{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:37:33Z","timestamp":1760524653050,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005089","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["L234033"],"award-info":[{"award-number":["L234033"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing-Tianjin-Hebei Basic Research Cooperation Project","award":["V1640354653903"],"award-info":[{"award-number":["V1640354653903"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302304"],"award-info":[{"award-number":["62302304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016096","name":"Shanghai Sailing Program","doi-asserted-by":"publisher","award":["23YF1427500"],"award-info":[{"award-number":["23YF1427500"]}],"id":[{"id":"10.13039\/100016096","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3451362","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T18:51:23Z","timestamp":1724871083000},"page":"8275-8290","source":"Crossref","is-referenced-by-count":3,"title":["PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4598-3746","authenticated-orcid":false,"given":"Shijie","family":"Li","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5931-7114","authenticated-orcid":false,"given":"Zedong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7484-1333","authenticated-orcid":false,"given":"Dongliang","family":"Fang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2477-3951","authenticated-orcid":false,"given":"Kaixiang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Automation, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0549-0999","authenticated-orcid":false,"given":"Shichao","family":"Lv","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-7521","authenticated-orcid":false,"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s00170-021-06741-z"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TMECH.2020.2994231"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/B978-0-08-100433-3.00013-0"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.4271\/2016-01-0328"},{"volume-title":"X-Force Threat Intelligence Index 2023","year":"2023","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.30596\/jcositte.v1i2.5116"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.jmsy.2022.04.012"},{"key":"ref8","article-title":"The security risks faced by CNC machines in Industry 4.0","author":"Balduzzi","year":"2022","journal-title":"Trend Micro"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10845-018-1408-9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MSP.2015.60"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.9781\/ijimai.2017.437"},{"key":"ref12","first-page":"1","article-title":"Dr0wned\u2013cyber-physical attack with additive manufacturing","volume-title":"Proc. 11th USENIX Workshop Offensive Technol.","author":"Belikovetsky"},{"key":"ref13","article-title":"Towards security of additive layer manufacturing","author":"Yampolskiy","year":"2015","journal-title":"arXiv:1602.07536"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.24251\/hicss.2017.735"},{"year":"2023","author":"Rais","article-title":"Material extrusion-based additive manufacturing: G-code and firmware attacks and defense frameworks","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TMECH.2022.3179713"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3450267.3450545"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11837-016-1937-7"},{"key":"ref19","article-title":"Navair marks first flight with 3-D printed, safety-critical parts","author":"Headquarters","year":"2016","journal-title":"NAVAIR News"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/EuroSP57164.2023.00071"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3264888.3264894"},{"year":"2018","author":"Siemens AG","article-title":"Sinumerik 840dsl\/828d sinumerik access mymachine\/OPC UA configuration manual valid for: OPC UA server version 2.1","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.14722\/ndss.2017.23313"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/LES.2021.3129108"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.jmsy.2017.05.007"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3384419.3430775"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2966986.2967050"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3055186.3055198"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/SP46215.2023.10179411"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICDCS51616.2021.00106"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3264918"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TMC.2021.3059796"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.5772\/5015"},{"key":"ref34","first-page":"413","article-title":"Jump-Starting multivariate time series anomaly detection for online service systems","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Ma"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/PESGM41954.2020.9281560"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2976749.2978388"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICCPS.2016.7479068"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2976749.2978323"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1145\/2976749.2978300"},{"issue":"13","key":"ref40","first-page":"176","article-title":"Forensics of thermal side-channel in additive manufacturing systems","volume":"12","author":"Faruque","year":"2016","journal-title":"Univ. California, Irvine"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/s10845-017-1315-5"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.14722\/ndss.2022.24298"},{"key":"ref43","first-page":"1181","article-title":"See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Bayens"},{"key":"ref44","article-title":"Power consumption-based detection of sabotage attacks in additive manufacturing","author":"Moore","year":"2017","journal-title":"arXiv:1709.01822"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/ACCESS.2019.2928005"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1145\/3471621.3471850"},{"year":"2023","author":"Bi","article-title":"Detection and intrusion of attacks in cyber-physical security for additive manufacturing","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/TVLSI.2023.3335876"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/TC.2021.3076354"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/3320269.3384727"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10654284.pdf?arnumber=10654284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T17:54:55Z","timestamp":1726682095000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10654284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3451362","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}