2018
DOI: 10.1016/j.addma.2018.03.015
|View full text |Cite
|
Sign up to set email alerts
|

Security of additive manufacturing: Attack taxonomy and survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
59
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 93 publications
(59 citation statements)
references
References 43 publications
0
59
0
Order By: Relevance
“…This form of protection is commonly cited as an advantage of modularization (Sanchez and Mahoney, 1996;Baldwin and Henkel, 2015). Going forward, this concern may necessitate suitable technological solutions offering encryption and verification functionalities (Engelmann et al, 2018;Yampolskiy et al, 2018).…”
Section: Limitations and Future Researchmentioning
confidence: 99%
“…This form of protection is commonly cited as an advantage of modularization (Sanchez and Mahoney, 1996;Baldwin and Henkel, 2015). Going forward, this concern may necessitate suitable technological solutions offering encryption and verification functionalities (Engelmann et al, 2018;Yampolskiy et al, 2018).…”
Section: Limitations and Future Researchmentioning
confidence: 99%
“…For this paper, only sabotage attacks and related literature are of relevance. It should be noted that, by the end of 2017, no publications have addressed security of composite materials [34].…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, the digital files are inserted in a 3D printer and the outcome is not dependent on the skill of a person, which is a major advantage for AM methods. However, such simplicity of the manufacturing step presents many security concerns in the AM process chain . It is a possibility that stolen CAD files can be used to print a component of exactly the same quality and functionality as the original component .…”
Section: Introductionmentioning
confidence: 99%