Model-Based Security Analysis in Additive Manufacturing Systems

Michael Durling, A. Moitra, Kit Siu, B. Meng, John Carbone, Christopher C. Alexander, K. Castillo-Villar, Gabriela F. Cretu-Ciocarlie
{"title":"Model-Based Security Analysis in Additive Manufacturing Systems","authors":"Michael Durling, A. Moitra, Kit Siu, B. Meng, John Carbone, Christopher C. Alexander, K. Castillo-Villar, Gabriela F. Cretu-Ciocarlie","doi":"10.1145/3560833.3563566","DOIUrl":null,"url":null,"abstract":"Additive manufacturing (AM) is expected to revolutionize industrial manufacturing processes by providing access to readily available, lower cost, high-performance parts, including those with complex designs and diverse materials, not attainable in conventional subtractive machining processes. These benefits are distinctly advantageous for low-volume rapid prototyping. They also reduce the build time of complex, safety-critical components that traditionally require assembly. The advanced product capabilities of AM also make these systems high risk for intellectual property theft, service outage attacks, and sabotage through compromised product quality. Concerns about malicious actors restrict business models and deter industry adoption and investment, especially those requiring secrecy around safety-critical components. In this paper, we analyze the threats to additive manufacturing system security using the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) tool, a model-based system engineering (MBSE) tool. First, we introduce a comprehensive set of attributes to characterize MBSE tools together with a survey of MBSE tools that support cyber analysis. Based on these attributes and the available tools, we select the relevant tool (i.e., VERDICT) and apply it to an example additive manufacturing system. The modeling and analysis are intended to show the functionality of the VERDICT tool in a research context. The signals, properties, and requirements enable the user to experiment with and illustrate the functionality of the tool. Finally, the paper introduces a novel approach for modeling the return on investment (ROI) for additive hardware cybersecurity investments that will lead to a cost-analysis integration with the VERDICT tool.","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3560833.3563566","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Additive manufacturing (AM) is expected to revolutionize industrial manufacturing processes by providing access to readily available, lower cost, high-performance parts, including those with complex designs and diverse materials, not attainable in conventional subtractive machining processes. These benefits are distinctly advantageous for low-volume rapid prototyping. They also reduce the build time of complex, safety-critical components that traditionally require assembly. The advanced product capabilities of AM also make these systems high risk for intellectual property theft, service outage attacks, and sabotage through compromised product quality. Concerns about malicious actors restrict business models and deter industry adoption and investment, especially those requiring secrecy around safety-critical components. In this paper, we analyze the threats to additive manufacturing system security using the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) tool, a model-based system engineering (MBSE) tool. First, we introduce a comprehensive set of attributes to characterize MBSE tools together with a survey of MBSE tools that support cyber analysis. Based on these attributes and the available tools, we select the relevant tool (i.e., VERDICT) and apply it to an example additive manufacturing system. The modeling and analysis are intended to show the functionality of the VERDICT tool in a research context. The signals, properties, and requirements enable the user to experiment with and illustrate the functionality of the tool. Finally, the paper introduces a novel approach for modeling the return on investment (ROI) for additive hardware cybersecurity investments that will lead to a cost-analysis integration with the VERDICT tool.
基于模型的增材制造系统安全性分析
增材制造(AM)有望通过提供易于获得、成本更低、高性能的零件,包括那些具有复杂设计和多种材料的零件,从而彻底改变工业制造过程,这在传统的减法加工工艺中是无法实现的。这些优点对于小批量快速原型来说是非常有利的。它们还减少了传统上需要组装的复杂、安全关键组件的构建时间。增材制造的先进产品功能也使这些系统面临知识产权盗窃、服务中断攻击和产品质量受损的破坏的高风险。对恶意行为者的担忧限制了业务模式,并阻碍了行业的采用和投资,特别是那些需要对安全关键组件保密的行业。在本文中,我们使用基于模型的系统工程(MBSE)工具——网络安全威胁预测中的验证证据和弹性设计(VERDICT)工具,分析了增材制造系统安全面临的威胁。首先,我们介绍了一组全面的属性来描述MBSE工具,并对支持网络分析的MBSE工具进行了调查。基于这些属性和可用的工具,我们选择了相关的工具(即VERDICT),并将其应用于一个示例增材制造系统。建模和分析旨在显示VERDICT工具在研究环境中的功能。信号、属性和需求使用户能够试验并说明工具的功能。最后,本文介绍了一种新的方法,用于对增材硬件网络安全投资的投资回报率(ROI)进行建模,这将导致与VERDICT工具的成本分析集成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信