AMSec 2021: International Workshop on Additive Manufacturing (3D Printing) Security

In conjunction with the ACM Conference on Computer and Communications Security (CCS)

November 19, 2021. Seoul, South Korea Virtual Event

Call for Papers

Additive Manufacturing (AM), a.k.a. 3D Printing, is a rapidly growing multi-billion-dollar industry. AM is being used to manufacture 3D objects with a variety of materials for a broad range of applications, from plastic prototypes in the early stages of R&D up to functional metal parts in safety-critical systems such jet engines. Due to its high degree of computerization, AM is well-suited to be an integral part of the ongoing Fourth Industrial Revolution, a.k.a. Industry 4.0, which foresees tight integration and automation of various computer-controlled manufacturing systems. AM is often controlled over a network connection, relies on a variety of third-party programs, and operates based on digital designs. All this exposes AM to variety of cyber- and cyber-physical attacks.

The need to secure physical and cyber-physical systems which rely on 3D-printed parts gives rise to a corresponding need to understand potential attacks via AM systems, and to develop countermeasures that will enable attack prevention, detection, and investigation. So far, three major security threat categories have been identified for AM: theft of technical data (often referred to as violation of Intellectual Property, IP), sabotage of AM, and manufacturing of illegal objects. AM Security is the highly multi-disciplinary field of research that addresses these threats.

The aim of this Workshop is to present recent advances in AM Security, including both offensive and defensive approaches. This workshop further welcomes publications in closely related fields, such as Industry 4.0 Security and Supply Chain Security.

The topics of interest include the following:

The workshop will include several technical sessions, one invited keynote presentation and two panels by some of the leading experts in the field.


Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized; papers not properly anonymized may be rejected without review.

All submitted papers will be evaluated based on their relevance to the workshop scope, novelty, merits, quality of execution, and presentation. Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs. Authors who have questions about whether their paper is in scope are encouraged to ask the PC chairs in advance.

We are accepting both Full (10-12 pages) and Short (6-8 pages) Papers. All submissions must be a PDF file in double-column ACM format (see, with a simpler version at, no more than 12 pages long excluding the bibliography, well-marked appendices, and supplementary material. Short, high-quality papers are also encouraged and will be considered. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review.

Submissions are to be made to the submission web site at

Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop. Accepted papers will be published as online proceedings through the ACM Digital Library.

Important Dates

Program Chairs

Program Committee


"Security in a Complex Non-deterministic World" by Dr. Joseph Salvo

Abstract: The global internet and cellular technology have connected billions of people and trillions of objects into the most complex network ever created. This fluid and unpredictable system has unleashed an unprecedented reservoir of creativity, opportunity, capabilities and risks. The topology of knowledge and connections has never been so asymmetric whereby a single (sometimes anonymous) individual can quickly gain control of the attention and function of millions of machines and people for costs that are often deemed to be insignificant.

Traditional methods of security consistently fail because of the nature of this topology. This novel organization of knowledge combined with the power of "action at a distance" requires a new paradigm to secure the future of open society, privacy, manufacturing, finance and international commerce. Traditional technology and control mechanisms will continue to fall short in the face of this global cultural shift that is now irreversible. New network designs and technology paradigms offer hope to this pernicious threat against a connected world.

Biography: Dr. Joseph Salvo was the Founder and GE Director of the Industrial Internet Consortium (IIC). He was responsible for setting the overall direction and prioritization of IIC activities for the organization that currently has members from over 25 countries and 250 organizations. He also managed the Complex Systems Engineering Laboratory at GE Global Research and lead an AI laboratory at the GE China Tech center in Shanghai. For the past 20 years Dr. Salvo and his laboratories developed a series of large-scale internet-based sensing arrays to manage and oversee business systems on a global scale and deliver value-added services.

Digital manufacturing, supply chain management, telematics services, and energy management were among the targets for continual improvement through the judicious use of big data and AI algorithms. Commercial releases of complex decision platforms such as GE Veriwise™ GE Railwise, Global Vendor Managed Inventory, Ener.GE™, and E-Materials Management delivered near real-time customer value through system transparency and knowledge-based computational algorithms. More than 1 trillion dollars of assets and goods have been tracked and system optimized with technology that is deployed on 4 continents.

Blockchain, 5G communications, digital manufacturing, personal privacy and quantum secure data transfer are among his latest interests.
Dr. Salvo holds 15 U.S. patents, with more than 15 additional patents pending. Dr. Salvo joined the GE Global Research Center in 1988.
He received his M.Phil. and Ph.D. in Molecular Biophysics and Biochemistry at Yale University and his undergraduate degree from Harvard University.

Related Links:


All the times listed below are in Korea Time (conversion to selected US and EU time zones is listed in parentheses - please note that outside of South Korea the workshop starts on November 18).
Each paper presentation is 30 minutes inclusive of Q&A. Please be online at least 20 minutes before your session starts, because program times can shift.

7:00-7:10     (Nov 18, 5 pm US EST / Nov 18, 4 pm US CST / Nov 18, 2 pm US PST / Nov 18, 11 pm EU CEST)

Welcome Remarks

Mark Yampolskiy  Auburn University

7:10-8:20     (Nov 18, 5:10 pm US EST / Nov 18, 4:10 pm US CST / Nov 18, 2:10 pm US PST / Nov 18, 11:10 pm EU CEST)

Keynote: "Security in a Complex Non-deterministic World"

Joseph Salvo  Founder and former GE Director of the Industrial Internet Consortium (IIC)

8:20-9:30     (Nov 18, 6:20 pm US EST / Nov 18, 5:20 pm US CST / Nov 18, 3:20 pm US PST / Nov 19, 12:20 am EU CEST)

Panel 1: "Role and Limits of Cyber-Security in AM Security"

Moti Yung Google LLC and Columbia University
Jitesh Panchal Purdue University
Chris Adkins Identify3D
Gabriela Ciocarlie CyManII and The University of Texas at San Antonio
Moderator: Joshua Lubell   National Institute of Standards and Technology

9:30-10:00     (Nov 18, 7:30 pm US EST / Nov 18, 6:30 pm US CST / Nov 18, 4:30 pm US PST / Nov 19, 1:30 am EU CEST)

Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad

Mark Yampolskiy  Auburn University
Jacob Gatlin Auburn University
Moti Yung Google LLC, Columbia University

10:00-10:30     (Nov 18, 8:00 pm US EST / Nov 18, 7:00 pm US CST / Nov 18, 5:00 pm US PST / Nov 19, 2:00 am EU CEST)

Protection against Counterfeiting Attacks in 3D Printing by Streaming Signature-embedded Manufacturing Process Instructions

Akash Tiwari Texas A&M University
Eduardo Jose Villasenor Texas A&M University
Nikhil Gupta New York University
A. L. Narasimha Reddy Texas A&M University
Ramesh Karri New York University
Satish T. S. Bukkapatnam  Texas A&M University

10:30-11:00     (Nov 18, 8:30 pm US EST / Nov 18, 7:30 pm US CST / Nov 18, 5:30 pm US PST / Nov 19, 2:30 am EU CEST)

A Robust Control Scheme for Time Delay Switch Attacks

Luka Malashkhia  Georgia Institute of Technology
Laura P. Swiler Sandia National Laboratories
Ali Pinar Sandia National Laboratories
Yan Wang Georgia Institute of Technology

11:00-11:30     (Nov 18, 9:00 pm US EST / Nov 18, 8:00 pm US CST / Nov 18, 6:00 pm US PST / Nov 19, 3:00 am EU CEST)

Information Embedding in Additive Manufacturing through Printing Speed Control

Karim A. ElSayed  Purdue University
Adam Dachowicz Purdue University
Jitesh Panchal Purdue University

11:30-12:00     (Nov 18, 9:30 pm US EST / Nov 18, 8:30 pm US CST / Nov 18, 6:30 pm US PST / Nov 19, 3:30 am EU CEST)

Panel 2: "Challenges of AM Security Faced by Newcomers to the Field"

Mohammad Abdullah Al Faruque   University of California Irvine
Moderator: Mark Yampolskiy   Auburn University

12:00-12:30     (Nov 18, 10:00 pm US EST / Nov 18, 9:00 pm US CST / Nov 18, 7:00 pm US PST / Nov 19, 4:00 am EU CEST)

Cybersecurity Requirements for AM Systems: New Enforcement in DoD Environments, and Resources for Implementation

Mark J. Cotteleer Deloitte Consulting LLP
Simon S. Goldenberg  Deloitte & Touche LLP
Ian Wing Deloitte Consulting LLP
Oyindamola Alliyu Deloitte Consulting LLP
Stephen Kania Deloitte Consulting LLP
Veda Mujumdar Deloitte & Touche LLP
Brenna Sniderman Deloitte Services LP

12:30-13:00     (Nov 18, 10:30 pm US EST / Nov 18, 9:30 pm US CST / Nov 18, 7:30 pm US PST / Nov 19, 4:30 am EU CEST)

Defining and Addressing the Cybersecurity Challenges of Additive Manufacturing Platforms

Chris Adkins Identify3D
Stephan Thomas  Identify3D
Daniel Moore Identify3D

13:00-13:30     (Nov 18, 11:00 pm US EST / Nov 18, 10:00 pm US CST / Nov 18, 8:00 pm US PST / Nov 19, 5:00 am EU CEST)

Confidential Token-Based License Management

Felix Engelmann Aarhus University
Jan Philip Speichert  Hamburg University of Technology
Ralf God Hamburg University of Technology
Frank Kargl Ulm University
Christoph Bösch Ulm University

13:30-13:35     (Nov 18, 11:30 pm US EST / Nov 18, 10:30 pm US CST / Nov 18, 8:30 pm US PST / Nov 19, 5:30 am EU CEST)

Closing Remarks

Mark Yampolskiy  Auburn University