PrinTracker: Fingerprinting 3D Printers using Commodity Scanners
暂无分享,去创建一个
Zhengxiong Li | Aditya Singh Rathore | Wenyao Xu | Yanzhi Wang | Chen Song | Sheng Wei | Chen Song | Wenyao Xu | Yanzhi Wang | Sheng Wei | Zhengxiong Li
[1] Zhi-Li Zhang,et al. Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Aditya Singh Rathore,et al. 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers , 2017, ASPLOS.
[3] Daisuke Suzuki,et al. The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes , 2010, CHES.
[4] E. G. van Putten,et al. Recognition of paper samples by correlation of their speckle patterns , 2006 .
[5] Nikita Borisov,et al. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.
[6] Mohan S. Kankanhalli,et al. Print signatures for document authentication , 2003, CCS '03.
[7] Song Li,et al. (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.
[8] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[9] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[10] Benoit M. Macq,et al. From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: A Survey , 2007, Trans. Data Hiding Multim. Secur..
[11] D. Adjekum. Bio-Fuel Alternatives in South African Airways (SAA) Operations - Is it an Effective Response to Vulnerability over Carbon Taxes and Penalty? , 2015, International Journal of Aviation, Aeronautics, and Aerospace.
[13] Marten van Dijk,et al. A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).
[14] Ying Su,et al. A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process Variations , 2007, 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.
[15] Zeno Geradts,et al. Methods for identification of images acquired with digital cameras , 2001, SPIE Optics East.
[16] Julian S. Hatcher. Firearms Investigation Identification and Evidence , 2006 .
[17] Feng Hao,et al. Texture to the Rescue , 2017, ACM Trans. Priv. Secur..
[18] Morten Wang Fagerland,et al. The McNemar test for binary matched-pairs data: mid-p and asymptotic are better than exact conditional , 2013, BMC Medical Research Methodology.
[19] Z. Kennedy,et al. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology , 2017 .
[20] Nasir D. Memon,et al. Classification of digital camera-models based on demosaicing artifacts , 2008, Digit. Investig..
[21] Gabi Nakibly,et al. Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.
[22] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[23] Markus H. Gross,et al. The magic lens , 2012, ACM Trans. Graph..
[24] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[25] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[26] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[27] Adam Finkelstein,et al. Fingerprinting Blank Paper Using Commodity Scanners , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[28] Danton Bryans. Unlocked and loaded: government censorship of 3D-printed firearms and a proposal for more reasonable regulation of 3D-printed goods , 2015 .
[29] Xiangyu Liu,et al. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound , 2014, CCS.
[30] Kang G. Shin,et al. Viden: Attacker Identification on In-Vehicle Networks , 2017, CCS.
[31] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[32] Gerald Walther. Printing Insecurity? The Security Implications of 3D-Printing of Weapons , 2015, Sci. Eng. Ethics.
[33] Todd R. Andel,et al. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.
[34] Mikhail J. Atallah,et al. Microstructure-Based Counterfeit Detection in Metal Part Manufacturing , 2017 .
[35] Wan-Chi Siu,et al. A two dimensional camera identification method based on image sensor noise , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[36] Zhengxiong Li,et al. My Smartphone Recognizes Genuine QR Codes! , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[37] Steven M. Bellovin,et al. A Privacy Analysis of Cross-device Tracking , 2017, USENIX Security Symposium.
[38] A. K. Karunakar,et al. Digital camera identification using PRNU: A feature based approach , 2016, Digit. Investig..
[39] Helena Handschuh,et al. Hardware intrinsic security from D flip-flops , 2010, STC '10.
[40] Hon J. Yu,et al. Quantitative analysis of lesion morphology and texture features for diagnostic prediction in breast MRI. , 2008, Academic radiology.
[41] Hemant Sengar. VoIP Fraud: Identifying a Wolf in Sheep's Clothing , 2014, CCS.
[42] Gang Xiong,et al. Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.
[43] Yang Gao,et al. Watching and Safeguarding Your 3D Printer , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[44] Davis Doherty. Downloading Infringement: Patent Law as a Roadblock to the 3D Printing Revolution , 2012 .
[45] Benoit M. Macq,et al. Applicability of watermarking for intellectual property rights protection in a 3D printing scenario , 2015, Web3D.
[46] Ansel C. Ugural,et al. Mechanical Design: An Integrated Approach , 2003 .
[47] Saman A. Zonouz,et al. See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing , 2017, USENIX Security Symposium.
[48] Alaa Eleyan,et al. Co-occurrence matrix and its statistical features as a new approach for face recognition , 2011, Turkish Journal of Electrical Engineering and Computer Sciences.
[49] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[50] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[51] Xiaofeng Yang,et al. Ultrasound GLCM texture analysis of radiation-induced parotid-gland injury in head-and-neck cancer radiotherapy: an in vivo study of late toxicity. , 2012, Medical physics.
[52] Soweon Yoon,et al. Fingerprint recognition: Models and applications , 2014 .
[53] Mauro Barni,et al. Wavelet-based blind watermarking of 3D models , 2004, MM&Sec '04.
[54] Sviatoslav Voloshynovskiy,et al. SketchPrint: Physical object micro-structure identification using mobile phones , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).
[55] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[56] Jasper L. Tran. The Law and 3D Printing , 2015 .
[57] Wenyao Xu,et al. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.
[58] Joshua R. Smith,et al. FiberFingerprint Identification , 2002 .
[59] Jan P. Allebach,et al. Survey of Scanner and Printer Forensics at Purdue University , 2008, IWCF.
[60] Yan Dong. Analysis of the driving force by friction in a driving structure of FDM , 2003 .
[61] Chang-Tsun Li,et al. Source Camera Identification Using Enhanced Sensor Pattern Noise , 2009, IEEE Transactions on Information Forensics and Security.
[62] C. H. Chen,et al. Handbook of Pattern Recognition and Computer Vision , 1993 .
[63] David D. Hernandez,et al. Factors Affecting Dimensional Precision of Consumer 3D Printing , 2015 .
[64] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[65] Richard Szeliski,et al. Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.
[66] Abdulmotaleb El-Saddik,et al. From 3D Sensing to Printing , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[67] Ki-Ryong Kwon,et al. 3D polygonal meshes watermarking using normal vector distributions , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[68] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[69] Ingrid Verbauwhede,et al. Physically unclonable functions: manufacturing variability as an unclonable device identifier , 2011, GLSVLSI '11.
[71] Jan P. Allebach,et al. Printer Forensics Using SVM Techniques , 2005, NIP & Digital Fabrication Conference.
[72] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[73] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[74] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[75] Oliver Benedens,et al. Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.
[76] Herbert Wittel,et al. Roloff/Matek Maschinenelemente , 1994 .
[77] Leonie Moench,et al. Introduction To Polymers , 2016 .
[78] Sviatoslav Voloshynovskiy,et al. Physical object identification based on FAMOS microstructure fingerprinting: Comparison of templates versus invariant features , 2013, 2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA).
[79] Lakshminarayanan Subramanian,et al. PaperSpeckle: microscopic fingerprinting of paper , 2011, CCS '11.