{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:03:36Z","timestamp":1767924216739,"version":"3.49.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T00:00:00Z","timestamp":1513209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2018,1,31]]},"abstract":"<jats:p>In cyber-physical systems, due to the tight integration of the computational, communication, and physical components, most of the information in the cyber-domain manifests in terms of physical actions (such as motion, temperature change, etc.). This leads to the system being prone to physical-to-cyber domain attacks that affect the confidentiality. Physical actions are governed by energy flows, which may be observed. Some of these observable energy flows unintentionally leak information about the cyber-domain and hence are known as the side-channels. Side-channels such as acoustic, thermal, and power allow attackers to acquire the information without actually leveraging the vulnerability of the algorithms implemented in the system. As a case study, we have taken cyber-physical additive manufacturing systems (fused deposition modeling-based three-dimensional (3D) printer) to demonstrate how the acoustic side-channel can be used to breach the confidentiality of the system. In 3D printers, geometry, process, and machine information are the intellectual properties, which are stored in the cyber domain (G-code). We have designed an attack model that consists of digital signal processing, machine-learning algorithms, and context-based post processing to steal the intellectual property in the form of geometry details by reconstructing the G-code and thus the test objects. We have successfully reconstructed various test objects with an average axis prediction accuracy of 86% and an average length prediction error of 11.11%.<\/jats:p>","DOI":"10.1145\/3078622","type":"journal-article","created":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T13:39:24Z","timestamp":1513345164000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7067-6984","authenticated-orcid":false,"given":"Sujit Rokka","family":"Chhetri","sequence":"first","affiliation":[{"name":"University of California - Irvine, USA"}]},{"given":"Arquimedes","family":"Canedo","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, NJ, USA"}]},{"given":"Mohammad Abdullah Al","family":"Faruque","sequence":"additional","affiliation":[{"name":"University of California - Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,14]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Adobe Photoshop CC. 2015. Retrieved from www.adobe.com.  Adobe Photoshop CC. 2015. Retrieved from www.adobe.com."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984483"},{"key":"e_1_2_1_3_1","volume-title":"21 percent of manufacturers hit by intellectual property theft. (August","author":"Ashford Warwick","year":"2014"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the USENIX Security Symposium. 307--322","author":"Michael"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Audio Engineering Society Convention 117","author":"Dan"},{"key":"e_1_2_1_6_1","volume-title":"Google to end censorship in China over cyber attacks. The Guardian","author":"Branigan Tania","year":"2010"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_2_1_8_1","unstructured":"Economics and Statistics Administration. 2012. Intellectual Property and the U.S. Economy: Industries in Focus.  Economics and Statistics Administration. 2012. Intellectual Property and the U.S. Economy: Industries in Focus."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ian Gibson David W. Rosen Brent Stucker etal 2010. Additive Manufacturing Technologies. Springer.  Ian Gibson David W. Rosen Brent Stucker et al. 2010. Additive Manufacturing Technologies. Springer.","DOI":"10.1007\/978-1-4419-1120-9"},{"key":"e_1_2_1_10_1","volume-title":"Noise of Polyphase Electric Motors","author":"Gieras Jacek F."},{"key":"e_1_2_1_11_1","unstructured":"Zoom H6 Handy Recorder. 2015. Retrieved from www.zoom-na.com.  Zoom H6 Handy Recorder. 2015. Retrieved from www.zoom-na.com."},{"key":"e_1_2_1_12_1","volume-title":"Harmonic Field Effects in Induction Machines","author":"Heller Bed\u0159ich"},{"key":"e_1_2_1_13_1","volume-title":"Holbrook and Lucas Osborn","author":"Timothy","year":"2014"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the Institution of Electrical Engineers","volume":"122","author":"Hughes A."},{"key":"e_1_2_1_15_1","volume-title":"3D printers vulnerable to spying. Science 352, 6282","author":"Hvistendahl Mara","year":"2016"},{"key":"e_1_2_1_16_1","volume-title":"Stepping Motors and Their Microprocessor Controls","author":"Kenj\u014d Takashi"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10856-005-4716-5"},{"key":"e_1_2_1_18_1","volume-title":"The MathWorks Inc","author":"MATLAB."},{"key":"e_1_2_1_20_1","volume-title":"Oppenheim et al","author":"Alan","year":"1989"},{"key":"e_1_2_1_21_1","volume-title":"Pedersen et al","author":"Michael","year":"2007"},{"key":"e_1_2_1_22_1","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"F. Pedregosa","year":"2011","journal-title":"J. Machine Learn. Res."},{"key":"e_1_2_1_23_1","unstructured":"ISS Platform and Feedstock Recycling. 2014. NASA advanced manufacturing technology.  ISS Platform and Feedstock Recycling. 2014. NASA advanced manufacturing technology."},{"key":"e_1_2_1_24_1","unstructured":"Printrbot\n       3D \n      Printers\n    . 2015.\n   (\n  2015\n  ). Retrieved from www.printrbot.com.  Printrbot 3D Printers. 2015. (2015). Retrieved from www.printrbot.com."},{"key":"e_1_2_1_25_1","unstructured":"Python\n     2.7.10. 2015.\n   (\n  2015\n  ). Retrieved from www.python.org.  Python 2.7.10. 2015. (2015). Retrieved from www.python.org."},{"key":"e_1_2_1_26_1","volume-title":"Manufacturing: A persistent and prime cyber attack target.","author":"Reznick Cohn","year":"2015"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 2017 Conference on Design, Automation & Test in Europe. EDA Consortium.","author":"Chhetri Sujit Rokka","year":"2017"},{"key":"e_1_2_1_29_1","unstructured":"Billy Short. 2015. Quality Metal Additive Manufacturing (QUALITY MADE) Enabling Capability. Retrieved from www.navy.mil.  Billy Short. 2015. Quality Metal Additive Manufacturing (QUALITY MADE) Enabling Capability. Retrieved from www.navy.mil."},{"key":"e_1_2_1_30_1","unstructured":"SketchUp Make. 2015. Retrieved from www.sketchup.com.  SketchUp Make. 2015. Retrieved from www.sketchup.com."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Industry Applications Society Annual Meeting, Conference Record of the 1993 IEEE. IEEE, 122--129","author":"So E. C. T."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the European Conference on Advances in Cryptology (EUROCRYPT\u201909)","author":"Fran\u00e7ois-Xavier"},{"key":"e_1_2_1_33_1","first-page":"8","article-title":"Cyber-physical vulnerabilities in additive manufacturing systems","volume":"7","author":"Sturm L. D.","year":"2014","journal-title":"Context"},{"key":"e_1_2_1_34_1","volume-title":"Pattern Recognition: A Matlab Approach: A Matlab Approach","author":"Sergios Theodoridis","year":"2010"},{"key":"e_1_2_1_35_1","unstructured":"L\u00e1szl\u00f3 Tim\u00e1r-Peregrin Tim\u00e1r-P and P. L. T\u00edm\u00e1r. 1989. Noise and Vibration of Electrical Machines. Vol. 34. North Holland.  L\u00e1szl\u00f3 Tim\u00e1r-Peregrin Tim\u00e1r-P and P. L. T\u00edm\u00e1r. 1989. Noise and Vibration of Electrical Machines. Vol. 34. North Holland."},{"key":"e_1_2_1_36_1","volume-title":"An acoustic side-channel attack on enigma. Computing Science","author":"Toreini Ehsan"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Hannah Vincent et al. 2015. Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing. Elsevier.  Hannah Vincent et al. 2015. Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing. Elsevier.","DOI":"10.1016\/j.promfg.2015.09.065"},{"key":"e_1_2_1_38_1","volume-title":"Wall and Majid Yar","author":"David","year":"2010"},{"key":"e_1_2_1_39_1","unstructured":"T. T. Wohlers Wohlers Associates and T. Caffrey. 2014. Wohlers report 2014-3D printing and additive manufacturing-state of the industry annual worldwide progress report. Wohlers Associates. https:\/\/books.google.com\/books?id&equals;iCamoAEACAAJ.  T. T. Wohlers Wohlers Associates and T. Caffrey. 2014. Wohlers report 2014-3D printing and additive manufacturing-state of the industry annual worldwide progress report. Wohlers Associates. https:\/\/books.google.com\/books?id&equals;iCamoAEACAAJ."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689709"},{"key":"e_1_2_1_41_1","volume-title":"Low-noise Electrical Motors","author":"Yang S. J."}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:31Z","timestamp":1750217431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,14]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1,31]]}},"alternative-id":["10.1145\/3078622"],"URL":"https:\/\/doi.org\/10.1145\/3078622","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,14]]},"assertion":[{"value":"2016-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}