Implications of malicious 3D printer firmware SB Moore, WB Glisson, M Yampolskiy Proceedings of the 50th Hawaii International Conference on System Sciences, 2017 | 78 | 2017 |
Vulnerability analysis of desktop 3D printer software S Moore, P Armstrong, T McDonald, M Yampolskiy 2016 Resilience Week (RWS), 46-51, 2016 | 50 | 2016 |
Detecting sabotage attacks in additive manufacturing using actuator power signatures J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy IEEE Access 7, 133421-133432, 2019 | 42 | 2019 |
Power consumption-based detection of sabotage attacks in additive manufacturing SB Moore, J Gatlin, S Belikovetsky, M Yampolskiy, WE King, Y Elovici arXiv preprint arXiv:1709.01822, 2017 | 31 | 2017 |
Buffer overflow attack's power consumption signatures S Moore, M Yampolskiy, J Gatlin, JT McDonald, TR Andel Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 7 | 2016 |