Sunday, December 21, 2025
ADVT 
Tech

Indian-Origin Researchers Report Cybersecurity Risks In 3D Printing

Darpan News Desk IANS, 18 Jul, 2016 02:10 PM
    A team comprising of Indian-origin researchers has found cybersecurity risks in 3D printing by examining two aspects -- printing orientation and insertion of fine defects.
     
    They found that since Computer-Aided Drafting (CAD) files -- used in the creation, modification, analysis, or optimisation of a design -- do not give instructions for printer head orientation, malefactors could alter the process without detection.
     
    Also, sub-millimetre defects that can appear between printed layers with exposure to fatigue and the elements were found to be undetectable by common industrial monitoring techniques, the researchers said.
     
    The finding, along with initial recommendations for remedies, was reported in the journal of the Minerals, Metals and Materials Society.
     
    "These are possible foci for attacks that could have devastating impact on users from the end product, and economic impact in the form of recalls and lawsuits," said Nikhil Gupta, an Associate Professor of Mechanical Engineering.
     
    The researchers reported that the orientation of the product during printing could make as much as a 25 per cent difference in its strength.
     
    Gupta explained that economic concerns also influence how a supplier prints a product. "Minus a clear directive from the design team, the best orientation for the printer is one that minimises the use of material and maximises the number of parts you can print in one operation," he said.
     
    According to Said Karri, a cybersecurity researcher, "With the growth of cloud-based and decentralised production environments, it is critical that all entities within the additive manufacturing supply chain be aware of the unique challenges presented to avoid significant risk to the reliability of the product."
     
    He pointed out that an attacker could hack into a printer that is connected to Internet to introduce internal defects as the component is being printed.

    MORE Tech ARTICLES

    An App That Helps You Cuddle Up To Strangers

    An App That Helps You Cuddle Up To Strangers
    Are you looking for a quick platonic cuddle? Then download the new app called Cuddlr - a cross between apps like Grindr and Tinder.

    An App That Helps You Cuddle Up To Strangers

    Facebook says won't miss out on key stories for its users

    Facebook says won't miss out on key stories for its users
    The social networking site Facebook is updating its news feed to feature right content at the right time, so that users do not miss out on key stories.

    Facebook says won't miss out on key stories for its users

    What? Newton Didn't Give Second Law Of Motion, Says New Paper

    What? Newton Didn't Give Second Law Of Motion, Says New Paper
    In Isaac Newton's time, the terms "acceleration" and "second derivative" did not exist, so he could not have deduced F=ma, the second law of motion. This has been unscientifically credited to Newton, says a research paper.

    What? Newton Didn't Give Second Law Of Motion, Says New Paper

    App to read your state of mind

    App to read your state of mind
    Your phone may now automatically know if you are depressed, stressed or lonely as researchers have developed an app that reveals mental health....

    App to read your state of mind

    Are YouTube, Facebook, Twitter hiding female abuse data?

    Are YouTube, Facebook, Twitter hiding female abuse data?
    Are YouTube, Facebook and Twitter hiding responses related to female harassment? If we believe a new study, the social media firms are not faring well on...

    Are YouTube, Facebook, Twitter hiding female abuse data?

    Apple modifies iPhones, iPads access without user authorization

    Apple modifies iPhones, iPads access without user authorization
    Technology giant Apple has announced a modification in its new iOS 8 operating system for mobile phones which prevents the company from accessing the...

    Apple modifies iPhones, iPads access without user authorization