yitit
Home
/
Computing
/
Top secret designs could be stolen from 3D printers using an ordinary smartphone
Top secret designs could be stolen from 3D printers using an ordinary smartphone-February 2024
Feb 12, 2026 9:16 AM

  Image used with permission by copyright holderIn the years to come, 3D printing is going to be used for everything from helping create rocket engines to printing new heart valves. With those kind of high-stakes — and often highly-valuable –applications, it’s no wonder experts are concerned about the security risk posed by hackers.

  One possible threat is explored in a new study by researchers at the University at Buffalo in New York entitled “My Smartphone Knows What You Print: Exploring Smartphone-Based Side-Channel Attacks Against 3D Printers.”

  Recommended Videos

  A team of computer scientists was able to use a regular smartphone’s built-in sensors to measure the electromagnetic energy and acoustic waves that emanate from a 3-D printer. By doing so, they were then able to gather enough data to replicate 3D-printed objects with accuracy levels of up to 94 percent, depending on the complexity of the object.

  Related

  What is a 3D printer, and how much do they cost? 3D printed cheesecake? Inside the culinary quest to make a Star Trek food replicator Sony’s new 3D display tech keeps getting bigger and better

  “This is the first work to investigate the vulnerability of 3D printers,” Wenyao Xu, assistant professor in the unicersity’s department of computer science and engineering, told Digital Trends. “Considering that 3D printers are the driving force for innovation and an emerging manufacturing approach, it is very critical to make sure 3D printers are secure, and the intellectual property in the 3D design is well-protected.”

  Xu said that very few people are aware of the potential danger to 3D printers posed by nothing more sinister than the ubiquitous smartphone.

  “This attack can happen in both individual and industrial 3D printers,” Xu continued. “Also, it can be applied against bioprinting and metal printing, which are more security sensitive.”

  Fortunately, noone can accuse Xu and his fellow researchers of being the kind of folks to point out a problem, then offer no solution.

  One possible answer involves hardware-based concepts like acoustic and electromagnetic shields. Another may turn out to be even simpler. “We have proposed new path planning algorithms to spoof the side-channel attack,” Xu said. “No extra hardware is needed to prevent this threat.”

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Computing
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved