Abstract Scope |
Additive Manufacturing (AM) is dependent on a number of precise manufacturing parameters, such as layer thickness, to produce functional parts. Layer thickness misconfiguration during normal manufacturing is generally detectable as it impacts the entire build. In this paper, however, we demonstrate that targeted misconfigurations, as might be contemplated by a cyber-physical attacker, can be executed without hacking into the firmware, impacting part quality and avoiding detection. Using a modified build file with a Powder Bed Fusion (PBF) machine, we create fusion defects, mimicking selective layer thickness flaws through disabled laser beam exposure, while maintaining geometrical and visual part integrity. We then confirm part functionality degradation, demonstrating metal AM susceptibility to cyber-physical attacks and thereby illustrating the necessity for security investments with regards to this increasingly adopted manufacturing process. |