{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T22:25:15Z","timestamp":1772922315908,"version":"3.50.1"},"reference-count":125,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation Cyber-Physicaln Systems","doi-asserted-by":"publisher","award":["CMMI-1932264"],"award-info":[{"award-number":["CMMI-1932264"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["DGE-1931724"],"award-info":[{"award-number":["DGE-1931724"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NYU Center for Cybersecurity"},{"DOI":"10.13039\/100008929","name":"NYU Center for Urban Science and Progress","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008929","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF Science & Technology Center","doi-asserted-by":"publisher","award":["CCF-0939370"],"award-info":[{"award-number":["CCF-0939370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1934904"],"award-info":[{"award-number":["CCF-1934904"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"U.S. Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-10331"],"award-info":[{"award-number":["W911NF-18-10331"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-19-2-0243"],"award-info":[{"award-number":["W911NF-19-2-0243"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-19-2-0033"],"award-info":[{"award-number":["W911NF-19-2-0033"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"U.S. Office of Naval Research","doi-asserted-by":"crossref","award":["N00014-18-1-2048"],"award-info":[{"award-number":["N00014-18-1-2048"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"publisher","award":["DE-EE0009031"],"award-info":[{"award-number":["DE-EE0009031"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Foundation","doi-asserted-by":"publisher","award":["9-069-1-018"],"award-info":[{"award-number":["9-069-1-018"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CMMI-1432914"],"award-info":[{"award-number":["CMMI-1432914"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["S&AS INT-1849085"],"award-info":[{"award-number":["S&AS INT-1849085"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Texas A&M University\u2019s X-Grants Program"},{"name":"NYU Center for Cybersecurity"},{"name":"NYU-AD Center for Cybersecurity"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/jproc.2020.3032074","type":"journal-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T20:36:11Z","timestamp":1604435771000},"page":"495-516","source":"Crossref","is-referenced-by-count":56,"title":["A Survey of Cybersecurity of Digital Manufacturing"],"prefix":"10.1109","volume":"109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5074-0793","authenticated-orcid":false,"given":"Priyanka","family":"Mahesh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2847-4753","authenticated-orcid":false,"given":"Akash","family":"Tiwari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6306-8019","authenticated-orcid":false,"given":"Chenglu","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-5367","authenticated-orcid":false,"given":"Panganamala R.","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"A. L. Narasimha","family":"Reddy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3312-8222","authenticated-orcid":false,"given":"Satish T. S.","family":"Bukkapatanam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7128-4459","authenticated-orcid":false,"given":"Nikhil","family":"Gupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7989-5617","authenticated-orcid":false,"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689709"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931738"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-017-1315-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.12.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.05.004"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.148"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.06.115"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.matdes.2017.04.078"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2016.08.075"},{"key":"ref28","author":"briggs","year":"2020","journal-title":"Hackers Hit Norsk Hydro With Ransomware The Company Responded With Transparency"},{"key":"ref27","author":"kirk","year":"2018","journal-title":"Wannacry Outbreak Hits Chipmaker Could Cost"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1115\/1.4043648"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1115\/1.4045945"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"ref23","article-title":"dr0wned&#x2013;cyber-physical attack with additive manufacturing","author":"belikovetsky","year":"2017","journal-title":"Proc 11th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref101","author":"boissonneault","year":"2020","journal-title":"Institute of Industrial & Systems Engineers Process Industries Division"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978815"},{"key":"ref100","article-title":"An automated framework for board-level trojan benchmarking","author":"hoque","year":"2020","journal-title":"arXiv 2003 12632"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3078622"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.011"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1115\/1.4040341"},{"key":"ref59","article-title":"Tool of spies: Leaking your ip by altering the 3D printer compiler","author":"chhetri","year":"2019","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/app9235105"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s40964-017-0036-9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1177\/1687814018822880"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1080\/00963402.2018.1436811"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971947"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/adem.201800495"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1108\/FS-02-2018-0020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.031"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"key":"ref6","author":"alter","year":"2018","journal-title":"3D Hybrid Printing and Implant-Supported Prosthetics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2016.02.193"},{"key":"ref8","first-page":"14","article-title":"Three dimensional die repair using a hybrid manufacturing system","author":"ren","year":"2006","journal-title":"Proc 17th Solid Freeform Fabr Symp"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.10.087"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2017.04.093"},{"key":"ref9","author":"zelinski","year":"2017","journal-title":"3D Hybrid Printing and Implant-Supported Prosthetics"},{"key":"ref46","article-title":"Power consumption-based detection of sabotage attacks in additive manufacturing","author":"moore","year":"2017","journal-title":"arXiv 1709 01822"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3079847"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2851584"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055198"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2682225"},{"key":"ref41","article-title":"Detecting cyber-physical attacks in additive manufacturing using digital audio signing","author":"belikovetsky","year":"2017","journal-title":"arXiv 1705 06454"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.03.006"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/jmmp1020015"},{"key":"ref125","year":"2020","journal-title":"National Vulnerability Database"},{"key":"ref124","year":"2020","journal-title":"Vulnerability notes database"},{"key":"ref73","volume":"144","author":"fey","year":"2017","journal-title":"3D Printing and International Security Risks and Challenges of an Emerging Technology"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.142"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7743900"},{"key":"ref70","first-page":"716","article-title":"Cyber security in smart manufacturing: Survey and challenges","author":"ren","year":"2017","journal-title":"Proc IIE Annu Conf"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798283"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67068-3_16"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1408-9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3107011"},{"key":"ref78","author":"woollaston","year":"2017","journal-title":"Wannacry is Back! Virus Hits Australian Traffic Cameras and Shuts Down a Honda Plant in Japan"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9656938"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2014.07.001"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_11"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746280"},{"key":"ref64","first-page":"914","article-title":"Copyright protection in additive manufacturing with blockchain approach","volume":"5","author":"holland","year":"2017","journal-title":"Transdisciplinary Engineering A Paradigm Shift"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479115"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.09.003"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201710806005"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.09.065"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.137"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2017.04.037"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2017.05.015"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2019.04.104"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2014.2347918"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.matdes.2017.04.078"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref107","first-page":"416","article-title":"Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems","author":"ko","year":"2016","journal-title":"Proc IEEE Conf Commun Netw Secur (CNS)"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref106","article-title":"Cyber-security with dynamic watermarking for process control systems","author":"kim","year":"2019","journal-title":"Proc AIChE Annu Meeting"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798283"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039974"},{"key":"ref90","year":"2020","journal-title":"What is Wannacry Ransomware?"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2017.7945354"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920763"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2018.2864297"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2018.1555383"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.050"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.437"},{"key":"ref10","year":"2019","journal-title":"The SHM Platform"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2020.08.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1115\/MSEC2018-6726"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2019.11.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1115\/1.4026210"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1526-6125(03)70037-1"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151346"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.compscitech.2020.108318"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487335"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.080"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1115\/1.4044208"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/educ.2018.0189"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3264918"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2014.999180"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"ref113","first-page":"1169","article-title":"All things considered: An analysis of IoT devices on home networks","author":"kumar","year":"2019","journal-title":"Usenix Security Symp"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228641"},{"key":"ref80","article-title":"System and method for security and management of computer-aided designs","author":"behera","year":"2019"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038393"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2018.00037"},{"key":"ref89","article-title":"Forensics of thermal side-channel in additive manufacturing systems","author":"al faruque","year":"2016"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326083"},{"key":"ref122","first-page":"1","article-title":"Systematically evaluating security and privacy forconsumer IoT devices","author":"loi","year":"2017","journal-title":"Proc ACM IoT S&P"},{"key":"ref123","author":"ducklin","year":"2016","journal-title":"Mirai &#x2018;Internet of Things&#x2019; Malware From Krebs DDoS Attack Goes Open Source"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818659"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1002\/adem.201900146"},{"key":"ref87","first-page":"1","article-title":"My smartphone recognizes genuine QR codes! practical unclonable qr code via 3D printing","volume":"2","author":"song","year":"2018","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/5\/9383786\/9247392-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/9383786\/09247392.pdf?arnumber=9247392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:55:58Z","timestamp":1649444158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9247392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":125,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2020.3032074","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}