{"language":[{"iso":"eng"}],"date_created":"2025-02-17T11:12:17Z","date_updated":"2025-02-17T11:13:29Z","author":[{"last_name":"Rossel","first_name":"Jost","id":"58331","orcid":"0000-0002-3182-4059","full_name":"Rossel, Jost"},{"full_name":"Mladenov, Vladislav","last_name":"Mladenov","first_name":"Vladislav"},{"full_name":"Wördenweber, Nico","first_name":"Nico","last_name":"Wördenweber"},{"orcid":"0000-0002-3593-7720","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj","last_name":"Somorovsky"}],"department":[{"_id":"632"}],"oa":"1","status":"public","publication":"Proceedings of the 34th USENIX Security Symposium (USENIX '25)","year":"2025","citation":{"short":"J. Rossel, V. Mladenov, N. Wördenweber, J. Somorovsky, in: Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.","ieee":"J. Rossel, V. Mladenov, N. Wördenweber, and J. Somorovsky, “Security Implications of Malicious G-Codes in 3D Printing,” presented at the 34th USENIX Security Symposium, Seattle, WA, USA, 2025.","mla":"Rossel, Jost, et al. “Security Implications of Malicious G-Codes in 3D Printing.” Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.","apa":"Rossel, J., Mladenov, V., Wördenweber, N., & Somorovsky, J. (2025). Security Implications of Malicious G-Codes in 3D Printing. Proceedings of the 34th USENIX Security Symposium (USENIX ’25). 34th USENIX Security Symposium, Seattle, WA, USA.","ama":"Rossel J, Mladenov V, Wördenweber N, Somorovsky J. Security Implications of Malicious G-Codes in 3D Printing. In: Proceedings of the 34th USENIX Security Symposium (USENIX ’25). ; 2025.","chicago":"Rossel, Jost, Vladislav Mladenov, Nico Wördenweber, and Juraj Somorovsky. “Security Implications of Malicious G-Codes in 3D Printing.” In Proceedings of the 34th USENIX Security Symposium (USENIX ’25), 2025.","bibtex":"@inproceedings{Rossel_Mladenov_Wördenweber_Somorovsky_2025, title={Security Implications of Malicious G-Codes in 3D Printing}, booktitle={Proceedings of the 34th USENIX Security Symposium (USENIX ’25)}, author={Rossel, Jost and Mladenov, Vladislav and Wördenweber, Nico and Somorovsky, Juraj}, year={2025} }"},"conference":{"name":"34th USENIX Security Symposium","location":"Seattle, WA, USA","end_date":"2025-08-15","start_date":"2025-08-13"},"file":[{"file_size":1562838,"file_id":"58660","creator":"jrossel","file_name":"Security_Analysis_of_G_Codes.pdf","content_type":"application/pdf","date_created":"2025-02-17T11:10:31Z","access_level":"open_access","date_updated":"2025-02-17T11:13:10Z","relation":"main_file"}],"has_accepted_license":"1","user_id":"58331","ddc":["000"],"type":"conference","file_date_updated":"2025-02-17T11:13:10Z","_id":"58657","title":"Security Implications of Malicious G-Codes in 3D Printing","abstract":[{"text":"The rapid growth of 3D printing technology has transformed a wide range of industries, enabling the on-demand production of complex objects, from aerospace components to medical devices. However, this technology also introduces significant security challenges. Previous research highlighted the security implications of G-Codes—commands used to control the printing process. These studies assumed powerful attackers and focused on manipulations of the printed models, leaving gaps in understanding the full attack potential.\r\n\r\nIn this study, we systematically analyze security threats associated with 3D printing, focusing specifically on vulnerabilities caused by G-Code commands. We introduce attacks and attacker models that assume a less powerful adversary than traditionally considered, broadening the scope of potential security threats. Our findings show that even minimal access to the 3D printer can result in significant security breaches, such as unauthorized access to subsequent print jobs or persistent misconfiguration of the printer. We identify 278 potentially malicious G-Codes across the attack categories Information Disclosure, Denial of Service, and Model Manipulation. Our evaluation demonstrates the applicability of these attacks across various 3D printers and their firmware. Our findings underscore the need for a better standardization process of G-Codes and corresponding security best practices.\r\n","lang":"eng"}]}