dr0wned–{Cyber-Physical} attack with additive manufacturing S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 171 | 2017 |
Security of additive manufacturing: Attack taxonomy and survey M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ... Additive Manufacturing 21, 431-457, 2018 | 167 | 2018 |
Detecting sabotage attacks in additive manufacturing using actuator power signatures J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy IEEE Access 7, 133421-133432, 2019 | 72* | 2019 |
Legal aspects of protecting intellectual property in additive manufacturing A Brown, M Yampolskiy, J Gatlin, T Andel Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016 | 30 | 2016 |
Encryption is futile: Reconstructing 3d-printed models using the power side-channel J Gatlin, S Belikovetsky, Y Elovici, A Skjellum, J Lubell, P Witherell, ... Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 23 | 2021 |
Optimal sabotage attack on composite material parts B Ranabhat, J Clements, J Gatlin, KT Hsiao, M Yampolskiy International Journal of Critical Infrastructure Protection 26, 100301, 2019 | 23 | 2019 |
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad M Yampolskiy, J Gatlin, M Yung Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing …, 2021 | 13 | 2021 |
What did you add to my additive manufacturing data?: steganographic attacks on 3D printing files M Yampolskiy, L Graves, J Gatlin, A Skjellum, M Yung Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 13 | 2021 |
Investigating 3d printer residual data DB Miller, J Gatlin, WB Glisson, M Yampolskiy, JT McDonald arXiv preprint arXiv:1901.07507, 2019 | 10 | 2019 |
Buffer overflow attack's power consumption signatures S Moore, M Yampolskiy, J Gatlin, JT McDonald, TR Andel Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 8 | 2016 |
Security of additive manufacturing: Attack taxonomy and survey. Addit Manuf 2018; 21: 431–57 M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum | 6 | |
Crypto-steganographic validity for additive manufacturing (3D printing) design files M Yampolskiy, L Graves, J Gatlin, JT McDonald, M Yung International Conference on Information Security, 40-52, 2022 | 3 | 2022 |
Security Threats in AM M Yampolskiy, J Gatlin Springer Handbook of Additive Manufacturing, 303-315, 2023 | | 2023 |
Data Security in Additive Manufacturing M Yampolskiy, J Gatlin Additive Manufacturing Design and Applications, 203-209, 2023 | | 2023 |
Use and Misuse of the Power Side Channel in Additive Manufacturing Security J Gatlin | | 2023 |