Digital Manufacturing (DM) refers to the on-going adoption of smarter, more agile manufacturing processes and cyber-physical systems. This includes modern techniques and technologies such as Additive Manufacturing (AM)/3D printing, as well as the Industrial Internet of Things (IIoT) and the broader trend toward Industry 4.0. However, this adoption is not without risks: with a growing complexity and connectivity, so too grows the cyber-physical attack surface. Here, malicious actors might seek to steal sensitive information or sabotage products or production lines, causing financial and reputational loss. Of particular concern are where such malicious attacks may enter the complex supply chains of DM systems as Trojans -- malicious modifications that may trigger their payloads at later times or stages of the product lifecycle. In this work, we thus present a comprehensive overview of the threats posed by Trojans in Digital Manufacturing. We cover both hardware and software Trojans which may exist in products or their production and supply lines. From this, we produce a novel taxonomy for classifying and analyzing these threats, and elaborate on how different side channels (e.g. visual, thermal, acoustic, power, and magnetic) may be used to either enhance the impact of a given Trojan or utilized as part of a defensive strategy. Other defenses are also presented -- including hardware, web-, and software-related. To conclude, we discuss seven different case studies and elaborate how they fit into our taxonomy. Overall, this paper presents a detailed survey of the Trojan landscape for Digital Manufacturing: threats, defenses, and the importance of implementing secure practices.
翻译:数字制造(DM)是指正在采用更聪明、更灵活的制造流程和网络物理系统,其中包括现代技术和技术,如Aditive Manufacture(AM)/3D印刷(Appitive Manufact(AM)/3D印刷)和Times工业互联网(IIoT),以及更广阔的工业4.0趋势。然而,这种采用并非没有风险:随着复杂性和连通性日益增长,因此也增加了网络-物理攻击的表面。在这里,恶意行为者可能试图偷窃敏感信息或破坏产品或生产线,造成金融和名誉损失。特别令人关切的是,此类恶意袭击可能进入DM系统复杂的供应链,如Trojans(Trojans)系统 -- -- 恶意的修改可能触发其后期或产品生命周期各阶段的有效载荷。在这项工作中,我们全面综述了Trojans在数字制造业中构成的威胁。我们覆盖了可能存在于产品或其生产和供应线上的硬件。我们由此产生了一个新的安全分类,用于对这些威胁进行分类和分析,并详细说明了这些威胁的不同侧渠道(例如视觉、热能、动力和磁力) -- -- -- -- 也就是我们所利用的纸面的防御研究的网络-