{"id":"https://openalex.org/W3207941521","doi":"https://doi.org/10.1145/3471621.3471843","title":"What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files","display_name":"What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files","publication_year":2021,"publication_date":"2021-10-06","ids":{"openalex":"https://openalex.org/W3207941521","doi":"https://doi.org/10.1145/3471621.3471843","mag":"3207941521"},"language":"en","primary_location":{"id":"doi:10.1145/3471621.3471843","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3471621.3471843","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3471621.3471843","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"24th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3471621.3471843","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089993459","display_name":"Mark Yampolskiy","orcid":"https://orcid.org/0000-0003-4626-2754"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mark Yampolskiy","raw_affiliation_strings":["Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089046425","display_name":"Lynne Graves","orcid":"https://orcid.org/0000-0002-0879-5114"},"institutions":[{"id":"https://openalex.org/I83809506","display_name":"University of South Alabama","ror":"https://ror.org/01s7b5y08","country_code":"US","type":"education","lineage":["https://openalex.org/I83809506"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lynne Graves","raw_affiliation_strings":["University of South Alabama, USA"],"affiliations":[{"raw_affiliation_string":"University of South Alabama, USA","institution_ids":["https://openalex.org/I83809506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031179663","display_name":"Jacob Gatlin","orcid":"https://orcid.org/0000-0001-9885-5696"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacob Gatlin","raw_affiliation_strings":["Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026440046","display_name":"Anthony Skjellum","orcid":"https://orcid.org/0000-0001-5252-6600"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anthony Skjellum","raw_affiliation_strings":["University of Tennessee at Chattanooga, USA"],"affiliations":[{"raw_affiliation_string":"University of Tennessee at Chattanooga, USA","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]},{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google LLC and Columbia University, USA"],"affiliations":[{"raw_affiliation_string":"Google LLC and Columbia University, USA","institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089993459"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":0.5827,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.69209395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"266","last_page":"281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7797374725341797},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.7217574119567871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7079604268074036},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6401814222335815},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5755646824836731},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5574479699134827},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.47546643018722534},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.4550226628780365},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2970462441444397},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.18240845203399658},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15908125042915344},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15072724223136902}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7797374725341797},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.7217574119567871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7079604268074036},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6401814222335815},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5755646824836731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5574479699134827},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.47546643018722534},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.4550226628780365},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2970462441444397},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.18240845203399658},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15908125042915344},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15072724223136902},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3471621.3471843","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3471621.3471843","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3471621.3471843","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"24th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3471621.3471843","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3471621.3471843","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3471621.3471843","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"24th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3207941521.pdf","grobid_xml":"https://content.openalex.org/works/W3207941521.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W934406733","https://openalex.org/W1479681406","https://openalex.org/W1506828534","https://openalex.org/W1729411802","https://openalex.org/W1878459630","https://openalex.org/W1985601514","https://openalex.org/W2013964018","https://openalex.org/W2031211716","https://openalex.org/W2044938352","https://openalex.org/W2069702993","https://openalex.org/W2086486009","https://openalex.org/W2094605916","https://openalex.org/W2096050104","https://openalex.org/W2098523955","https://openalex.org/W2103228545","https://openalex.org/W2113463169","https://openalex.org/W2116050022","https://openalex.org/W2119359024","https://openalex.org/W2123243822","https://openalex.org/W2124890704","https://openalex.org/W2133958774","https://openalex.org/W2139758408","https://openalex.org/W2161439181","https://openalex.org/W2161647295","https://openalex.org/W2209711601","https://openalex.org/W2404168686","https://openalex.org/W2474167986","https://openalex.org/W2514284262","https://openalex.org/W2601591992","https://openalex.org/W2608006932","https://openalex.org/W2614773713","https://openalex.org/W2685305207","https://openalex.org/W2768758414","https://openalex.org/W2784113120","https://openalex.org/W2792761021","https://openalex.org/W2881509088","https://openalex.org/W2966459861","https://openalex.org/W2975083872","https://openalex.org/W2991571699","https://openalex.org/W2993815633","https://openalex.org/W2996865646","https://openalex.org/W3099386058","https://openalex.org/W3117976059","https://openalex.org/W3124215730","https://openalex.org/W4248806346","https://openalex.org/W4288083473","https://openalex.org/W4289038676","https://openalex.org/W6811745589"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307","https://openalex.org/W2153696906"],"abstract_inverted_index":{"Additive":[0],"Manufacturing":[1],"(AM)":[2],"adoption":[3],"is":[4,17,96,129],"increasing":[5],"in":[6,70,151],"home":[7],"and":[8,33,59,101,122,149],"industrial":[9],"settings,":[10],"but":[11],"information":[12,65],"security":[13,23],"for":[14,105],"this":[15,38,135],"technology":[16],"still":[18],"immature.":[19],"Thus":[20],"far,":[21],"three":[22],"threat":[24,45],"categories":[25],"have":[26],"been":[27],"identified:":[28],"technical":[29],"data":[30,106,120],"theft,":[31],"sabotage,":[32],"illegal":[34],"part":[35],"manufacturing.":[36],"In":[37],"paper,":[39],"we":[40],"expand":[41],"to":[42,98],"a":[43,53],"new":[44],"category:":[46],"misuse":[47],"of":[48,112,125],"digital":[49,74],"design":[50,75],"files":[51],"as":[52],"subliminal":[54],"communication":[55],"channel.":[56],"We":[57],"identify":[58],"explore":[60],"attacks":[61],"by":[62],"which":[63],"arbitrary":[64],"can":[66,102],"be":[67,103],"embedded":[68],"steganographically":[69],"the":[71,78,82,86,91,126,130,139,146],"most":[72],"common":[73],"file":[76],"format,":[77],"STL,":[79],"without":[80],"distorting":[81],"printed":[83],"object.":[84],"Because":[85],"technique":[87],"will":[88],"not":[89],"change":[90],"manufactured":[92],"object's":[93],"geometry,":[94],"it":[95],"likely":[97],"remain":[99],"unnoticed":[100],"exploited":[104],"transfer.":[107],"Further,":[108],"even":[109],"with":[110],"knowledge":[111],"our":[113],"methods,":[114],"defenders":[115],"cannot":[116],"distinguish":[117],"between":[118],"actual":[119],"transfer":[121],"random":[123,142],"manipulation":[124],"files.":[127],"This":[128],"first":[131],"info-hiding":[132],"attack":[133],"on":[134],"system,":[136],"conducted":[137],"despite":[138],"fact":[140],"that":[141],"changes":[143],"may":[144],"spoil":[145],"physical":[147],"artifact":[148],"result":[150],"detection.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
