Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering
نویسندگان
چکیده
As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If original design models or STL (stereolithography) files are hacked tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use high-throughput blockchain store “fingerprints” 3D model verify before prevent illegal tampering. Relying on tamper-resistant features blockchain, credibility components ensured. The combination will help people build trusted manufacturing environment realize more flexible for future industry.
منابع مشابه
Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...
متن کاملFrom 3D Printing to Spy Cats
Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE W elcome to the latest column of Notes from the Community. We start by thanking Jason Hong for his past authorship of this column and introducing Justin Manweiler as the new department coeditor. Members of our Reddit community submitted many fascinating items this quarter. This issue’s topics include the various ways we try to translate...
متن کاملFrom Microscale Devices to 3D Printing
At the intersection of stem cell biology and tissue engineering resides enormous potential for patient-specific drug screening, disease modeling, and tissue equivalents that offer hope to treat some of the most devastating cardiovascular diseases. Tissue engineering comprises the optimization of 3 primary components: (1) the type or types of cells being implanted such as somatic cells, induced ...
متن کاملA Novel Temporal Bone Simulation Model Using 3D Printing Techniques.
HYPOTHESIS An inexpensive temporal bone model for use in a temporal bone dissection laboratory setting can be made using a commercially available, consumer-grade 3D printer. BACKGROUND Several models for a simulated temporal bone have been described but use commercial-grade printers and materials to produce these models. The goal of this project was to produce a plastic simulated temporal bon...
متن کاملSelf-encrypting Code to Protect Against Analysis and Tampering
Confidentiality and data authenticity are two basic concepts in security. The first guarantees secrecy of a message, while the latter protects its integrity. This paper examines the use of encryption to secure software static analysis and tampering attacks. We present the concept of code encryption, which offers confidentiality, and a method to create code dependencies that implicitly protect i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app12157947