dr0wned - Cyber-Physical Attack with Additive Manufacturing S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici 11th USENIX Workshop on Offensive Technologies (WOOT 17), 0 | 168* | |
Security of additive manufacturing: Attack taxonomy and survey M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ... Additive Manufacturing 21, 431-457, 2018 | 167 | 2018 |
Digital audio signature for 3D printing integrity S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici ieee transactions on information forensics and security 14 (5), 1127-1141, 2018 | 103* | 2018 |
Detecting sabotage attacks in additive manufacturing using actuator power signatures J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy IEEE Access 7, 133421-133432, 2019 | 44 | 2019 |
Evaluation of additive and subtractive manufacturing from the security perspective M Yampolskiy, W King, G Pope, S Belikovetsky, Y Elovici Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International …, 2017 | 33 | 2017 |
Power consumption-based detection of sabotage attacks in additive manufacturing SB Moore, J Gatlin, S Belikovetsky, M Yampolskiy, WE King, Y Elovici arXiv preprint arXiv:1709.01822, 2017 | 31 | 2017 |
Encryption is futile: Reconstructing 3d-printed models using the power side-channel J Gatlin, S Belikovetsky, Y Elovici, A Skjellum, J Lubell, P Witherell, ... Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 22 | 2021 |
Load rebalancing games in dynamic systems with migration costs S Belikovetsky, T Tamir Theoretical Computer Science 622, 16-33, 2016 | 7 | 2016 |
Security of additive manufacturing: Attack taxonomy and survey. Addit Manuf 2018; 21: 431–57 M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum | 6 | |
3D marketplace: Distributed attestation of 3D designs on blockchain S Belikovetsky, O Leiba, A Shabtai, Y Elovici arXiv preprint arXiv:1908.06921, 2019 | 3 | 2019 |
Liability exposure when 3D-printed parts fall from the sky L Graves, M Yampolskiy, W King, S Belikovetsky, Y Elovici Critical Infrastructure Protection XII: 12th IFIP WG 11.10 International …, 2018 | 2 | 2018 |
SocIoTy: Practical Cryptography in Smart Home Contexts TM Jois, G Beck, S Belikovetsky, J Carrigan, A Chator, L Kostick, M Zinkus, ... Proceedings on Privacy Enhancing Technologies, 2024 | | 2024 |
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain N Tapas, S Belikovetsky, F Longo, A Puliafito, A Shabtai, Y Elovici 2022 IEEE International Conference on Smart Computing (SMARTCOMP), 311-316, 2022 | | 2022 |
Twelfth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection K Hemsley, R Fisher, L Graves, M Yampolskiy, W King, S Belikovetsky, ... | | 2018 |
Using Behavior Monitoring to Identify Privacy Concerns in Smarthome Environments A Almogbil, M Steele, S Belikovetsky, A Inam, O Wu, A Rubin, A Bates | | |
dr0wned S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici | | |
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.................. S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ... | | |
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels.... VYF Tan and S.-H. Lee 1377 S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ... | | |