-ray CT scan 3D printed part

• These codes can be designed on the internal hidden surfaces or small interior sections

• A CT scanner, ultrasound scanner or other reading technologies can be used to retrieve information

Page 21: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 21

Tensile bar CAD with embedded multi-layer

code 3D printed tensile bars

Tensile testing

Intact bars QR embedded

bars Tensile

strength (MPa)

57.07±0.44 55.92±0.98

Modulus (GPa)

2.57±0.12 2.56±0.11

Weight (grams)

21.80±0.02 21.79±0.02

Embedded Authentication Codes

• Quality measurement

Page 22: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 22

Codes Obfuscation

CAD STL

XY x

y z

Z

x

y z

CT-scan front

CT-scan side

• The embedded authentication code can be controlled to only print under the specified orientation

• This incorporates the CAD security features into embedded code models, increasing security level and further obfuscating IP attackers

Sliced model

Page 23: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 23

Encryption and Cryptography

No Data Loss!

Page 24: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 24

Summary

• A new design thinking is required that integrates security into the product design and manufacturing process

• The layer by layer manufacturing process can be used for obfuscation of features that can be used for product authentication

• New possibilities such as converting design to sound are exciting for security!

Page 25: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 25

Publications

Journal papers • Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J. and Karri, R. Manufacturing and security

challenges in 3D printing. JOM: Journal of The Minerals, Metals, and Materials Society, 2016, 68(7) p. 1872–1881.

• Chen, F., Mac, G., Gupta, N. Security features embedded in computer aided design (CAD) solid models for additive manufacturing, Materials and Design. 2017, 128: p. 182-194.

• Singh, A.K., B. Patil, N. Hoffmann, B. Saltonstall, M. Doddamani, and N. Gupta, Additive Manufacturing of Syntactic Foams: Part 1: Development, Properties, and Recycling Potential of Filaments. JOM, 2018. 70(3): p. 303-309.

• Singh, A.K., B. Saltonstall, B. Patil, N. Hoffmann, M. Doddamani, and N. Gupta, Additive Manufacturing of Syntactic Foams: Part 2: Specimen Printing and Mechanical Property Characterization. JOM, 2018. 70(3): p. 310-314.

Book chapters • Gupta, N., Chen, F., and Shain, K., Design Features to Address Security Challenges in Additive Manufacturing. In Advances

in Manufacturing Techniques for Materials: Engineering and Engineered. Ed. Srivatsan, T. S., 2017.

Conference proceedings • Gupta, N., Chen, F., Tsoutsos, N.G., and Maniatakos, M., ObfusCADe: Obfuscating additive manufacturing CAD models

against counterfeiting. In 54th ACM/EDAC/IEEE Design Automation Conference (DAC) proceedings. Austin, TX, USA. June 18-22. 2017

Page 26: Cybersecurity in Additive Manufacturing · Cybersecurity in Additive Manufacturing Nikhil Gupta, Ph.D. Mechanical and Aerospace Engineering Center for Cybersecurity ... 2/27/2018

2/27/2018 26

Thank you