
R-GCSP PORTFOLIO

RESEARCH
Research
Cybersecurity in Additive Manufacturing Systems
What was the project?
My research explored the cybersecurity vulnerabilities of additive manufacturing (3D printing) systems, with a focus on identifying digital threats and proposing safeguards within the production pipeline. As 3D printing becomes more integrated into critical industries like aerospace, medical, and defense, protecting these digital fabrication processes has become a vital concern. This project directly aligns with my Grand Challenge: Securing Cyberspace.
How I started
This project was conducted as a short-term, intensive research experience. During that period, I investigated potential cyberattack vectors in the 3D printing process, such as design file tampering, unauthorized access to slicing software, or manipulations in the G-code that controls printer behavior. I conducted risk assessments and reviewed existing case studies where security breaches affected digital manufacturing systems. My goal was to explore how engineers and cybersecurity professionals can work together to ensure safe and reliable digital-to-physical production.
While the project was relatively short in duration, it gave me a meaningful introduction to interdisciplinary research combining mechanical engineering, digital security, and ethical technology development. It pushed me to think critically about how to protect both data and hardware in future smart manufacturing environments.
Reflection on Experience
This research opened my eyes to the increasing convergence of engineering and cybersecurity. I realized that securing cyberspace goes beyond protecting emails and databases—it also involves the physical systems that depend on secure digital instructions. I learned to think creatively about solutions, from encryption of design files to authentication of devices on a printing network.
This was my first deep dive into cybersecurity topics, and although I had to do much of the work independently, I enjoyed the challenge of navigating new terminology and frameworks. I learned how to synthesize technical information and translate it into meaningful risk analysis. This experience also gave me the confidence to consider cybersecurity applications in future projects involving automation, robotics, and digital manufacturing.
Grand Challenges Core Learning Objectives
a. Effective Communication:
I practiced writing about technical findings in a clear and concise way and learned how to explain the cybersecurity risks of AM systems to a non-specialist audience.
b. Disciplinary Communication:
I presented my analysis to mentors and peers with backgrounds in either engineering or computer science, tailoring my communication style to their expertise.
c. Creativity:
Exploring how to apply cybersecurity principles to physical manufacturing systems required creative thinking and problem-solving, especially when looking at real-world implications.
d. Practice and Process of Inquiry:
I formulated a guiding research question—“Where are the most vulnerable digital entry points in AM systems?”—and used literature reviews and case studies to inform my investigation.
e. Nature of Disciplinary Knowledge:
I gained a deeper understanding of how cybersecurity is evolving within the field of engineering, and how risk management practices are critical to system design.
f. Understanding Ethical Conduct:
I reflected on the ethical responsibility engineers have to ensure the safety and reliability of systems that may affect people’s health, security, or livelihood.
Additional Grand Challenges Research Learning Objectives
Demonstrate the ability to work independently and identify when input is needed:
Much of the research was self-guided, requiring me to manage my own schedule while reaching out to mentors when I needed technical clarification or feedback.
Accept constructive criticism and apply feedback effectively:
Throughout the project, I received feedback on my risk analysis framework and was encouraged to think more deeply about how hackers might exploit overlooked system weaknesses.