{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T02:08:15Z","timestamp":1771726095288,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Commerce, National Institute of Standards and Technology","award":["NIST-70NANB20H193"],"award-info":[{"award-number":["NIST-70NANB20H193"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471850","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"135-147","source":"Crossref","is-referenced-by-count":18,"title":["Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel"],"prefix":"10.1145","author":[{"given":"Jacob","family":"Gatlin","sequence":"first","affiliation":[{"name":"Auburn University, US"}]},{"given":"Sofia","family":"Belikovetsky","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, US"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben Gurion University of the Negev, Israle"}]},{"given":"Anthony","family":"Skjellum","sequence":"additional","affiliation":[{"name":"University of Tennessee at Chattanooga, US"}]},{"given":"Joshua","family":"Lubell","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology, US"}]},{"given":"Paul","family":"Witherell","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology, US"}]},{"given":"Mark","family":"Yampolskiy","sequence":"additional","affiliation":[{"name":"Auburn University, US"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Version 1.1. (April","year":"2018","unstructured":"2018. National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework) , Version 1.1. (April 2018 ). 2018. National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework), Version 1.1. (April 2018)."},{"key":"e_1_3_2_1_2_1","first-page":"988","article-title":"System and method for data management and security for digital manufacturing","volume":"16","author":"Adkins Chris","year":"2019","unstructured":"Chris Adkins , Stephan Thomas , 2019 . System and method for data management and security for digital manufacturing . US Patent App. 16\/128 , 988 . Chris Adkins, Stephan Thomas, 2019. System and method for data management and security for digital manufacturing. US Patent App. 16\/128,988.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_3_1","unstructured":"akhani3D. 2020. akhani3D Production Additive Manufacturing Service Bureau. https:\/\/akhani3d.com.  akhani3D. 2020. akhani3D Production Additive Manufacturing Service Bureau. https:\/\/akhani3d.com."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"e_1_3_2_1_5_1","first-page":"212","article-title":"Defending side channel attacks in additive manufacturing systems","volume":"10","author":"Al\u00a0Faruque Mohammad\u00a0Abdullah","year":"2019","unstructured":"Mohammad\u00a0Abdullah Al\u00a0Faruque , Jiang Wan , and Sujit\u00a0Rokka Chhetri . 2019 . Defending side channel attacks in additive manufacturing systems . US Patent 10 , 212 ,185. Mohammad\u00a0Abdullah Al\u00a0Faruque, Jiang Wan, and Sujit\u00a0Rokka Chhetri. 2019. Defending side channel attacks in additive manufacturing systems. US Patent 10,212,185.","journal-title":"US Patent"},{"key":"e_1_3_2_1_6_1","volume-title":"Solid Freeform Fabrication Symposium. 1475\u20131490","author":"Albakri Mohammed","year":"2015","unstructured":"Mohammed Albakri , Logan Sturm , Christopher\u00a0 B Williams , and Pablo Tarazaga . 2015 . Non-destructive evaluation of additively manufactured parts via impedance-based monitoring . In Solid Freeform Fabrication Symposium. 1475\u20131490 . Mohammed Albakri, Logan Sturm, Christopher\u00a0B Williams, and Pablo Tarazaga. 2015. Non-destructive evaluation of additively manufactured parts via impedance-based monitoring. In Solid Freeform Fabrication Symposium. 1475\u20131490."},{"key":"e_1_3_2_1_7_1","volume-title":"Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing.","author":"Bayens Christian","year":"2017","unstructured":"Christian Bayens , Tuan Le , Luis Garcia , Raheem Beyah , Mehdi Javanmard , and Saman Zonouz . 2017. See No Evil , Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. ( 2017 ). Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, and Saman Zonouz. 2017. See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. (2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"Digital Audio Signature for 3D Printing Integrity","author":"Belikovetsky Sofia","year":"2018","unstructured":"Sofia Belikovetsky , Yosef Solewicz , Mark Yampolskiy , Jinghui Toh , and Yuval Elovici . 2018. Digital Audio Signature for 3D Printing Integrity . IEEE Transactions on Information Forensics and Security ( 2018 ). Sofia Belikovetsky, Yosef Solewicz, Mark Yampolskiy, Jinghui Toh, and Yuval Elovici. 2018. Digital Audio Signature for 3D Printing Integrity. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"Sofia Belikovetsky Mark Yampolskiy Jinghui Toh and Yuval Elovici. 2016. dr0wned-Cyber-Physical Attack with Additive Manufacturing.  Sofia Belikovetsky Mark Yampolskiy Jinghui Toh and Yuval Elovici. 2016. dr0wned-Cyber-Physical Attack with Additive Manufacturing."},{"key":"e_1_3_2_1_10_1","volume-title":"Tool of spies: Leaking your ip by altering the 3d printer compiler","author":"Chhetri Sujit\u00a0Rokka","year":"2019","unstructured":"Sujit\u00a0Rokka Chhetri , Anomadarshi Barua , Sina Faezi , Francesco Regazzoni , Arquimedes Canedo , and Mohammad\u00a0Abdullah Al\u00a0Faruque . 2019. Tool of spies: Leaking your ip by altering the 3d printer compiler . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Sujit\u00a0Rokka Chhetri, Anomadarshi Barua, Sina Faezi, Francesco Regazzoni, Arquimedes Canedo, and Mohammad\u00a0Abdullah Al\u00a0Faruque. 2019. Tool of spies: Leaking your ip by altering the 3d printer compiler. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818659"},{"key":"e_1_3_2_1_13_1","unstructured":"The\u00a0MITRE Corporation. 2021. Common Vulnerabilities and Exposures Database. https:\/\/cve.mitre.org.  The\u00a0MITRE Corporation. 2021. Common Vulnerabilities and Exposures Database. https:\/\/cve.mitre.org."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"e_1_3_2_1_15_1","unstructured":"General Electric. 2020. What is Additive Manufacturing?https:\/\/www.ge.com\/additive\/additive-manufacturing.  General Electric. 2020. What is Additive Manufacturing?https:\/\/www.ge.com\/additive\/additive-manufacturing."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Shaw\u00a0C Feng Paul Witherell Gaurav Ameta and Duck\u00a0Bong Kim. 2017. Activity model for homogenization of data sets in laser-based powder bed fusion. Rapid Prototyping Journal(2017).  Shaw\u00a0C Feng Paul Witherell Gaurav Ameta and Duck\u00a0Bong Kim. 2017. Activity model for homogenization of data sets in laser-based powder bed fusion. Rapid Prototyping Journal(2017).","DOI":"10.1108\/RPJ-11-2015-0160"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264918"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931738"},{"key":"e_1_3_2_1_21_1","unstructured":"Felix Hausdorff. 1914. Grundz\u00fcge der mengenlehre. Vol.\u00a07. von Veit.  Felix Hausdorff. 1914. Grundz\u00fcge der mengenlehre. Vol.\u00a07. von Veit."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978323"},{"key":"e_1_3_2_1_23_1","volume-title":"Order No. 13,800, 82 Fed. Reg. 22391. Office of the Press Secretary(16","author":"House White","year":"2017","unstructured":"White House . 16 May, 2017. Exec. Order No. 13,800, 82 Fed. Reg. 22391. Office of the Press Secretary(16 May , 2017 ). White House. 16 May, 2017. Exec. Order No. 13,800, 82 Fed. Reg. 22391. Office of the Press Secretary(16 May, 2017)."},{"key":"e_1_3_2_1_24_1","unstructured":"Identify3D. 2020. Identify3D Info Sheet. https:\/\/identify3d.com\/wp-content\/uploads\/2019\/06\/Identify3DInfosheet-1.pdf.  Identify3D. 2020. Identify3D Info Sheet. https:\/\/identify3d.com\/wp-content\/uploads\/2019\/06\/Identify3DInfosheet-1.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Identify3D. 2021. Identify3D Home Webpage. https:\/\/identify3d.com\/.  Identify3D. 2021. Identify3D Home Webpage. https:\/\/identify3d.com\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Annual international cryptology conference","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential power analysis . In Annual international cryptology conference . Springer , 388\u2013397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388\u2013397."},{"key":"e_1_3_2_1_27_1","volume-title":"A Survey of Cybersecurity of Digital Manufacturing. Proc","author":"Mahesh Priyanka","year":"2020","unstructured":"Priyanka Mahesh , Akash Tiwari , Chenglu Jin , Panganamala\u00a0 R Kumar , A L\u00a0Narasimha Reddy , Satish\u00a0 TS Bukkapatanam , Nikhil Gupta , and Ramesh Karri . 2020. A Survey of Cybersecurity of Digital Manufacturing. Proc . IEEE ( 2020 ). Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala\u00a0R Kumar, AL\u00a0Narasimha Reddy, Satish\u00a0TS Bukkapatanam, Nikhil Gupta, and Ramesh Karri. 2020. A Survey of Cybersecurity of Digital Manufacturing. Proc. IEEE (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"e_1_3_2_1_29_1","unstructured":"Ltd. New Japan Radio\u00a0Co.2020. Stepper Motor Basics.  Ltd. New Japan Radio\u00a0Co.2020. Stepper Motor Basics."},{"key":"e_1_3_2_1_30_1","unstructured":"Zachary Oligschlaeger Benjamin Baltes and Jennifer Chin. 2020. Secure 3D Printing. https:\/\/www.freepatentsonline.com\/y2020\/0326683.html  Zachary Oligschlaeger Benjamin Baltes and Jennifer Chin. 2020. Secure 3D Printing. https:\/\/www.freepatentsonline.com\/y2020\/0326683.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9235105"},{"key":"e_1_3_2_1_32_1","unstructured":"RapidDirect. 2020. RapidDirect Online CNC Machining and Prototype Manufacturing Service. https:\/\/www.rapiddirect.com.  RapidDirect. 2020. RapidDirect Online CNC Machining and Prototype Manufacturing Service. https:\/\/www.rapiddirect.com."},{"key":"e_1_3_2_1_33_1","volume-title":"Data-Driven Defense Through Leakage Minimization","author":"Rokka\u00a0Chhetri Sujit","unstructured":"Sujit Rokka\u00a0Chhetri and Mohammad\u00a0Abdullah Al\u00a0Faruque . 2020. Data-Driven Defense Through Leakage Minimization . Springer International Publishing , Cham , 67\u201390. https:\/\/doi.org\/10.1007\/978-3-030-37962-9_4 Sujit Rokka\u00a0Chhetri and Mohammad\u00a0Abdullah Al\u00a0Faruque. 2020. Data-Driven Defense Through Leakage Minimization. Springer International Publishing, Cham, 67\u201390. https:\/\/doi.org\/10.1007\/978-3-030-37962-9_4"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0060-9"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923573"},{"key":"e_1_3_2_1_36_1","unstructured":"SciPy.org. 2020. Documentation of scipy.signal.find_peaks. https:\/\/docs.scipy.org\/.  SciPy.org. 2020. Documentation of scipy.signal.find_peaks. https:\/\/docs.scipy.org\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"e_1_3_2_1_39_1","unstructured":"Logan Sturm Mohammed Albakri Christopher\u00a0B Williams and Pablo Tarazaga. 2016. In-situ Detection of Build Defects in Additive Manufacturing via Impedance-Based Monitoring. (2016) 1458\u20131478.  Logan Sturm Mohammed Albakri Christopher\u00a0B Williams and Pablo Tarazaga. 2016. In-situ Detection of Build Defects in Additive Manufacturing via Impedance-Based Monitoring. (2016) 1458\u20131478."},{"key":"e_1_3_2_1_40_1","first-page":"8","article-title":"Cyber-physical vunerabilities in additive manufacturing systems","volume":"7","author":"Sturm L","year":"2014","unstructured":"L Sturm , CB Williams , JA Camelio , J White , and R Parker . 2014 . Cyber-physical vunerabilities in additive manufacturing systems . Context 7 (2014), 8 . L Sturm, CB Williams, JA Camelio, J White, and R Parker. 2014. Cyber-physical vunerabilities in additive manufacturing systems. Context 7(2014), 8.","journal-title":"Context"},{"key":"e_1_3_2_1_41_1","unstructured":"thyssenkrupp. 2020. thyssenkrupp 3D-Druck TechCenter: Additive Manufacturing. https:\/\/www.thyssenkrupp-additive-manufacturing.com.  thyssenkrupp. 2020. thyssenkrupp 3D-Druck TechCenter: Additive Manufacturing. https:\/\/www.thyssenkrupp-additive-manufacturing.com."},{"key":"e_1_3_2_1_42_1","unstructured":"Treatstock. 2020. Treatstock Smart Manufacturing Platform. https:\/\/www.treatstock.com.  Treatstock. 2020. Treatstock Smart Manufacturing Platform. https:\/\/www.treatstock.com."},{"key":"e_1_3_2_1_43_1","volume-title":"Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security 4, 4","author":"Van\u00a0Eck Wim","year":"1985","unstructured":"Wim Van\u00a0Eck . 1985. Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security 4, 4 ( 1985 ), 269\u2013286. Wim Van\u00a0Eck. 1985. Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security 4, 4 (1985), 269\u2013286."},{"key":"e_1_3_2_1_44_1","volume-title":"Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates","author":"Wohlers Terry","unstructured":"Terry Wohlers . 2017. Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates , Inc., Fort Collins, Colorado, USA. www.wohlersassociates.com. Terry Wohlers. 2017. Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report. Wohlers Associates, Inc., Fort Collins, Colorado, USA. www.wohlersassociates.com."},{"key":"e_1_3_2_1_45_1","volume-title":"Towards Security of Additive Layer Manufacturing. WiP presented at The 30th Annual Computer Security Applications Conference (ACSAC)","author":"Yampolskiy M","year":"2014","unstructured":"M Yampolskiy , TR Andel , JT McDonald , WB Glisson , and A Yasinsac . 2014. Towards Security of Additive Layer Manufacturing. WiP presented at The 30th Annual Computer Security Applications Conference (ACSAC) 2014 . M Yampolskiy, TR Andel, JT McDonald, WB Glisson, and A Yasinsac. 2014. Towards Security of Additive Layer Manufacturing. WiP presented at The 30th Annual Computer Security Applications Conference (ACSAC) 2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689702.2689709"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461465"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Mark Yampolskiy Wayne\u00a0E King Jacob Gatlin Sofia Belikovetsky Adam Brown Anthony Skjellum and Yuval Elovici. 2018. Security of Additive Manufacturing: Attack Taxonomy and Survey. Additive Manufacturing(2018).  Mark Yampolskiy Wayne\u00a0E King Jacob Gatlin Sofia Belikovetsky Adam Brown Anthony Skjellum and Yuval Elovici. 2018. Security of Additive Manufacturing: Attack Taxonomy and Survey. Additive Manufacturing(2018).","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971947"},{"key":"e_1_3_2_1_50_1","volume-title":"Manufacturing and Security Challenges in 3D Printing. JOM","author":"Zeltmann Steven\u00a0Eric","year":"2016","unstructured":"Steven\u00a0Eric Zeltmann , Nikhil Gupta , Nektarios\u00a0Georgios Tsoutsos , Michail Maniatakos , Jeyavijayan Rajendran , and Ramesh Karri . 2016. Manufacturing and Security Challenges in 3D Printing. JOM ( 2016 ), 1\u201310. Steven\u00a0Eric Zeltmann, Nikhil Gupta, Nektarios\u00a0Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri. 2016. Manufacturing and Security Challenges in 3D Printing. JOM (2016), 1\u201310."}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","location":"San Sebastian Spain","acronym":"RAID '21"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":48,"alternative-id":["10.1145\/3471621.3471850","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471850","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}