You are currently viewing the summary.
View Full TextLog in to view the full text
AAAS login provides access to Science for AAAS members, and access to other journals in the Science family to users who have purchased individual subscriptions.
More options
Download and print this article for your personal scholarly, research, and educational use.
Buy a single issue of Science for just $15 USD.
Summary
The signals that 3D printers shed render them vulnerable to attacks, scientists have discovered, raising the potential for a new form of intellectual property theft. A simple audio recording—possibly even one made by a smartphone—can be enough to reverse-engineer a 3D-printed object, a new paper that will be presented 11 April shows. From the sounds the device emits while printing, an attacker can recreate the source code that contains the shape of the 3D-printed object. The new method does not reveal the printer's temperature or other settings that affect the material of a 3D-printed object. But attack models might someday be enhanced by targeting thermal profiles and electromagnetic radiation as well as audio emissions, the researchers say.