Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security最新文献

筛选
英文 中文
Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective 似曾相识?从ICS的角度看AM安全的挑战和机遇
N. Tippenhauer
{"title":"Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective","authors":"N. Tippenhauer","doi":"10.1145/3560833.3563556","DOIUrl":"https://doi.org/10.1145/3560833.3563556","url":null,"abstract":"Security challenges for Cyber-Physical Systems such as general Industrial Control Systems (ICS) have receive increasing attention from researchers in the last decade. Despite the significant challenges in the intersection of Cybersecurity and Engineering fields, cross-discipline research efforts on ICS security research resulted in a number of promising research directions. In this talk, I will discuss how those general directions relate to Additive Manufacturing security -- in particular, where I see unique opportunities in AM to address problems that are hard in general ICS.","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spooky Manufacturing: Probabilistic Sabotage Attack in Metal AM using Shielding Gas Flow Control 幽灵制造:使用保护气体流量控制的金属AM的概率破坏攻击
Theo Zinner, Grant Parker, N. Shamsaei, Wayne E. King, M. Yampolskiy
{"title":"Spooky Manufacturing: Probabilistic Sabotage Attack in Metal AM using Shielding Gas Flow Control","authors":"Theo Zinner, Grant Parker, N. Shamsaei, Wayne E. King, M. Yampolskiy","doi":"10.1145/3560833.3563565","DOIUrl":"https://doi.org/10.1145/3560833.3563565","url":null,"abstract":"Metal Additive Manufacturing (AM) is increasingly utilized for functional parts, often used in safety-critical applications such as jet engine components. For these applications, it is imperative that the fit, form, and function are not compromised. However, it has been shown that numerous intentional sabotage attacks are pos- sible. Understanding how sabotage attacks can be conducted is a prerequisite for their prevention and detection. This work focuses on Laser Beam Powder Bed Fusion (LB-PBF), an AM machine type dominant in the manufacturing of net-shape metal parts, and its subsystem controlling the shielding gas flow. We analyze how this essential subsystem can be manipulated to sabotage AM part performance. Our analysis shows that such sabo- tage attacks will be probabilistic, as opposed to the deterministic attacks previously discussed in the research literature. While this introduces issues with performance degradation and control over it, it is likely to also complicate the determination of intent and investigation of its root cause.","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131714167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models 基于概率模型的大噪声多材料3D打印机数据集的隐身网络异常检测
Srikanth B. Yoginath, Michael D. Iannacone, Varisara Tansakul, A. Passian, Rob Jordan, Joel Asiamah, M. Ericson, G. Long, Joel A. Dawson
{"title":"Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models","authors":"Srikanth B. Yoginath, Michael D. Iannacone, Varisara Tansakul, A. Passian, Rob Jordan, Joel Asiamah, M. Ericson, G. Long, Joel A. Dawson","doi":"10.1145/3560833.3563564","DOIUrl":"https://doi.org/10.1145/3560833.3563564","url":null,"abstract":"As Additive Layer Manufacturing (ALM) becomes pervasive in industry, its applications in safety critical component manufacturing are being explored and adopted. However, ALM's reliance on embedded computing renders it vulnerable to tampering through cyber-attacks. Sensor instrumentation of ALM devices allows for rigorous process and security monitoring, but also results in a massive volume of noisy data for each run. As such, in-situ, near-real-time anomaly detection is very challenging. The ideal algorithm for this context is simple, computationally efficient, minimizes false positives, and is accurate enough to resolve small deviations. In this paper, we present a probabilistic-model-based approach to address this challenge. To test our approach, we analyze current measurements from a polymer composite 3D printer during emulated tampering attacks. Our results show that our approach can consistently and efficiently locate small changes in the presence of substantial operational noise.","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Based Security Analysis in Additive Manufacturing Systems 基于模型的增材制造系统安全性分析
Michael Durling, A. Moitra, Kit Siu, B. Meng, John Carbone, Christopher C. Alexander, K. Castillo-Villar, Gabriela F. Cretu-Ciocarlie
{"title":"Model-Based Security Analysis in Additive Manufacturing Systems","authors":"Michael Durling, A. Moitra, Kit Siu, B. Meng, John Carbone, Christopher C. Alexander, K. Castillo-Villar, Gabriela F. Cretu-Ciocarlie","doi":"10.1145/3560833.3563566","DOIUrl":"https://doi.org/10.1145/3560833.3563566","url":null,"abstract":"Additive manufacturing (AM) is expected to revolutionize industrial manufacturing processes by providing access to readily available, lower cost, high-performance parts, including those with complex designs and diverse materials, not attainable in conventional subtractive machining processes. These benefits are distinctly advantageous for low-volume rapid prototyping. They also reduce the build time of complex, safety-critical components that traditionally require assembly. The advanced product capabilities of AM also make these systems high risk for intellectual property theft, service outage attacks, and sabotage through compromised product quality. Concerns about malicious actors restrict business models and deter industry adoption and investment, especially those requiring secrecy around safety-critical components. In this paper, we analyze the threats to additive manufacturing system security using the Verification Evidence and Resilient Design in Anticipation of Cybersecurity Threats (VERDICT) tool, a model-based system engineering (MBSE) tool. First, we introduce a comprehensive set of attributes to characterize MBSE tools together with a survey of MBSE tools that support cyber analysis. Based on these attributes and the available tools, we select the relevant tool (i.e., VERDICT) and apply it to an example additive manufacturing system. The modeling and analysis are intended to show the functionality of the VERDICT tool in a research context. The signals, properties, and requirements enable the user to experiment with and illustrate the functionality of the tool. Finally, the paper introduces a novel approach for modeling the return on investment (ROI) for additive hardware cybersecurity investments that will lead to a cost-analysis integration with the VERDICT tool.","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122958357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security 2022年ACM CCS增材制造(3D打印)安全研讨会论文集
{"title":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","authors":"","doi":"10.1145/3560833","DOIUrl":"https://doi.org/10.1145/3560833","url":null,"abstract":"","PeriodicalId":417037,"journal":{"name":"Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信