{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:41:08Z","timestamp":1772556068529,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB20H193"],"award-info":[{"award-number":["70NANB20H193"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3462223.3485618","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:15:37Z","timestamp":1635437737000},"page":"3-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Myths and Misconceptions in Additive Manufacturing Security"],"prefix":"10.1145","author":[{"given":"Mark","family":"Yampolskiy","sequence":"first","affiliation":[{"name":"Auburn University, Auburn, AL, USA"}]},{"given":"Jacob","family":"Gatlin","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, AL, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Google LLC &amp; Columbia University, New York City, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"e_1_3_2_2_2_1","volume-title":"Coalition of states sue over rules governing 3d-printed guns","author":"Balsamo Michael","year":"2020","unstructured":"Michael Balsamo and Chris for AP News Grygiel . Coalition of states sue over rules governing 3d-printed guns , 2020 . Michael Balsamo and Chris for AP News Grygiel. Coalition of states sue over rules governing 3d-printed guns, 2020."},{"key":"e_1_3_2_2_3_1","unstructured":"BBC. Japan man held over '3d-printed guns' 2020.  BBC. Japan man held over '3d-printed guns' 2020."},{"key":"e_1_3_2_2_4_1","volume-title":"dr0wnedcyber- physical attack with additive manufacturing","author":"Belikovetsky Sofia","year":"2016","unstructured":"Sofia Belikovetsky , Mark Yampolskiy , Jinghui Toh , and Yuval Elovici . dr0wnedcyber- physical attack with additive manufacturing , 2016 . Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, and Yuval Elovici. dr0wnedcyber- physical attack with additive manufacturing, 2016."},{"key":"e_1_3_2_2_5_1","first-page":"16","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Belikovetsky Sofia","year":"2017","unstructured":"Sofia Belikovetsky , Mark Yampolskiy , Jinghui Toh , Jacob Gatlin , and Yuval Elovici . dr0wned -- cyber-physical attack with additive manufacturing . In 11th USENIX Workshop on Offensive Technologies (WOOT 17) , page 16 , Vancouver, BC , 2017 . USENIX Association. Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, and Yuval Elovici. dr0wned -- cyber-physical attack with additive manufacturing. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), page 16, Vancouver, BC, 2017. USENIX Association."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48737-3_4"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1115\/1.4040341"},{"key":"e_1_3_2_2_8_1","first-page":"74","volume-title":"Proceedings of the 35th International Conference on Computer-Aided Design","author":"Chhetri Sujit Rokka","unstructured":"Sujit Rokka Chhetri , Arquimedes Canedo , and Mohammad Abdullah Al Faruque . Kcad : kinetic cyber-attack detection method for cyber-physical additive manufacturing systems . In Proceedings of the 35th International Conference on Computer-Aided Design , page 74 . ACM, 2016. Sujit Rokka Chhetri, Arquimedes Canedo, and Mohammad Abdullah Al Faruque. Kcad: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In Proceedings of the 35th International Conference on Computer-Aided Design, page 74. ACM, 2016."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818659"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","DOI":"10.1007\/s00170-014-6214-8","article-title":"In situ quality control of the selective laser melting process using a high-speed, real-time melt pool monitoring system","author":"Clijsters Stijn","year":"2014","unstructured":"Stijn Clijsters , Tom Craeghs , Sam Buls , Karolien Kempen , and J-P Kruth . In situ quality control of the selective laser melting process using a high-speed, real-time melt pool monitoring system . The International Journal of Advanced Manufacturing Technology, 75(5--8):1089--1101 , 2014 . Stijn Clijsters, Tom Craeghs, Sam Buls, Karolien Kempen, and J-P Kruth. In situ quality control of the selective laser melting process using a high-speed, real-time melt pool monitoring system. The International Journal of Advanced Manufacturing Technology, 75(5--8):1089--1101, 2014.","journal-title":"The International Journal of Advanced Manufacturing Technology, 75(5--8):1089--1101"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-017-2502-8"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"issue":"6","key":"e_1_3_2_2_13_1","first-page":"29","article-title":"stuxnet dossier. White paper, Symantec Corp","volume":"5","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere , Liam O Murchu , and Eric Chien . W32 . stuxnet dossier. White paper, Symantec Corp ., Security Response , 5 ( 6 ): 29 , 2011 . Nicolas Falliere, Liam O Murchu, and Eric Chien. W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5(6):29, 2011.","journal-title":"Security Response"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264918"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471850"},{"key":"e_1_3_2_2_16_1","volume-title":"Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing, page 102029","author":"Graves LMG","year":"2021","unstructured":"LMG Graves , W King , P Carrion , S Shao , N Shamsaei , and M Yampolskiy . Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing, page 102029 , 2021 . LMG Graves, W King, P Carrion, S Shao, N Shamsaei, and M Yampolskiy. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing, page 102029, 2021."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931738"},{"key":"e_1_3_2_2_18_1","first-page":"10","article-title":"terminology for additive manufacturing technologies","volume":"12","author":"International ASTM","year":"2013","unstructured":"ASTM International . F2792--12a-standard terminology for additive manufacturing technologies . Rapid Manufacturing Association , 12 : 10 -- 12 , 2013 . ASTM International. F2792--12a-standard terminology for additive manufacturing technologies. Rapid Manufacturing Association, 12:10--12, 2013.","journal-title":"Rapid Manufacturing Association"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1039\/C7TC03348F"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_2_21_1","volume-title":"Computers & Security","author":"Miller Daniel Bradford","year":"2018","unstructured":"Daniel Bradford Miller , William Bradley Glisson , Mark Yampolskiy , and Kim- Kwang Raymond Choo . Identifying 3d printer residual data via open source documentation . Computers & Security , 2018 . Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, and Kim- Kwang Raymond Choo. Identifying 3d printer residual data via open source documentation. Computers & Security, 2018."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2016.7573305"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"e_1_3_2_2_24_1","volume-title":"Us commerce control list","author":"Bureau of Industry and US Department of Commerce Security.","year":"2021","unstructured":"Bureau of Industry and US Department of Commerce Security. Us commerce control list , 2021 . Bureau of Industry and US Department of Commerce Security. Us commerce control list, 2021."},{"issue":"7","key":"e_1_3_2_2_25_1","first-page":"12","article-title":"Our excessively simplistic information security model and how to fix it","volume":"8","author":"Parker Donn","year":"2010","unstructured":"Donn Parker . Our excessively simplistic information security model and how to fix it . ISSA Journal , 8 ( 7 ): 12 -- 21 , 2010 . Donn Parker. Our excessively simplistic information security model and how to fix it. ISSA Journal, 8(7):12--21, 2010.","journal-title":"ISSA Journal"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10040090"},{"key":"e_1_3_2_2_27_1","volume-title":"Cellular design for laser freeform fabrication","author":"Rehme Olaf","year":"2010","unstructured":"Olaf Rehme . Cellular design for laser freeform fabrication , volume 4 . Cuvillier Verlag , 2010 . Olaf Rehme. Cellular design for laser freeform fabrication, volume 4. Cuvillier Verlag, 2010."},{"key":"e_1_3_2_2_28_1","first-page":"78","volume-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security","author":"Slaughter Andrew","unstructured":"Andrew Slaughter , Mark Yampolskiy , Manyalibo Matthews , Wayne E King , Gabe Guss , and Yuval Elovici . How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective . In Proceedings of the 12th International Conference on Availability, Reliability and Security , page 78 . ACM, 2017. Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E King, Gabe Guss, and Yuval Elovici. How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective. In Proceedings of the 12th International Conference on Availability, Reliability and Security, page 78. ACM, 2017."},{"key":"e_1_3_2_2_29_1","first-page":"8","article-title":"Cyber-physical vunerabilities in additive manufacturing systems","volume":"7","author":"Sturm L","year":"2014","unstructured":"L Sturm , CB Williams , JA Camelio , J White , and R Parker . Cyber-physical vunerabilities in additive manufacturing systems . Context , 7 : 8 , 2014 . L Sturm, CB Williams, JA Camelio, J White, and R Parker. Cyber-physical vunerabilities in additive manufacturing systems. Context, 7:8, 2014.","journal-title":"Context"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055198"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.60"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40964-019-00078-6"},{"key":"e_1_3_2_2_33_1","volume-title":"Maximen und reflexionen","author":"Von Goethe Johann Wolfgang","year":"2012","unstructured":"Johann Wolfgang Von Goethe . Maximen und reflexionen . Jazzybee Verlag , 2012 . Johann Wolfgang Von Goethe. Maximen und reflexionen. Jazzybee Verlag, 2012."},{"key":"e_1_3_2_2_34_1","volume-title":"Fort Collins","author":"Wohlers Terry","year":"2021","unstructured":"Terry Wohlers . Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates, Inc ., Fort Collins , Colorado, USA , 2021 . www.wohlersassociates.com. Terry Wohlers. Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates, Inc., Fort Collins, Colorado, USA, 2021. www.wohlersassociates.com."},{"key":"e_1_3_2_2_35_1","volume-title":"Security attack to 3d printing","author":"Claud Xiao Zi","year":"2013","unstructured":"Xiao Zi Hang ( Claud Xiao). Security attack to 3d printing , 2013 . Keynote at XCon 2013. Xiao Zi Hang (Claud Xiao). Security attack to 3d printing, 2013. Keynote at XCon2013."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70395-4_2"},{"key":"e_1_3_2_2_37_1","volume-title":"Additive Manufacturing","author":"Yampolskiy Mark","year":"2018","unstructured":"Mark Yampolskiy , Wayne E King , Jacob Gatlin , Sofia Belikovetsky , Adam Brown , Anthony Skjellum , and Yuval Elovici . Security of Additive Manufacturing: Attack Taxonomy and Survey . Additive Manufacturing , 2018 . Mark Yampolskiy, Wayne E King, Jacob Gatlin, Sofia Belikovetsky, Adam Brown, Anthony Skjellum, and Yuval Elovici. Security of Additive Manufacturing: Attack Taxonomy and Survey. Additive Manufacturing, 2018."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_11"},{"key":"e_1_3_2_2_39_1","volume-title":"International Journal of Critical Infrastructure Protection, 14:58--71","author":"Yampolskiy Mark","year":"2016","unstructured":"Mark Yampolskiy , Anthony Skjellum , Michael Kretzschmar , Ruel A Overfelt , Kenneth R Sloan , and Alec Yasinsac . Using 3D Printers asWeapons . International Journal of Critical Infrastructure Protection, 14:58--71 , 2016 . Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A Overfelt, Kenneth R Sloan, and Alec Yasinsac. Using 3D Printers asWeapons. International Journal of Critical Infrastructure Protection, 14:58--71, 2016."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2020.01.077"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485618","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:54Z","timestamp":1750193334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485618"}},"subtitle":["Deficiencies of the CIA Triad"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":41,"alternative-id":["10.1145\/3462223.3485618","10.1145\/3462223"],"URL":"https:\/\/doi.org\/10.1145\/3462223.3485618","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}