{"id":"https://openalex.org/W3208251042","doi":"https://doi.org/10.1145/3462223.3485618","title":"Myths and Misconceptions in Additive Manufacturing Security","display_name":"Myths and Misconceptions in Additive Manufacturing Security","publication_year":2021,"publication_date":"2021-10-28","ids":{"openalex":"https://openalex.org/W3208251042","doi":"https://doi.org/10.1145/3462223.3485618","mag":"3208251042"},"language":"en","primary_location":{"id":"doi:10.1145/3462223.3485618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3462223.3485618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3462223.3485618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3462223.3485618","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089993459","display_name":"Mark Yampolskiy","orcid":"https://orcid.org/0000-0003-4626-2754"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mark Yampolskiy","raw_affiliation_strings":["Auburn University, Auburn, AL, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031179663","display_name":"Jacob Gatlin","orcid":"https://orcid.org/0000-0001-9885-5696"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacob Gatlin","raw_affiliation_strings":["Auburn University, Auburn, AL, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]},{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google LLC &amp; Columbia University, New York City, NY, USA"],"affiliations":[{"raw_affiliation_string":"Google LLC &amp; Columbia University, New York City, NY, USA","institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089993459"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":1.6401,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.83583012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10783","display_name":"Additive Manufacturing and 3D Printing Technologies","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9280999898910522,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/triad","display_name":"Triad (sociology)","score":0.6973259449005127},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6971596479415894},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6628418564796448},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5544379353523254},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.46396979689598083},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4404018223285675},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.43424737453460693},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42953428626060486},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3622134327888489},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3577594757080078},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08885502815246582}],"concepts":[{"id":"https://openalex.org/C176038584","wikidata":"https://www.wikidata.org/wiki/Q626432","display_name":"Triad (sociology)","level":2,"score":0.6973259449005127},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6971596479415894},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6628418564796448},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5544379353523254},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.46396979689598083},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4404018223285675},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.43424737453460693},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42953428626060486},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3622134327888489},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3577594757080078},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08885502815246582},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3462223.3485618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3462223.3485618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3462223.3485618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3462223.3485618","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3462223.3485618","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3462223.3485618","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7302134844","display_name":null,"funder_award_id":"70NANB20H193","funder_id":"https://openalex.org/F4320332178","funder_display_name":"National Institute of Standards and Technology"}],"funders":[{"id":"https://openalex.org/F4320306111","display_name":"U.S. Department of Commerce","ror":"https://ror.org/04chq2495"},{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3208251042.pdf","grobid_xml":"https://content.openalex.org/works/W3208251042.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W121865847","https://openalex.org/W1740146815","https://openalex.org/W2044938352","https://openalex.org/W2061768597","https://openalex.org/W2169239645","https://openalex.org/W2270997427","https://openalex.org/W2351765604","https://openalex.org/W2418806285","https://openalex.org/W2474167986","https://openalex.org/W2522987309","https://openalex.org/W2529473720","https://openalex.org/W2548620338","https://openalex.org/W2587059979","https://openalex.org/W2599858443","https://openalex.org/W2744921369","https://openalex.org/W2746990014","https://openalex.org/W2768758414","https://openalex.org/W2789938417","https://openalex.org/W2792761021","https://openalex.org/W2794189444","https://openalex.org/W2795186263","https://openalex.org/W2804092193","https://openalex.org/W2891297337","https://openalex.org/W2911861386","https://openalex.org/W2913707927","https://openalex.org/W2966459861","https://openalex.org/W3005321820","https://openalex.org/W3170369598","https://openalex.org/W3205548033","https://openalex.org/W4230182858","https://openalex.org/W4239950471","https://openalex.org/W4241915324","https://openalex.org/W4289038676","https://openalex.org/W4292158413","https://openalex.org/W4295093682","https://openalex.org/W4387554202","https://openalex.org/W6720894895"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2705349940"],"abstract_inverted_index":{"It":[0],"is":[1,48,85,89],"natural,":[2],"as":[3],"the":[4,49,52,72],"demand":[5],"for":[6,51],"Additive":[7],"Manufacturing":[8],"(AM)":[9],"Security":[10],"grows,":[11],"to":[12],"adopt":[13],"established":[14,81,108],"approaches":[15],"from":[16],"other":[17],"security":[18,41],"research":[19],"areas.":[20],"However,":[21],"such":[22],"\"imports,''":[23],"if":[24],"not":[25,90],"done":[26],"carefully,":[27],"can":[28],"be":[29],"misleading,":[30],"and":[31,35,101,118],"sometimes":[32],"even":[33],"counterproductive,":[34],"thus":[36],"may":[37],"negatively":[38],"affect":[39],"actual":[40],"of":[42,61],"AM.":[43,83],"We":[44],"argue":[45],"that":[46,71],"this":[47,65,111],"case":[50],"CIA":[53,73],"triad":[54,74],"(Confidentiality,":[55],"Integrity,":[56],"Availability),":[57],"a":[58],"fundamental":[59],"model":[60],"data":[62,99,103],"security.":[63],"To":[64],"end,":[66],"we":[67],"present":[68],"arguments":[69],"showing":[70],"cannot":[75],"substitute":[76],"concrete":[77],"threat":[78],"categories":[79],"already":[80],"in":[82,110],"AM":[84],"an":[86,95],"area":[87,96],"which":[88],"\"pure":[91],"data,\"":[92],"but":[93],"rather":[94],"involving":[97],"software,":[98],"files,":[100],"transforming":[102],"into":[104],"physical":[105],"artifacts,":[106],"where":[107],"threats":[109],"ecosystem":[112],"include:":[113],"Technical":[114],"Data":[115],"Theft,":[116],"Sabotage,":[117],"Illegal":[119],"Part":[120],"Manufacturing.":[121]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
