Researchers Find Security Breach in 3-D Printing Process

Machine sounds enable reverse engineering of source code.

Written byUniversity of California Irvine
| 3 min read
Register for free to listen to this article
Listen with Speechify
0:00
3:00

Irvine, Calif. — With findings that could have been taken from the pages of a spy novel, researchers at the University of California, Irvine have demonstrated that they can purloin intellectual property by recording and processing sounds emitted by a 3-D printer.

The team, led by Mohammad Al Faruque, director of UCI’s Advanced Integrated Cyber-Physical Systems Lab, showed that a device as ordinary and ubiquitous as a smartphone can be placed next to a machine and capture acoustic signals that carry information about the precise movements of the printer’s nozzle. The recording can then be used to reverse engineer the object being printed and re-create it elsewhere. Detailed processes may be deciphered through this new kind of cyberattack, presenting significant security risks.

To continue reading this article, sign up for FREE to
Lab Manager Logo
Membership is FREE and provides you with instant access to eNewsletters, digital publications, article archives, and more.
Add Lab Manager as a preferred source on Google

Add Lab Manager as a preferred Google source to see more of our trusted coverage.

Related Topics

CURRENT ISSUE - March/2026

When the Unexpected Hits

How Lab Leaders Can Prepare for Safety Crises That Don’t Follow the Script

Lab Manager March 2026 Cover Image