A Survey of Cybersecurity of Digital Manufacturing
暂无分享,去创建一个
Ramesh Karri | A. L. Narasimha Reddy | Priyanka Mahesh | Akash Tiwari | Chenglu Jin | Nikhil Gupta | Panganamala R. Kumar | Satish T.S. Bukkapatanam | P. Kumar | Chenglu Jin | S. Bukkapatnam | R. Karri | A. Reddy | Nikhil Gupta | Akash Tiwari | P. Mahesh | A. Reddy
[1] Yuval Elovici,et al. Digital Audio Signature for 3D Printing Integrity , 2019, IEEE Transactions on Information Forensics and Security.
[2] M. A. Faruque. Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .
[3] RenKui,et al. My Smartphone Recognizes Genuine QR Codes , 2018 .
[4] Satish T. S. Bukkapatnam,et al. Implementing the Transformation of Discrete Part Manufacturing Systems Into Smart Manufacturing Platforms , 2018, Volume 3: Manufacturing Equipment and Systems.
[5] Masahiko Mori,et al. Innovative grid molding and cooling using an additive and subtractive hybrid CNC machine tool , 2017 .
[6] Vijay Sivaraman,et al. Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[7] Arquimedes Canedo,et al. Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler , 2019 .
[8] S. H. Mian,et al. Additive manufacturing: Challenges, trends, and applications , 2019, Advances in Mechanical Engineering.
[9] Christopher Saldana,et al. Adaptive geometry transformation and repair for hybrid manufacturing , 2018 .
[10] Wyatt Hoffman,et al. Internet of nuclear things: Managing the proliferation risks of 3-D printing technology , 2018 .
[11] Young B. Moon,et al. Taxonomy of Cross-Domain Attacks on CyberManufacturing System , 2017 .
[12] Mohammad Abdullah Al Faruque,et al. Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[13] Zhiyuan Zheng,et al. Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[14] Yang Gao,et al. Watching and Safeguarding Your 3D Printer , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[15] Nektarios Georgios Tsoutsos,et al. ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited , 2017, DAC.
[16] WangWei,et al. Watching and Safeguarding Your 3D Printer , 2018 .
[17] Satish T. S. Bukkapatnam,et al. Towards rapid, in situ characterization for materials-on-demand manufacturing , 2020 .
[18] Adam J. Brown,et al. Security of additive manufacturing: Attack taxonomy and survey , 2018 .
[19] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[20] Panganamala Ramana Kumar,et al. Secure control of networked cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[21] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[22] Wenyao Xu,et al. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.
[23] Arquimedes Canedo,et al. Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[24] Panganamala Ramana Kumar,et al. Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[25] Nektarios Georgios Tsoutsos,et al. Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication , 2018, Advanced Engineering Materials.
[26] Kim-Kwang Raymond Choo,et al. A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers , 2016, IEEE Transactions on Information Forensics and Security.
[27] Satish T. S. Bukkapatnam,et al. Smart manufacturing multiplex , 2020 .
[28] Satish T. S. Bukkapatnam,et al. Change Detection and Prognostics for Transient Real-World Processes Using Streaming Data , 2018, Recent Advances in Optimization and Modeling of Contemporary Problems.
[29] Ray Y. Zhong,et al. Intelligent Manufacturing in the Context of Industry 4.0: A Review , 2017 .
[30] Douglas C. Schmidt,et al. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..
[31] Arun R. Srinivasa,et al. Towards Realizing Cybermanufacturing Kiosks: Quality Assurance Challenges and Opportunities , 2018 .
[32] Bruce L. Tai,et al. Acoustic Emission Characterization of Natural Fiber Reinforced Plastic Composite Machining Using a Random Forest Machine Learning Model , 2020 .
[33] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[34] Fei Chen,et al. Security features embedded in computer aided design (CAD) solid models for additive manufacturing , 2017 .
[35] Kuang-Ting Hsiao,et al. Optimal Sabotage Attack on Composite Material Parts , 2019, Int. J. Crit. Infrastructure Prot..
[36] Atul Prakash,et al. Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.
[37] Satish T. S. Bukkapatnam,et al. Process-machine interactions and a multi-sensor fusion approach to predict surface roughness in cylindrical plunge grinding process , 2018 .
[38] Воробьев Антон Александрович. Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .
[39] Arquimedes Canedo,et al. KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[40] Taku Yamazaki,et al. Development of A Hybrid Multi-tasking Machine Tool: Integration of Additive Manufacturing Technology with CNC Machining , 2016 .
[41] Alec Yasinsac,et al. Security Challenges of Additive Manufacturing with Metals and Alloys , 2015, Critical Infrastructure Protection.
[42] Satish T. S. Bukkapatnam,et al. Time series forecasting for nonlinear and non-stationary processes: a review and comparative study , 2015 .
[43] Bharadwaj Satchidanandan,et al. Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System , 2018 .
[44] Riccardo Bettati,et al. IoTAegis: A Scalable Framework to Secure the Internet of Things , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[45] Rajarshi Gupta,et al. All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.
[46] Nektarios Georgios Tsoutsos,et al. Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering , 2017, CPSS@AsiaCCS.
[47] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[48] Yuval Elovici,et al. How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective , 2017, ARES.
[49] Mohammad Abdullah Al Faruque,et al. Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing , 2017, IEEE Des. Test.
[50] Yoel Raban,et al. Foresight of cyber security threat drivers and affecting technologies , 2018, foresight.
[51] Vijay Sivaraman,et al. Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.
[52] Swarup Bhunia,et al. An Automated Framework for Board-level Trojan Benchmarking , 2020, ArXiv.
[53] Frank W. Liou,et al. Three Dimensional Die Repair Using a Hybrid Manufacturing System , 2006 .
[54] Jing Zhang,et al. Cybersecurity risks and mitigation strategies in additive manufacturing , 2018 .
[55] Niraj K. Jha,et al. Smart, Secure, Yet Energy-Efficient, Internet-of-Things Sensors , 2018, IEEE Transactions on Multi-Scale Computing Systems.
[56] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[57] Riccardo Bettati,et al. Securing cyber-physical systems with adaptive commensurate response , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[58] Kaushik Yanamandra,et al. Reverse engineering of additive manufactured composite part by toolpath reconstruction using imaging and machine learning , 2020, Composites Science and Technology.
[59] Zhengyi Song,et al. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example , 2017 .
[60] Anthony Skjellum,et al. Using 3D printers as weapons , 2016, Int. J. Crit. Infrastructure Prot..
[61] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[62] Young B. Moon,et al. Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions , 2020, J. Comput. Inf. Sci. Eng..
[63] Jaime A. Camelio,et al. Cyber-physical Vulnerability Assessment in Manufacturing Systems , 2016 .
[64] Can Saygin,et al. A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems , 2018 .
[65] Sara J. Graves,et al. Cyber Security for Additive Manufacturing , 2015, CISR.
[66] Kim-Kwang Raymond Choo,et al. Identifying 3D printer residual data via open-source documentation , 2018, Comput. Secur..
[67] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[68] Can Saygin,et al. Cybersecurity Analysis of Smart Manufacturing System Using Game Theory Approach and Quantal Response Equilibrium , 2018 .
[69] Stephen Hailes,et al. Security of smart manufacturing systems , 2018 .
[70] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[71] Mariano Jiménez,et al. Additive Manufacturing Technologies: An Overview about 3D Printing Methods and Future Prospects , 2019, Complex..
[72] R. Komanduri,et al. Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process , 2014 .
[73] Yuval Elovici,et al. dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.
[74] Sujit Rokka Chhetri,et al. Sabotage Attack Detection for Additive Manufacturing Systems , 2020, IEEE Access.
[75] Hoda Ghadeer,et al. Cybersecurity Issues in Internet of Things and Countermeasures , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).
[76] Yunhao Liu,et al. Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud , 2019, MobiSys.
[77] Zhengyi Song,et al. Establishment of intrusion detection testbed for CyberManufacturing systems , 2018 .
[78] Fei Chen,et al. Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication , 2019, Advanced engineering materials.
[79] Mikhail J. Atallah,et al. Security in Cyber-Enabled Design and Manufacturing: A Survey , 2018, J. Comput. Inf. Sci. Eng..
[80] Prahalada Rao,et al. Thermal Modeling in Metal Additive Manufacturing Using Graph Theory , 2019, Journal of Manufacturing Science and Engineering.
[81] K. Xiao,et al. Hardware Trojans , 2016, ACM Trans. Design Autom. Electr. Syst..
[82] Swaroop Ghosh,et al. How Secure Are Printed Circuit Boards Against Trojan Attacks? , 2015, IEEE Design & Test.
[83] chao wei,et al. Embedding anti-counterfeiting features in metallic components via multiple material additive manufacturing , 2018, Additive Manufacturing.
[84] Marco Fey,et al. 3D printing and international security: risks and challenges of an emerging technology , 2017 .
[85] Arquimedes Canedo,et al. Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems , 2017, ACM Trans. Cyber Phys. Syst..
[86] Panganamala Ramana Kumar,et al. On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).
[87] Arquimedes Canedo,et al. Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[88] William Bradley Glisson,et al. Implications of Malicious 3D Printer Firmware , 2017, HICSS.
[89] Ashutosh Tiwari,et al. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[90] Yuval Elovici,et al. Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing , 2017, ArXiv.
[91] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[92] Ramesh Karri,et al. Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks , 2020, IEEE Access.
[93] D. Roller,et al. Additive Manufacturing , Cloud-Based 3 D Printing and Associated Services — Overview , 2017 .
[94] Jaime A. Camelio,et al. Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .
[95] Christian Kreiner,et al. Integrated design for tackling safety and security challenges of smart products and digital manufacturing , 2017 .
[96] Saurabh Sinha,et al. A Review of Industry 4.0 Manufacturing Process Security Risks , 2019, Applied Sciences.
[97] Jaime A. Camelio,et al. Cyber-Physical Security Research Efforts in Manufacturing – A Literature Review , 2019, Procedia Manufacturing.
[98] Joshua Lubell,et al. Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives , 2019, IEEE Access.
[99] Thomas A. Campbell,et al. Unclonable security features for additive manufacturing , 2014 .
[100] Satish T. S. Bukkapatnam,et al. The internet of things for smart manufacturing: A review , 2019, IISE Trans..
[101] Jules White,et al. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .
[102] Jaime A. Camelio,et al. A cyber-physical attack taxonomy for production systems: a quality control perspective , 2019, J. Intell. Manuf..
[103] Yuval Elovici,et al. Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing , 2017, ArXiv.
[104] Xing Liu,et al. Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities , 2019, IEEE Access.
[105] Dazhong Wu,et al. Cyber security in smart manufacturing: Survey and challenges , 2017 .
[106] Sujit Rokka Chhetri,et al. Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing , 2018, IEEE Transactions on Information Forensics and Security.
[107] Dazhong Wu,et al. Cybersecurity for digital manufacturing , 2018, Journal of Manufacturing Systems.
[108] Nektarios Georgios Tsoutsos,et al. INVITED: ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[109] Satish T. S. Bukkapatnam,et al. Machine learning and AI for long-term fault prognosis in complex manufacturing systems , 2019, CIRP Annals.
[110] Satish T. S. Bukkapatnam,et al. Model-Based Tampering for Improved Process Performance—An Application to Grinding of Shafts , 2003 .
[111] Todd R. Andel,et al. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.
[112] Young B. Moon,et al. Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.