关注
Jacob Gatlin
Jacob Gatlin
Ph.D. Student, Auburn University
在 auburn.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
dr0wned–{Cyber-Physical} attack with additive manufacturing
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
11th USENIX workshop on offensive technologies (WOOT 17), 2017
1712017
Security of additive manufacturing: Attack taxonomy and survey
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ...
Additive Manufacturing 21, 431-457, 2018
1672018
Detecting sabotage attacks in additive manufacturing using actuator power signatures
J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy
IEEE Access 7, 133421-133432, 2019
72*2019
Legal aspects of protecting intellectual property in additive manufacturing
A Brown, M Yampolskiy, J Gatlin, T Andel
Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016
302016
Encryption is futile: Reconstructing 3d-printed models using the power side-channel
J Gatlin, S Belikovetsky, Y Elovici, A Skjellum, J Lubell, P Witherell, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
232021
Optimal sabotage attack on composite material parts
B Ranabhat, J Clements, J Gatlin, KT Hsiao, M Yampolskiy
International Journal of Critical Infrastructure Protection 26, 100301, 2019
232019
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad
M Yampolskiy, J Gatlin, M Yung
Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing …, 2021
132021
What did you add to my additive manufacturing data?: steganographic attacks on 3D printing files
M Yampolskiy, L Graves, J Gatlin, A Skjellum, M Yung
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
132021
Investigating 3d printer residual data
DB Miller, J Gatlin, WB Glisson, M Yampolskiy, JT McDonald
arXiv preprint arXiv:1901.07507, 2019
102019
Buffer overflow attack's power consumption signatures
S Moore, M Yampolskiy, J Gatlin, JT McDonald, TR Andel
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
82016
Security of additive manufacturing: Attack taxonomy and survey. Addit Manuf 2018; 21: 431–57
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum
6
Crypto-steganographic validity for additive manufacturing (3D printing) design files
M Yampolskiy, L Graves, J Gatlin, JT McDonald, M Yung
International Conference on Information Security, 40-52, 2022
32022
Security Threats in AM
M Yampolskiy, J Gatlin
Springer Handbook of Additive Manufacturing, 303-315, 2023
2023
Data Security in Additive Manufacturing
M Yampolskiy, J Gatlin
Additive Manufacturing Design and Applications, 203-209, 2023
2023
Use and Misuse of the Power Side Channel in Additive Manufacturing Security
J Gatlin
2023
系统目前无法执行此操作,请稍后再试。
文章 1–15