Skip to main content

Showing 1–12 of 12 results for author: Yampolskiy, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05106  [pdf, other

    cs.CR

    Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files

    Authors: Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung

    Abstract: The increased adoption of additive manufacturing (AM) and the acceptance of AM outsourcing created an ecosystem in which the sending and receiving of digital designs by different actors became normal. It has recently been shown that the STL design files -- most commonly used in AM -- contain steganographic channels. Such channels can allow additional data to be embedded within the STL files withou… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: CODASPY'24

  2. arXiv:2311.03809  [pdf, other

    cs.CR

    SoK: Security Below the OS -- A Security Analysis of UEFI

    Authors: Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai

    Abstract: The Unified Extensible Firmware Interface (UEFI) is a linchpin of modern computing systems, governing secure system initialization and booting. This paper is urgently needed because of the surge in UEFI-related attacks and vulnerabilities in recent years. Motivated by this urgent concern, we undertake an extensive exploration of the UEFI landscape, dissecting its distribution supply chain, booting… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  3. Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives

    Authors: Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy

    Abstract: The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

    Submitted 2 June, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: \textcopyright 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  4. arXiv:2209.03073  [pdf

    cs.CR

    State of Security Awareness in the AM Industry: 2020 Survey

    Authors: Mark Yampolskiy, Paul Bates, Mohsen Seifi, Nima Shamsaei

    Abstract: Security of Additive Manufacturing (AM) gets increased attention due to the growing proliferation and adoption of AM in a variety of applications and business models. However, there is a significant disconnect between AM community focused on manufacturing and AM Security community focused on securing this highly computerized manufacturing technology. To bridge this gap, we surveyed the America Mak… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: The material was presented at ASTM ICAM 2021 and a publication was accepted for publication as a Selected Technical Papers (STP)

  5. arXiv:1901.07507  [pdf

    cs.CR

    Investigating 3D Printer Residual Data

    Authors: Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald

    Abstract: The continued adoption of Additive Manufacturing technologies is raising concerns in the security, forensics, and intelligence gathering communities. These concerns range from identifying and mitigating compromised devices, to theft of intellectual property, to sabotage, to the production of prohibited objects. Previous research has provided insight into the retrieval of configuration information… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

    Comments: Presented at the 52nd Hawaii International Conference on System Sciences. Jan 8-11, 2019. Wailea, HI, USA. 10 pages, 3 figures. Persistent link https://hdl.handle.net/10125/60154

  6. arXiv:1810.03010  [pdf, other

    cs.CR

    Optimal Sabotage Attack on Composite Material Parts

    Authors: Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy

    Abstract: Industry 4.0 envisions a fully automated manufacturing environment, in which computerized manufacturing equipment--Cyber-Physical Systems (CPS)--performs all tasks. These machines are open to a variety of cyber and cyber-physical attacks, including sabotage. In the manufacturing context, sabotage attacks aim to damage equipment or degrade a manufactured part's mechanical properties. In this paper,… ▽ More

    Submitted 6 October, 2018; originally announced October 2018.

  7. arXiv:1709.01822  [pdf, other

    cs.CR

    Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing

    Authors: Samuel B. Moore, Jacob Gatlin, Sofia Belikovetsky, Mark Yampolskiy, Wayne E. King, Yuval Elovici

    Abstract: Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputatio… ▽ More

    Submitted 6 September, 2017; originally announced September 2017.

    Comments: Accepted as poster at RAID 2017

  8. arXiv:1706.00497  [pdf

    cs.CY

    A Hazard Analysis Technique for Additive Manufacturing

    Authors: Gregory Pope, Mark Yampolskiy

    Abstract: The promise of Additive Manufacturing (AM) includes reduced transportation and warehousing costs, reduction of source material waste, and reduced environmental impact. AM is extremely useful for making prototypes and has demonstrated the ability to manufacture complex parts not possible (or prohibitively expensive) with conventional machining. Scientists and manufactures are finding increased uses… ▽ More

    Submitted 29 May, 2017; originally announced June 2017.

    Comments: Better Software East Conference, 2016

  9. arXiv:1705.06454  [pdf, other

    cs.CR

    Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing

    Authors: Sofia Belikovetsky, Yosef Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici

    Abstract: Additive Manufacturing (AM, or 3D printing) is a novel manufacturing technology that is being adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper we address sabotage via tampering with the 3D printing process. We present an object verification system using side-channel emanations: sound generat… ▽ More

    Submitted 18 May, 2017; originally announced May 2017.

  10. arXiv:1609.00133  [pdf

    cs.CR

    dr0wned - Cyber-Physical Attack with Additive Manufacturing

    Authors: Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Yuval Elovici

    Abstract: Additive manufacturing (AM), or 3D printing, is an emerging manufacturing technology that is expected to have far-reaching socioeconomic, environmental, and geopolitical implications. As use of this technology increases, it will become more common to produce functional parts, including components for safety-critical systems. AM's dependence on computerization raises the concern that the manufactur… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  11. arXiv:1602.07536  [pdf

    cs.CR

    Towards Security of Additive Layer Manufacturing

    Authors: Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, Alec Yasinsac

    Abstract: Additive Layer Manufacturing (ALM), also broadly known as 3D printing, is a new technology to produce 3D objects. As an opposite approach to the conventional subtractive manufacturing process, 3D objects are created by adding thin material layers over layers. Until recently, they have been used, mainly, for plastic models. However, the technology has evolved making it possible to use high-quality… ▽ More

    Submitted 13 January, 2015; originally announced February 2016.

  12. Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network

    Authors: Patricia Marcu, David Schmitz, Wolfgang Fritz, Mark Yampolskiy, Wolfgang Hommel

    Abstract: Novel large scale research projects often require cooperation between various different project partners that are spread among the entire world. They do not only need huge computing resources, but also a reliable network to operate on. The Large Hadron Collider (LHC) at CERN is a representative example for such a project. Its experiments result in a vast amount of data, which is interesting for re… ▽ More

    Submitted 20 January, 2011; originally announced January 2011.

    Comments: International Journal of Computer Networks & Communications (IJCNC)

    Journal ref: Intl.J.Comput.Net.Commun.3:82-99,2011