Security Implications of Malicious G-Codes in 3D Printing
J. Rossel, V. Mladenov, N. Wördenweber, J. Somorovsky, in: Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.
Download
Conference Paper
| English
Author
Department
Abstract
The rapid growth of 3D printing technology has transformed a wide range of industries, enabling the on-demand production of complex objects, from aerospace components to medical devices. However, this technology also introduces significant security challenges. Previous research highlighted the security implications of G-Codes—commands used to control the printing process. These studies assumed powerful attackers and focused on manipulations of the printed models, leaving gaps in understanding the full attack potential.
In this study, we systematically analyze security threats associated with 3D printing, focusing specifically on vulnerabilities caused by G-Code commands. We introduce attacks and attacker models that assume a less powerful adversary than traditionally considered, broadening the scope of potential security threats. Our findings show that even minimal access to the 3D printer can result in significant security breaches, such as unauthorized access to subsequent print jobs or persistent misconfiguration of the printer. We identify 278 potentially malicious G-Codes across the attack categories Information Disclosure, Denial of Service, and Model Manipulation. Our evaluation demonstrates the applicability of these attacks across various 3D printers and their firmware. Our findings underscore the need for a better standardization process of G-Codes and corresponding security best practices.
Publishing Year
Proceedings Title
Proceedings of the 34th USENIX Security Symposium (USENIX '25)
Conference
34th USENIX Security Symposium
Conference Location
Seattle, WA, USA
Conference Date
2025-08-13 – 2025-08-15
LibreCat-ID
Cite this
Rossel J, Mladenov V, Wördenweber N, Somorovsky J. Security Implications of Malicious G-Codes in 3D Printing. In: Proceedings of the 34th USENIX Security Symposium (USENIX ’25). ; 2025.
Rossel, J., Mladenov, V., Wördenweber, N., & Somorovsky, J. (2025). Security Implications of Malicious G-Codes in 3D Printing. Proceedings of the 34th USENIX Security Symposium (USENIX ’25). 34th USENIX Security Symposium, Seattle, WA, USA.
@inproceedings{Rossel_Mladenov_Wördenweber_Somorovsky_2025, title={Security Implications of Malicious G-Codes in 3D Printing}, booktitle={Proceedings of the 34th USENIX Security Symposium (USENIX ’25)}, author={Rossel, Jost and Mladenov, Vladislav and Wördenweber, Nico and Somorovsky, Juraj}, year={2025} }
Rossel, Jost, Vladislav Mladenov, Nico Wördenweber, and Juraj Somorovsky. “Security Implications of Malicious G-Codes in 3D Printing.” In Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.
J. Rossel, V. Mladenov, N. Wördenweber, and J. Somorovsky, “Security Implications of Malicious G-Codes in 3D Printing,” presented at the 34th USENIX Security Symposium, Seattle, WA, USA, 2025.
Rossel, Jost, et al. “Security Implications of Malicious G-Codes in 3D Printing.” Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
File Name
Security_Analysis_of_G_Codes.pdf
1.56 MB
Access Level

Last Uploaded
2025-02-17T11:13:10Z