Additive Manufacturing (AM) systems such as 3D printers use inexpensive microcontrollers that rarely feature cybersecurity defenses. This is a risk, especially given the rising threat landscape within the larger digital manufacturing domain. In this work we demonstrate this risk by presenting the design and study of a malicious Trojan (the FLAW3D bootloader) for AVR-based Marlin-compatible 3D printers (>100 commercial models). We show that the Trojan can hide from programming tools, and even within tight design constraints (less than 1.7 kilobytes in size), it can compromise the quality of additively manufactured prints and reduce tensile strengths by up to 50%.
翻译:3D打印机等Additive Manufactive(AM)系统使用很少以网络安全防御为特点的廉价微控制器。 这是一个风险,特别是考虑到更大数字制造领域内威胁面的上升。 在这项工作中,我们展示了恶意Trojan(FLAW3D 启动器)的设计和研究,用于AVR的、与 Marlin 兼容的3D打印机(>100商业模型 ) 。 我们显示,Trojan可以躲过编程工具,甚至在设计紧张(尺寸小于1.7千字节)的情况下,也可能损害添加式印刷品的质量,将抗拉强度减少50%。