One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels

📅 2025-06-27
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work uncovers a novel optical side-channel threat in remote monitoring of 3D printing: attackers can non-intrusively steal intellectual property—specifically, reconstruct G-code instructions—solely by analyzing nozzle motion trajectories extracted from surveillance camera videos. To address this, we propose an end-to-end framework integrating computer vision-based trajectory tracking, kinematic motion mapping, G-code semantic parsing, and geometrically robust functional equivalence verification. We introduce the first rotation- and translation-invariant functional-equivalence checker for reverse-engineered G-code, enabling formal validation of functional correctness. Experimental evaluation demonstrates an average instruction reconstruction accuracy of 90.87%, a 30.20% reduction in syntactic redundancy, and successful physical printing of functionally equivalent replicas.

Technology Category

Application Category

📝 Abstract
The 3D printing industry is rapidly growing and increasingly adopted across various sectors including manufacturing, healthcare, and defense. However, the operational setup often involves hazardous environments, necessitating remote monitoring through cameras and other sensors, which opens the door to cyber-based attacks. In this paper, we show that an adversary with access to video recordings of the 3D printing process can reverse engineer the underlying 3D print instructions. Our model tracks the printer nozzle movements during the printing process and maps the corresponding trajectory into G-code instructions. Further, it identifies the correct parameters such as feed rate and extrusion rate, enabling successful intellectual property theft. To validate this, we design an equivalence checker that quantitatively compares two sets of 3D print instructions, evaluating their similarity in producing objects alike in shape, external appearance, and internal structure. Unlike simple distance-based metrics such as normalized mean square error, our equivalence checker is both rotationally and translationally invariant, accounting for shifts in the base position of the reverse engineered instructions caused by different camera positions. Our model achieves an average accuracy of 90.87 percent and generates 30.20 percent fewer instructions compared to existing methods, which often produce faulty or inaccurate prints. Finally, we demonstrate a fully functional counterfeit object generated by reverse engineering 3D print instructions from video.
Problem

Research questions and friction points this paper is trying to address.

Reverse engineer 3D print instructions from video recordings
Track printer nozzle movements to map G-code instructions
Validate stolen IP via rotation-invariant equivalence checker
Innovation

Methods, ideas, or system contributions that make the work stand out.

Tracks nozzle movements to reverse engineer G-code
Uses invariant equivalence checker for instruction comparison
Achieves high accuracy with fewer faulty instructions
🔎 Similar Papers
No similar papers found.
T
Twisha Chattopadhyay
Georgia Institute of Technology
F
Fabricio Ceschin
Todyl Inc.
M
Marco E. Garza
The University of Texas at San Antonio
D
Dymytriy Zyunkin
Georgia Institute of Technology
A
Animesh Chhotaray
Georgia Institute of Technology
A
Aaron P. Stebner
Georgia Institute of Technology
Saman Zonouz
Saman Zonouz
Associate Professor, Georgia Tech
Cyber-Physical Systems Security
Raheem Beyah
Raheem Beyah
Dean and Southern Company Chair, Georgia Tech College of Engineering
Cyber-Physical Systems SecurityNetworkingNetwork Security