The need to secure physical and cyber-physical systems which rely on 3D-printed parts gives rise to a corresponding need to understand potential attacks via AM systems, and to develop countermeasures that will enable attack prevention, detection, and investigation. So far, three major security threat categories have been identified for AM: theft of technical data (often referred to as violation of Intellectual Property, IP), sabotage of AM, and manufacturing of illegal objects. AM Security is the highly multi-disciplinary field of research that addresses these threats.
The aim of this Workshop is to present recent advances in AM Security, including both offensive and defensive approaches. This workshop further welcomes publications in closely related fields, such as Industry 4.0 Security and Supply Chain Security.
The topics of interest include the following:
All submitted papers will be evaluated based on their relevance to the workshop scope, novelty, merits, quality of execution, and presentation. Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs. Authors who have questions about whether their paper is in scope are encouraged to ask the PC chairs in advance.
We are accepting both Full and Short Papers. All submissions must be a PDF file in double-column ACM format (see https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), no more than 12 pages long excluding the bibliography, well-marked appendices, and supplementary material. Short, high-quality papers are also encouraged and will be considered. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review.
Submissions are to be made to the submission web site at https://amsec22.hotcrp.com/
Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop. Accepted papers will be published as online proceedings through the ACM Digital Library.
8:00-8:10 | Welcome Remarks |
|||||||||
|
||||||||||
8:10-9:20 | Keynote 1: Nils Ole Tippenhauer, (CISPA – Saarbrücken, Germany) |
|||||||||
|
||||||||||
9:30-10:00 |
Panel 1: "Lessons learned in CPS Security" |
|||||||||
|
||||||||||
Accepted Papers |
||||||||||
10:00-10:30 |
Model-Based Security Analysis in Additive Manufacturing Systems
Michael R. Durling, Abha Moitra, Kit Y. Siu, Baoluo Meng, John W. Carbone, Christopher C. Alexander, Krystel K. Castillo-Villar, Gabriela F. Ciocarlie |
|||||||||
10:30-11:00 |
Spooky Manufacturing: Probabilistic Sabotage Attack in Metal AM using Shielding Gas Flow Control
Theo Zinner, Grant Parker, Nima Shamsaei, Wayne King, Mark Yampolskiy |
|||||||||
11:00-11:30 |
Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models
Srikanth Yoginath, Michael Iannacone, Varisara Tansakul, Ali Passian, Rob Jordan, Joel Asiamah, M. Nance Ericson, Gavin Long, Joel Dawson |
|||||||||
11:30-13:00 |
Lunch Break |
|||||||||
13:00-14:00 | Keynote 2: Mohammad Al Faruque, (University of California, Irvine, U.S.) |
|||||||||
|
||||||||||
14:00-14:30 |
Panel 2: "Non-Academic Perspectives on AM Security" |
|||||||||
|
||||||||||
14:30-14:45 |
Closing Remarks | |||||||||
|
||||||||||