{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:58:37Z","timestamp":1763499517050,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1546993"],"award-info":[{"award-number":["CNS-1546993"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["732105"],"award-info":[{"award-number":["732105"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tdsc.2019.2923215","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T21:32:58Z","timestamp":1561066378000},"page":"667-678","source":"Crossref","is-referenced-by-count":11,"title":["Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7067-6984","authenticated-orcid":false,"given":"Sujit Rokka","family":"Chhetri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4533-9855","authenticated-orcid":false,"given":"Anomadarshi","family":"Barua","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7189-3016","authenticated-orcid":false,"given":"Sina","family":"Faezi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6385-0780","authenticated-orcid":false,"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Arquimedes","family":"Canedo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5390-0497","authenticated-orcid":false,"given":"Mohammad Abdullah","family":"Al Faruque","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"dr0wned-cyber-physical attack with additive manufacturing","author":"belikovetsky","year":"2017","journal-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)"},{"year":"2017","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0023-x"},{"key":"ref30","first-page":"13","article-title":"Template attacks","author":"chari","year":"2002","journal-title":"Proc Int Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref10","article-title":"Cyber-physical vunerabilities in additive manufacturing systems","volume":"7","author":"sturm","year":"2014","journal-title":"CONTEXT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978323"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4393-9"},{"article-title":"Novel side-channel attack model for cyber-physical additive manufacturing systems","year":"2016","author":"chhetri","key":"ref17"},{"key":"ref18","article-title":"Forensics of thermal side-channel in additive manufacturing systems-semantic scholar","author":"faruque","year":"2016","journal-title":"KBB Irvine CA"},{"key":"ref19","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"liaw","year":"2002","journal-title":"R News"},{"article-title":"The NSA planted backdoors in cisco products","year":"2014","author":"snyder","key":"ref28"},{"key":"ref4","article-title":"Defining and sizing the industrial Internet","volume":"27","author":"floyer","year":"2013","journal-title":"Wikibon June"},{"article-title":"Leaked photos show NSA hardware interception and bug-planting workstation","year":"2014","author":"macri","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858320"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11768-016-5123-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0132-7"},{"key":"ref5","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"cardenas","year":"2009","journal-title":"Proc Workshop Future Directions Cyber-Phys Syst Secur"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2682225"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689709"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref20","first-page":"41","article-title":"A comprehensive foundation","volume":"2","author":"haykin","year":"2004","journal-title":"Neural Netw"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837435"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"year":"2017","key":"ref24"},{"article-title":"Trojans in early design steps&#x2013;an emerging threat","year":"2016","author":"polian","key":"ref23"},{"article-title":"Inside TAO: Documents reveal top NSA hacking unit","year":"2013","author":"staff","key":"ref26"},{"year":"2017","key":"ref25"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/9372344\/8742628-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9372344\/08742628.pdf?arnumber=8742628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:29Z","timestamp":1649443889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8742628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":33,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2923215","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}