{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:53:35Z","timestamp":1743108815512,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031201363"},{"type":"electronic","value":"9783031201370"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20137-0_5","type":"book-chapter","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T08:05:40Z","timestamp":1669709140000},"page":"121-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS"],"prefix":"10.1007","author":[{"given":"Alyxandra","family":"Van Stockum","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Kurkowski","sequence":"additional","affiliation":[]},{"given":"Tiffany","family":"Potok","sequence":"additional","affiliation":[]},{"given":"Curtis","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Mason","family":"Rice","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,30]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"M. Al Faruque, S. Chhetri, A. Canedo and J. Wan, Acoustic side-channel attacks on additive manufacturing systems, Proceedings of the Seventh ACM\/IEEE International Conference on Cyber-Physical Systems, 2016.","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"5_CR2","unstructured":"M. Al Faruque, S. Chhetri, S. Faezi and A. Canedo, Forensics of Thermal Side Channels in Additive Manufacturing Systems, CECS Technical Report #16-01, Center for Embedded and Cyber-Physical Systems, University of California, Irvine, Irvine, California, 2016."},{"key":"5_CR3","unstructured":"S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin and Y. Elovici, dr0wned \u2013 Cyber-physical attack with additive manufacturing, presented at the Eleventh USENIX Workshop on Offensive Technologies, 2017."},{"key":"5_CR4","unstructured":"M. Berger, The attack on a German synagogue highlights the threat posed by do-it-yourself guns, The Washington Post, October 11, 2019."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"S. Bridges, K. Keiser, N. Sissom and S. Graves, Cyber security for additive manufacturing, Proceedings of the Tenth Annual Cyber and Information Security Research Conference, article no. 14, 2015.","DOI":"10.1145\/2746266.2746280"},{"key":"5_CR6","unstructured":"A. Damani, The fundamentals and impact of Industry 4.0, Forbes, June 24, 2020."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Q. Do, B. Martini and K. Choo, A data exfiltration and remote exploitation attack on consumer 3D printers, IEEE Transactions on Information Forensics and Security, vol. 11(10), pp. 2174\u20132186, 2016.","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"A. Hojjati, A. Adhikari, K. Struckmann, E. Chou, T. Nguyen, K. Madan, M. Winslett, C. Gunter and W. King, Leave your phone at the door: Side channels that reveal factory floor secrets, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 883\u2013894, 2016.","DOI":"10.1145\/2976749.2978323"},{"key":"5_CR9","unstructured":"Homeland Security Advisory Council, Final Report of the Emerging Technologies Subcommittee 3D-Printing, U.S. Department of Homeland Security, Washington, DC, 2020."},{"key":"5_CR10","unstructured":"Hybrid Manufacturing Technologies, Seven Families of Additive Manufacturing (According to ASTM F2792 Standards), McKinney, Texas (www.additivemanufacturing.media\/cdn\/cms\/7_families_print_version.pdf), 2021."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"E. Kurkowski, A. Van Stockum, J. Dawson, C. Taylor, T. Schulz and S. Shenoi, Manipulation of G-code toolpath files in 3D printers: Attacks and mitigations, in Critical Infrastructure Protection XVI, J. Staggs and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 155\u2013174, 2022.","DOI":"10.1007\/978-3-031-20137-0_6"},{"key":"5_CR12","unstructured":"Manufactur3D Magazine, The seven types of additive manufacturing technologies, Thane, India (manufactur3dmag.com\/7-types-additive-manufacturing-technologies), April 6, 2018."},{"key":"5_CR13","unstructured":"T. McCue, Additive manufacturing industry grows to almost $$\\$$$12 billion in 2019, Forbes, May 8, 2020."},{"key":"5_CR14","unstructured":"MITRE Corporation, ATT &CK for Industrial Control Systems, Bedford, Massachusetts (collaborate.mitre.org\/attackics\/index.php\/Main_Page), 2021."},{"key":"5_CR15","unstructured":"MITRE Corporation, D3FEND: A Knowledge Graph of Cybersecurity Countermeasures, Bedford, Massachusetts (d3fend.mitre.org), 2021."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"K. Molenaar, S. Anderson and C. Schexnayder, Guidebook on Risk Analysis Tools and Management Practices to Control Transportation Project Costs, NCHRP Report 658, The National Academies Press, Washington, DC, 2010.","DOI":"10.17226\/14391"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"S. Moore, P. Armstrong, T. McDonald and M. Yampolskiy, Vulnerability analysis of desktop 3D printer software, Proceedings of the 2016 Resilience Week, pp. 46\u201351, 2016.","DOI":"10.1109\/RWEEK.2016.7573305"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"S. Moore, W. Glisson and M. Yampolskiy, Implications of malicious 3D printer firmware, Proceedings of the Fiftieth Hawaii International Conference on System Sciences, 2017.","DOI":"10.24251\/HICSS.2017.735"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"H. Pearce, K. Yanamandra, N. Gupta and R. Karri, FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing, arXiv: 2104.09562 (arxiv.org\/abs\/2104.09562), 2021.","DOI":"10.1109\/TMECH.2022.3179713"},{"key":"5_CR20","unstructured":"N. Shevchenko, B. Frye and C. Woody, Threat Modeling for Cyber-Physical System-of-Systems: Methods Evaluation, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania (resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=526365), 2018."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"C. Song, F. Ling, Z. Ba, K. Ren, C. Zhou and W. Xu, My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3D printers, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 895\u2013907, 2016.","DOI":"10.1145\/2976749.2978300"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects, Journal of Manufacturing Systems, vol. 44(1), pp. 154\u2013164, 2017.","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"5_CR23","unstructured":"C. Xiao, Security attack on 3D printing, presented at the xFocus Security Conference (www.claudxiao.net\/Attack3DPrinting-Claud-en.pdf), 2013."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"M. Yampolskiy, W. King, J. Gatlin, S. Belikovetsky, A. Brown, A. Skejellum and Y. Elovici, Security of additive manufacturing: Attack taxonomy and survey, Additive Manufacturing, vol. 21, pp. 431\u2013457, 2018.","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, Manufacturing and security challenges in 3D printing, Journal of the Minerals, Metals and Materials Society, vol. 68(7), pp. 1872\u20131881, 2016.","DOI":"10.1007\/s11837-016-1937-7"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20137-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T15:59:46Z","timestamp":1678809586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20137-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031201363","9783031201370"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20137-0_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}