{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:29:45Z","timestamp":1762432185009,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Commerce, National Institute of Standards and Technology","award":["NIST-70NANB20H193"],"award-info":[{"award-number":["NIST-70NANB20H193"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522776","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"53-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["3D-Mold'ed In-Security"],"prefix":"10.1145","author":[{"given":"Grant","family":"Parker","sequence":"first","affiliation":[{"name":"Auburn University, Auburn, AL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric","family":"MacDonald","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso, El Paso, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Theo","family":"Zinner","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, AL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Yampolskiy","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, AL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2002. Failures Related to Casting. In Failure Analysis and Pre- vention. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v11.a0003508 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/434104\/a0003508.pdf    10.31399\/asm.hb.v11.a0003508\n2002. Failures Related to Casting. In Failure Analysis and Pre- vention. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v11.a0003508 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/434104\/a0003508.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"2008. Casting Design and Processes[1]. In Casting. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0009015 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/500888\/a0009015.pdf    10.31399\/asm.hb.v15.a0009015\n2008. Casting Design and Processes[1]. In Casting. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0009015 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/500888\/a0009015.pdf"},{"volume-title":"2016 ACM\/IEEE 7th international conference on Cyber-Physical Systems (ICCPS). IEEE, 1--10","author":"Al Faruque M.A.","key":"e_1_3_2_1_3_1","unstructured":"M.A. Al Faruque , S.R. Chhetri , A. Canedo , and J. Wan . 2016. Acoustic side-channel attacks on additive manufacturing systems . In 2016 ACM\/IEEE 7th international conference on Cyber-Physical Systems (ICCPS). IEEE, 1--10 . M.A. Al Faruque, S.R. Chhetri, A. Canedo, and J. Wan. 2016. Acoustic side-channel attacks on additive manufacturing systems. In 2016 ACM\/IEEE 7th international conference on Cyber-Physical Systems (ICCPS). IEEE, 1--10."},{"key":"e_1_3_2_1_4_1","first-page":"13","article-title":"Forensics of thermal side-channel in additive manufacturing systems. University of California","volume":"12","author":"Al Faruque M.A.","year":"2016","unstructured":"M.A. Al Faruque , S.R. Chhetri , A. Canedo , and J. Wan . 2016 . Forensics of thermal side-channel in additive manufacturing systems. University of California , Irvine 12 (2016), 13 . M.A. Al Faruque, S.R. Chhetri, A. Canedo, and J. Wan. 2016. Forensics of thermal side-channel in additive manufacturing systems. University of California, Irvine 12 (2016), 13.","journal-title":"Irvine"},{"key":"e_1_3_2_1_5_1","unstructured":"North American Die Casting Association et al. 2015. NADCA product specifica- tion standards for die casting.  North American Die Casting Association et al. 2015. NADCA product specifica- tion standards for die casting."},{"key":"e_1_3_2_1_6_1","unstructured":"S. Belikovetsky M. Yampolskiy J. Toh J. Gatlin and Y. Elovici. 2017. dr0wned-- cyber-physical attack with additive manufacturing. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).  S. Belikovetsky M. Yampolskiy J. Toh J. Gatlin and Y. Elovici. 2017. dr0wned-- cyber-physical attack with additive manufacturing. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. Campbell. 2015. Complete casting handbook: metal casting processes metallurgy techniques and design. Butterworth-Heinemann.  J. Campbell. 2015. Complete casting handbook: metal casting processes metallurgy techniques and design. Butterworth-Heinemann.","DOI":"10.1016\/B978-0-444-63509-9.00016-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vacuum.2017.09.048"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijheatmasstransfer.2016.09.090"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.msea.2005.02.057"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Z.W. Chen and M.Z. Jahedi. 1999. Die erosion and its effect on soldering formation in high pressure die casting of aluminium alloys. Materials & design 20 6 (1999) 303--309.  Z.W. Chen and M.Z. Jahedi. 1999. Die erosion and its effect on soldering formation in high pressure die casting of aluminium alloys. Materials & design 20 6 (1999) 303--309.","DOI":"10.1016\/S0261-3069(99)00035-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engfailanal.2021.105330"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"e_1_3_2_1_14_1","unstructured":"B. Donaldson. 2019. In Automotive Is Additive Manufacturing an Answer for Die Cast Tooling? https:\/\/www.additivemanufacturing.media\/articles\/in- automotive-is-additive-manufacturing-an-answer-for-die-cast-tooling  B. Donaldson. 2019. In Automotive Is Additive Manufacturing an Answer for Die Cast Tooling? https:\/\/www.additivemanufacturing.media\/articles\/in- automotive-is-additive-manufacturing-an-answer-for-die-cast-tooling"},{"key":"e_1_3_2_1_15_1","unstructured":"ESET. 2012. ACAD\/Medre.A - 10000's of AutoCAD Designs Leaked in Suspected Industrial Espionage. https:\/\/www.welivesecurity.com\/wp-content\/uploads\/ 200x\/white-papers\/ESET_ACAD_Medre_A_whitepaper.pdf  ESET. 2012. ACAD\/Medre.A - 10000's of AutoCAD Designs Leaked in Suspected Industrial Espionage. https:\/\/www.welivesecurity.com\/wp-content\/uploads\/ 200x\/white-papers\/ESET_ACAD_Medre_A_whitepaper.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.prostr.2020.02.050"},{"key":"e_1_3_2_1_17_1","unstructured":"M. Fossi G. Egan K. Haley E. Johnson T. Mack T. Adams J. Blackbird M.K. Low D. Mazurek D. McKinney etal 2011. Symantec internet security threat report trends for 2010. Volume XVI (2011).  M. Fossi G. Egan K. Haley E. Johnson T. Mack T. Adams J. Blackbird M.K. Low D. Mazurek D. McKinney et al. 2011. Symantec internet security threat report trends for 2010. Volume XVI (2011)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11665-014-0958-z"},{"volume-title":"24th International Symposium on Research in Attacks, Intrusions and Defenses. 135--147","author":"Gatlin J.","key":"e_1_3_2_1_19_1","unstructured":"J. Gatlin , S. Belikovetsky , Y. Elovici , A. Skjellum , J. Lubell , P. Witherell , and M. Yampolskiy . 2021. Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel . In 24th International Symposium on Research in Attacks, Intrusions and Defenses. 135--147 . J. Gatlin, S. Belikovetsky, Y. Elovici, A. Skjellum, J. Lubell, P. Witherell, and M. Yampolskiy. 2021. Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. In 24th International Symposium on Research in Attacks, Intrusions and Defenses. 135--147."},{"volume-title":"Proceedings of the 2012 ACM conference on Computer and communi- cations security. 38--49","author":"Georgiev M.","key":"e_1_3_2_1_20_1","unstructured":"M. Georgiev , S. Iyengar , S. Jana , R. Anubhai , D. Boneh , and V. Shmatikov . 2012. The most dangerous code in the world: validating SSL certificates in non-browser software . In Proceedings of the 2012 ACM conference on Computer and communi- cations security. 38--49 . M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. 2012. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proceedings of the 2012 ACM conference on Computer and communi- cations security. 38--49."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"I. Gibson D.W. Rosen B. Stucker and M. Khorasani. 2021. Additive manufacturing technologies. Vol. 17. Springer.  I. Gibson D.W. Rosen B. Stucker and M. Khorasani. 2021. Additive manufacturing technologies. Vol. 17. Springer.","DOI":"10.1007\/978-3-030-56127-7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"D. Glavach J. LaSalle-DeSantis and S. Zimmerman. 2017. Applying and assess- ing cybersecurity controls for direct digital manufacturing (ddm) systems. In Cybersecurity for Industry 4.0. Springer 173--194.  D. Glavach J. LaSalle-DeSantis and S. Zimmerman. 2017. Applying and assess- ing cybersecurity controls for direct digital manufacturing (ddm) systems. In Cybersecurity for Industry 4.0. Springer 173--194.","DOI":"10.1007\/978-3-319-50660-9_7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"L.M.G. Graves W. King P. Carrion S. Shao N. Shamsaei and M. Yampolskiy. 2021. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing (2021) 102029.  L.M.G. Graves W. King P. Carrion S. Shao N. Shamsaei and M. Yampolskiy. 2021. Sabotaging metal additive manufacturing: Powder delivery system manipulation and material-dependent effects. Additive Manufacturing (2021) 102029.","DOI":"10.1016\/j.addma.2021.102029"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931738"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978815"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Q. Han and S. Viswanathan. 2003. Analysis of the mechanism of die soldering in aluminum die casting. Metallurgical and materials transactions A 34 1 (2003) 139--146.  Q. Han and S. Viswanathan. 2003. Analysis of the mechanism of die soldering in aluminum die casting. Metallurgical and materials transactions A 34 1 (2003) 139--146.","DOI":"10.1007\/s11661-003-0215-9"},{"volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 883--894","author":"Hojjati A.","key":"e_1_3_2_1_27_1","unstructured":"A. Hojjati , A. Adhikari , K. Struckmann , E. Chou , T.N. Tho Nguyen , K. Madan , M.S. Winslett , C.A. Gunter , and W.P. King . 2016. Leave your phone at the door: Side channels that reveal factory floor secrets . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 883--894 . A. Hojjati, A. Adhikari, K. Struckmann, E. Chou, T.N. Tho Nguyen, K. Madan, M.S. Winslett, C.A. Gunter, and W.P. King. 2016. Leave your phone at the door: Side channels that reveal factory floor secrets. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 883--894."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies5010009"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Keeney E. Kowalski D. Cappelli A. Moore T. Shimeall and S. Rogers. 2005. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical Report. National Threat Assessment Ctr Washington Dc.  M. Keeney E. Kowalski D. Cappelli A. Moore T. Shimeall and S. Rogers. 2005. Insider threat study: Computer system sabotage in critical infrastructure sectors. Technical Report. National Threat Assessment Ctr Washington Dc."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmatprotec.2019.04.023"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"S. Moore P. Armstrong T. McDonald and M. Yampolskiy. 2016. Vulnerability analysis of desktop 3D printer software. In 2016 Resilience Week (RWS). IEEE 46--51.  S. Moore P. Armstrong T. McDonald and M. Yampolskiy. 2016. Vulnerability analysis of desktop 3D printer software. In 2016 Resilience Week (RWS). IEEE 46--51.","DOI":"10.1109\/RWEEK.2016.7573305"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"S.B. Moore W.B. Glisson and M. Yampolskiy. 2017. Implications of malicious 3D printer firmware. (2017).  S.B. Moore W.B. Glisson and M. Yampolskiy. 2017. Implications of malicious 3D printer firmware. (2017).","DOI":"10.24251\/HICSS.2017.735"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0924-0136(00)00545-8"},{"key":"e_1_3_2_1_34_1","unstructured":"G. Pope and M. Yampolskiy. 2017. A hazard analysis technique for additive manufacturing. arXiv preprint arXiv:1706.00497 (2017).  G. Pope and M. Yampolskiy. 2017. A hazard analysis technique for additive manufacturing. arXiv preprint arXiv:1706.00497 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"M. Rappaz J.-M. Drezet and M. Gremaud. 1999. A new hot-tearing criterion. Metallurgical and materials transactions A 30 2 (1999) 449--455.  M. Rappaz J.-M. Drezet and M. Gremaud. 1999. A new hot-tearing criterion. Metallurgical and materials transactions A 30 2 (1999) 449--455.","DOI":"10.1007\/s11661-999-0334-z"},{"key":"e_1_3_2_1_36_1","unstructured":"OSHA Regional News Release. 2014. After explosion US Department of Labor's OSHA cites 3-D printing firm for exposing workers to combustible metal powder electrical hazards Powderpart Inc. faces $64 400 in penalties.  OSHA Regional News Release. 2014. After explosion US Department of Labor's OSHA cites 3-D printing firm for exposing workers to combustible metal powder electrical hazards Powderpart Inc. faces $64 400 in penalties."},{"volume-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security. 1--10","author":"Slaughter A.","key":"e_1_3_2_1_37_1","unstructured":"A. Slaughter , M. Yampolskiy , M. Matthews , W.E. King , G. Guss , and Y. Elovici . 2017. How to ensure bad quality in metal additive manufacturing: In-situ in- frared thermography from the security perspective . In Proceedings of the 12th International Conference on Availability, Reliability and Security. 1--10 . A. Slaughter, M. Yampolskiy, M. Matthews, W.E. King, G. Guss, and Y. Elovici. 2017. How to ensure bad quality in metal additive manufacturing: In-situ in- frared thermography from the security perspective. In Proceedings of the 12th International Conference on Availability, Reliability and Security. 1--10."},{"volume-title":"International conference on critical infrastructure protection. Springer, 73--82","author":"Slay J.","key":"e_1_3_2_1_38_1","unstructured":"J. Slay and M. Miller . 2007. Lessons learned from the maroochy water breach . In International conference on critical infrastructure protection. Springer, 73--82 . J. Slay and M. Miller. 2007. Lessons learned from the maroochy water breach. In International conference on critical infrastructure protection. Springer, 73--82."},{"volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 895--907","author":"Song C.","key":"e_1_3_2_1_39_1","unstructured":"C. Song , F. Lin , Z. Ba , K. Ren , C. Zhou , and W. Xu . 2016. My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 895--907 . C. Song, F. Lin, Z. Ba, K. Ren, C. Zhou, and W. Xu. 2016. My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 895--907."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"G. Song A. Atrens and M. Dargusch. 1998. Influence of microstructure on the corrosion of diecast AZ91D. Corrosion science 41 2 (1998) 249--273.  G. Song A. Atrens and M. Dargusch. 1998. Influence of microstructure on the corrosion of diecast AZ91D. Corrosion science 41 2 (1998) 249--273.","DOI":"10.1016\/S0010-938X(98)00121-8"},{"key":"#cr-split#-e_1_3_2_1_41_1.1","unstructured":"H.W. Stoll. 2008. Casting Design Issues and Practices[1]. In Cast- ing. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0009014 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/500880\/a0009014.pdf 10.31399\/asm.hb.v15.a0009014"},{"key":"#cr-split#-e_1_3_2_1_41_1.2","doi-asserted-by":"crossref","unstructured":"H.W. Stoll. 2008. Casting Design Issues and Practices[1]. In Cast- ing. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0009014 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/500880\/a0009014.pdf","DOI":"10.31399\/asm.hb.v15.a0009014"},{"volume-title":"2014 International Solid Freeform Fabrication Symposium. University of Texas at Austin.","author":"Sturm L.D.","key":"e_1_3_2_1_42_1","unstructured":"L.D. Sturm , C.B. Williams , J.A. Camelio , J. White , and R. Parker . 2014. Cyber- physical vulnerabilities in additive manufacturing systems . In 2014 International Solid Freeform Fabrication Symposium. University of Texas at Austin. L.D. Sturm, C.B. Williams, J.A. Camelio, J. White, and R. Parker. 2014. Cyber- physical vulnerabilities in additive manufacturing systems. In 2014 International Solid Freeform Fabrication Symposium. University of Texas at Austin."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"e_1_3_2_1_44_1","unstructured":"R.B. Thompson. 2002. Nondestructive Evaluation and Life Assessment. In Failure Analysis and Prevention. ASM International. https:\/\/doi.org\/10. 31399\/asm.hb.v11.a0003515 arXiv:https:\/\/dl.asminternational.org\/book\/chapter- pdf\/434496\/a0003515.pdf  R.B. Thompson. 2002. Nondestructive Evaluation and Life Assessment. In Failure Analysis and Prevention. ASM International. https:\/\/doi.org\/10. 31399\/asm.hb.v11.a0003515 arXiv:https:\/\/dl.asminternational.org\/book\/chapter- pdf\/434496\/a0003515.pdf"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.60"},{"key":"#cr-split#-e_1_3_2_1_46_1.1","unstructured":"D.L. Twarog. 2008. Die Casting Tooling. In Casting. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0005318 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/501988\/a0005318.pdf 10.31399\/asm.hb.v15.a0005318"},{"key":"#cr-split#-e_1_3_2_1_46_1.2","doi-asserted-by":"crossref","unstructured":"D.L. Twarog. 2008. Die Casting Tooling. In Casting. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v15.a0005318 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/501988\/a0005318.pdf","DOI":"10.31399\/asm.hb.v15.a0005318"},{"key":"#cr-split#-e_1_3_2_1_47_1.1","unstructured":"G.F. Vander Voort. 2002. Failures of Tools and Dies[1]. In Failure Analysis and Prevention. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v11.a0001814 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/435982\/a0001814.pdf 10.31399\/asm.hb.v11.a0001814"},{"key":"#cr-split#-e_1_3_2_1_47_1.2","doi-asserted-by":"crossref","unstructured":"G.F. Vander Voort. 2002. Failures of Tools and Dies[1]. In Failure Analysis and Prevention. ASM International. https:\/\/doi.org\/10.31399\/asm.hb.v11.a0001814 arXiv:https:\/\/dl.asminternational.org\/book\/chapter-pdf\/435982\/a0001814.pdf","DOI":"10.31399\/asm.hb.v11.a0001814"},{"key":"e_1_3_2_1_48_1","unstructured":"W.G. Walkington. 2015. Die casting defects.*. Causes and solutions. NADCA.  W.G. Walkington. 2015. Die casting defects.*. Causes and solutions. NADCA."},{"key":"e_1_3_2_1_49_1","unstructured":"C. Xiao. 2013. Security Attack to 3D Printing. In xFocus Information Security Conference.  C. Xiao. 2013. Security Attack to 3D Printing. In xFocus Information Security Conference."},{"volume-title":"Proceedings of the 4th Program Protection and Reverse Engineering Workshop. 1--9.","author":"Yampolskiy M.","key":"e_1_3_2_1_50_1","unstructured":"M. Yampolskiy , T.R. Andel , J.T. McDonald , W.B. Glisson , and A. Yasinsac . 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing . In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. 1--9. M. Yampolskiy, T.R. Andel, J.T. McDonald, W.B. Glisson, and A. Yasinsac. 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. 1--9."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.03.015"},{"volume-title":"International Conference on Critical Infrastructure Protection. Springer, 169--183","author":"Yampolskiy M.","key":"e_1_3_2_1_52_1","unstructured":"M. Yampolskiy , L. Schutzle , U. Vaidya , and A. Yasinsac . 2015. Security challenges of additive manufacturing with metals and alloys . In International Conference on Critical Infrastructure Protection. Springer, 169--183 . M. Yampolskiy, L. Schutzle, U. Vaidya, and A. Yasinsac. 2015. Security challenges of additive manufacturing with metals and alloys. In International Conference on Critical Infrastructure Protection. Springer, 169--183."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.12.004"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522776"}},"subtitle":["Mapping Out Security of Indirect Additive Manufacturing"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":57,"alternative-id":["10.1145\/3494107.3522776","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522776","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}