Media Watch Archives
Mohammad Al Faruque, the director of UCI’s Advanced Integrated Cyber-Physical Systems Lab, led the team which showed that a simple device, such as a smartphone, can capture acoustic signals that carry information about the precise movements of the printer’s nozzle. These recordings can then be used to reverse engineer whatever object is being printed and re-create it somewhere else. Basically, this poses a huge security risk due to how easily detailed and confidential processes can be deciphered using common, everyday gadgets.
Industrial spies could accurately 'steal' 3D objects by recording the sound of them being produced on a 3D printer. Researchers at the University of California, Irvine, have demonstrated a method by which a 3D design could be reverse-engineered by analysing the vibrations picked up from a common 3D printer.
The team of researchers at UCI's Advanced Integrated Cyber-Physical Systems Lab, led by Mohammad Al Faruque, were able to recreate a 3D-printed key-shaped object with 90 percent accuracy using the sound copying and processing technique they developed.
The team, led by Mohammad Al Faruque, director of UCI's Advanced Integrated Cyber-Physical Systems Lab, showed that a device as ordinary and ubiquitous as a smartphone can be placed next to a machine and capture acoustic signals that carry information about the precise movements of the printer’s nozzle. The recording can then be used to reverse engineer the object being printed and re-create it elsewhere. Detailed processes may be decoded through this new kind of cyberattack, presenting important security risks.
Gizmodo UK -
Mohammad Al Faruque of the Advanced Integrated Cyber-Physical Systems lab. "According to the fundamental laws of physics, energy is not consumed; it's converted from one form to another -- electromagnetic to kinetic, for example. Some forms of energy are translated in meaningful and useful ways; others become emissions, which may unintentionally disclose secret information," he explained, in a complicated way of saying making stuff = sound clues. Like, you could fake a chair by listening to the chipping sounds of a carpenter.
Maine News Online -
A team of researchers, headed by Mohammad Al Faruque at the University of California in Irvine, displayed the possibility of rebuilding a 3D model on the basis of the audio of the printer, while in operation. The position and movements of a 3D printer’s extruder can be determined through the sounds made by it during work.
Led by Mohammad Al Faruque, director of the Advanced Integrated Cyber-Physical Systems lab, the team found that placing a smartphone alongside the machine as it printed objects layer-by-layer enabled them to capture the acoustic signals. It says that these recordings contain information about the precise movement of the nozzle, and that information can later be used to reverse engineer the item being printed.
In research demonstrating that industrial espionage may be as simple as opening a recording app on your smartphone, a team led by Professor Mohammad Al Faruque at the University of California at Irvine has shown that it is possible to reconstruct a 3D model based solely on audio of the printer in action.
To the average visitor to the RapidTech prototyping center at University of California, Irvine, the methodical buzz of its 3-D printers would be nothing more than background noise. But to Mohammad Al Faruque, that hum is valuable information.
Your 3D printer is telling people what it's making CNET - 12 hours ago In research demonstrating that industrial espionage may be as simple as opening a recording app on your smartphone, a team led by Professor Mohammad Al Faruque at the University of -
“In many manufacturing plants, people who work on a shift basis don’t get monitored for their smartphones, for example,” said Mohammad Al Faruque, director of UCI’s Advanced Integrated Cyber-Physical Systems Lab. “If process and product information is stolen during the prototyping phases, companies stand to incur large financial losses. There’s no way to protect these systems from such an attack today, but possibly there will be in the future.”