Cyber acoustic analysis of additively manufactured objects

The potential for intellectual property theft has been shown in the additive manufacturing industry using acoustic side-channel attacks lately. This paper aims to discuss the rate of success for recreating the G-Code of an object from the acoustic features and further elaborates on regression model...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of advanced manufacturing technology Vol. 96; no. 1-4; pp. 581 - 586
Main Authors Mativo, Thomas, Fritz, Colleen, Fidan, Ismail
Format Journal Article
LanguageEnglish
Published London Springer London 01.04.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0268-3768
1433-3015
DOI10.1007/s00170-018-1603-z

Cover

More Information
Summary:The potential for intellectual property theft has been shown in the additive manufacturing industry using acoustic side-channel attacks lately. This paper aims to discuss the rate of success for recreating the G-Code of an object from the acoustic features and further elaborates on regression model analysis that provides the G-Code. Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language. During the attack phase, the created algorithm was used to process new acoustic data and to reconstruct the G-Code. The accuracy of the classification models and the regression models were determined. The classification accuracy was determined with k-fold cross validation, and the regression model accuracy was determined by scoring the regression models within the algorithm. Although classification and regression algorithms developed showed promising results, lower model accuracy was observed when the X and Y motors moved together. In the future, the team hopes to further increase the model accuracy so that an unknown shape can be replicated successfully. While security measures for cyber-security have previously been investigated, very little research has considered acoustic side-channel attacks on their ability to reconstruct G-Code and steal intellectual property. The findings of this novel research project showed some promising preliminary results on a sample case study.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0268-3768
1433-3015
DOI:10.1007/s00170-018-1603-z