{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:31:43Z","timestamp":1762432303259,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031201363"},{"type":"electronic","value":"9783031201370"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20137-0_6","type":"book-chapter","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T08:05:40Z","timestamp":1669709140000},"page":"155-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS"],"prefix":"10.1007","author":[{"given":"Elizabeth","family":"Kurkowski","sequence":"first","affiliation":[]},{"given":"Alyxandra","family":"Van Stockum","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Curtis","family":"Taylor","sequence":"additional","affiliation":[]},{"given":"Tricia","family":"Schulz","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,30]]},"reference":[{"key":"6_CR1","unstructured":"3MF Consortium, 3MF Specification, San Francisco, California (3mf.io\/specification), 2020."},{"key":"6_CR2","unstructured":"S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin and Y. Elovici, dr0wned \u2013 Cyber-physical attack with additive manufacturing, presented at the Eleventh USENIX Workshop on Offensive Technologies, 2017."},{"key":"6_CR3","unstructured":"I. Birrell, 3D-printed prosthetic limbs: The next revolution in medicine, The Guardian, February 19, 2017."},{"key":"6_CR4","unstructured":"J. Burke, 3D printing off to the races, Oak Ridge National Laboratory Blog, Oak Ridge National Laboratory, Oak Ridge, Tennessee (www.ornl.gov\/blog\/3d-printing-races), April 26, 2019."},{"key":"6_CR5","unstructured":"J. Ellis, 3D-printed nuclear reactor promises faster, more economical path to nuclear energy, Oak Ridge National Laboratory News, Oak Ridge National Laboratory, Oak Ridge, Tennessee (www.ornl.gov\/news\/3d-printed-nuclear-reactor-promises-faster-more-economical-path-nuclear-energy), May 11, 2020."},{"key":"6_CR6","unstructured":"S. Ford, Additive manufacturing technology: Potential implications for U.S. manufacturing competitiveness, Journal of International Commerce and Economics, vol. 6(1), pp. 40\u201374, 2014."},{"key":"6_CR7","unstructured":"Inspector General, U.S. Department of Defense, Audit of the Cybersecurity of Department of Defense Additive Manufacturing Systems, Washington, DC (media.defense.gov\/2021\/Jul\/07\/2002757308\/-1\/-1\/1\/DODIG-2021-098.PDF), 2021."},{"key":"6_CR8","unstructured":"J. Keller, The navy can now 3D-print submarines on the fly for SEALs, Task and Purpose (taskandpurpose.com\/gear-tech\/navy-3d-printing-submarines), July 31, 2017."},{"key":"6_CR9","unstructured":"T. Kramer, F. Proctor and E. Messina, The NIST RS274NGC Interpreter \u2013 Version 3, NIST Interagency\/Internal Report 6556, National Institute of Standards and Technology, Gaithersburg, Maryland, 2000."},{"key":"6_CR10","unstructured":"Library of Congress, STL (Stereolithography) File Format Family, Washington, DC (www.loc.gov\/preservation\/digital\/formats\/fdd\/fdd000504.shtml), September 9, 2019."},{"key":"6_CR11","unstructured":"T. McCue, Additive manufacturing industry grows to almost \\$12 billion in 2019, Forbes, May 8, 2020."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"R. Miller, Response time in man-computer conversational transactions, Proceedings of the AFIPS Fall Joint Computer Conference, Part I, pp. 267\u2013277, 1968.","DOI":"10.1145\/1476589.1476628"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"S. Moore, P. Armstrong, T. McDonald and M. Yampolskiy, Vulnerability analysis of desktop 3D printer software, Proceedings of the 2016 Resilience Week, pp. 46\u201351, 2016.","DOI":"10.1109\/RWEEK.2016.7573305"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"S. Moore, W. Glisson and M. Yampolskiy, Implications of malicious 3D printer firmware, Proceedings of the Fiftieth Hawaii International Conference on System Sciences, 2017.","DOI":"10.24251\/HICSS.2017.735"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"H. Pearce, K. Yanamandra, N. Gupta and R. Karri, FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing, arXiv: 2104.09562 (arxiv.org\/abs\/2104.09562), 2021.","DOI":"10.1109\/TMECH.2022.3179713"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"B. Post, B. Richardson, P. Lloyd, L. Love, S. Nolet and J. Hannan, Additive Manufacturing of Wind Turbine Molds, Document ORNL\/TM-2017\/290, Oak Ridge National Laboratory, Oak Ridge, Tennessee, 2017.","DOI":"10.2172\/1376487"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"M. Rais, Y. Li and I. Ahmed, Dynamic thermal and localized filament kinetic attacks on a fused-filament-fabrication-based 3D printing process, Additive Manufacturing, vol. 46, article no. 102200, 2021.","DOI":"10.1016\/j.addma.2021.102200"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"L. Sturm, C. Williams, J. Camelio, J. White and R. Parker, Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects, Journal of Manufacturing Systems, vol. 44(1), pp. 154\u2013164, 2017.","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"6_CR19","unstructured":"C. Xiao, Security attack on 3D printing, presented at the xFocus Security Conference (www.claudxiao.net\/Attack3DPrinting-Claud-en.pdf), 2013."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"M. Yampolskiy, W. King, J. Gatlin, S. Belikovetsky, A. Brown, A. Skejellum and Y. Elovici, Security of additive manufacturing: Attack taxonomy and survey, Additive Manufacturing, vol. 21, pp. 431\u2013457, 2018.","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, Manufacturing and security challenges in 3D printing, Journal of the Minerals, Metals and Materials Society, vol. 68(7), pp. 1872\u20131881, 2016.","DOI":"10.1007\/s11837-016-1937-7"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20137-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T08:10:49Z","timestamp":1669709449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20137-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031201363","9783031201370"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20137-0_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}