Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing

01/28/2023
by   Tyler Cultice, et al.
0

Recent advancements in 3D-printing/additive manufacturing has brought forth a new interest in the use of Controller Area Network (CAN) for multi-module, plug-and-play bus support for their embedded systems. CAN systems provide a variety of benefits that can outweigh typical conventional wire-loom protocols in many categories. However, implementation of CAN also brings forth vulnerabilities provided by its spoofable, destination-encoded shared communication bus. These vulnerabilities result in undetectable fault injection, packet manipulation, unauthorized packet logging/sniffing, and more. They also provide attackers the capability to manipulate all sensor information, commands, and create unsafe operating conditions using only a single compromised node on the CAN network (bypassing all root-of-trust in the modules). Thus, malicious hardware requires only a connection to the bus for access to all traffic. In this paper, we discuss the effects of repurposed CAN-based attacks capable of manipulating sensor data, overriding systems, and injecting dangerous commands on the Controller Area Network using various entry methods. As a case study, we also showed a spoofing attack on critical data modules within a commercial 3D printer.

READ FULL TEXT

page 1

page 2

page 4

page 5

research
10/27/2022

CAN Bus: The Future of Additive Manufacturing (3D Printing)

Additive Manufacturing (AM) is gaining renewed popularity and attention ...
research
05/05/2021

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

From tiny pacemaker chips to aircraft collision avoidance systems, the s...
research
04/19/2021

FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing

Additive Manufacturing (AM) systems such as 3D printers use inexpensive ...
research
02/16/2022

NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications

This paper presents a security analysis of the InfiniBand architecture, ...
research
03/09/2020

Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers

Rapid urbanization calls for smart traffic management solutions that inc...
research
08/16/2020

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Over the last decade, the number of cyberattacks targeting power systems...
research
07/29/2023

Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

For industrial control systems (ICS), many existing defense solutions fo...

Please sign up or login with your details

Forgot password? Click here to reset