Security Attack to 3D Printing - i, Claud

Aug 25, 2013 - ... to 3D Printing. 60 http://thingiverse-production.s3.amaz ... Galaxy Nexus with USB OTG. – Extra, just for fun ... Phone: Samsung Galaxy Nexus.
9MB Sizes 2 Downloads 126 Views
XCON2013 - xFocus Security Conference, Beijing

Security Attack to 3D Printing Claud Xiao Antiy Labs 2013.08

Antiy’s hardware security road at XCON 2012

Short-wave timing signal spoofing

2008

Printer chip malware

2009

Wireless keyboard monitoring

XCON2013

Security Attack to 3D Printing

2013 welcome to the 3D world!

2

Segment of the Chinese Zodiac

XCON2013

Security Attack to 3D Printing

3

3D Printing in Personalized Lifestyle

XCON2013

Security Attack to 3D Printing

4

3D Printing in Rapidly Prototype Design

XCON2013

Security Attack to 3D Printing

5

3D Printing in Customizable Medicine

XCON2013

Security Attack to 3D Printing

6

3D Printing in Airplane Manufacturing

XCON2013

Security Attack to 3D Printing

7

3D Printing in Building Outer Space Station

XCON2013

Security Attack to 3D Printing

8

Previously, we more care about what new security threats 3D printing will bring to this real world.

XCON2013

Security Attack to 3D Printing

9

Previous Event: 3D Printed Gun

XCON2013

Security Attack to 3D Printing

10

Previous Event: 3D Printed Key

XCON2013

Security Attack to 3D Printing

11

Previously, we more care about what new security threats 3D printing will bring to this real world. But ignored …

XCON2013

Security Attack to 3D Printing

12

Old Topic: Stuxnet • Successfully attacked control and manufacture system • Strongly targeted and skillful

• Processes review: – Penetrated into isolated system – Modified running configuration of centrifuge in the background

• Homework: What can we learn from Stuxnet’s attacks? XCON2013

Security Attack to 3D Printing

13

Today • Change the perspective: security attacks to 3D printing itself: – Introduce 3D printing technologies and industry

– Deeply learn RapRap’s workflow and toolchain – Simply discuss Who/Why/How/What/When of attacks – Analyze potential targets and methods of attack

– Show THREE PoC attacks demo with detailed analysis!

• Main roadmap: research the security of desktop open source 3D printers as foundation and preparation of future researches in industrial 3D printing systems XCON2013

Security Attack to 3D Printing

14

3D Printing 101

XCON2013

Security Attack to 3D Printing

15

Rapid Prototyping • Fused deposition modeling (FDM)

XCON2013

Security Attack to 3D Printing

16

Rapid Prototyping • Three Dimensional Printing (3DP)

XCON2013

Security Attack to 3D Printing

17

Rapid Prototyping • Selective Laser Sintering (SLS)

XCON2013

Security Attack to 3D Printing

18

Rapid Prototyping • Stereolithography (SLA)

XCON2013

Security Attack to 3D Printing

19

Industrial 3D Printers

XCON2013

Security Attack to 3D Printing

20

Desktop 3D Printers: pre-assembled

XCON2013

Security Attack to 3D Printing

21

Desktop 3D Printer: kit

XCON2013

Security Attack to 3D Printing

22

There’re so many different types. What’s the difference of them and which one should I choose? XCON2013

Security A