AMSec 2022: International Workshop on Additive Manufacturing (3D Printing) Security

In conjunction with the ACM Conference on Computer and Communications Security (CCS)

November 11, 2022. Los Angeles, U.S.

Call for Papers

Additive Manufacturing (AM), a.k.a. 3D Printing, is a rapidly growing multi-billion-dollar industry. AM is being used to manufacture 3D objects with a variety of materials for a broad range of applications, from plastic prototypes in the early stages of R&D up to functional metal parts in safety-critical systems such jet engines. Due to its high degree of computerization, AM is well-suited to be an integral part of the ongoing Fourth Industrial Revolution, a.k.a. Industry 4.0, which foresees tight integration and automation of various computer-controlled manufacturing systems. AM is often controlled over a network connection, relies on a variety of third-party programs, and operates based on digital designs. All this exposes AM to variety of cyber- and cyber-physical attacks.

The need to secure physical and cyber-physical systems which rely on 3D-printed parts gives rise to a corresponding need to understand potential attacks via AM systems, and to develop countermeasures that will enable attack prevention, detection, and investigation. So far, three major security threat categories have been identified for AM: theft of technical data (often referred to as violation of Intellectual Property, IP), sabotage of AM, and manufacturing of illegal objects. AM Security is the highly multi-disciplinary field of research that addresses these threats.

The aim of this Workshop is to present recent advances in AM Security, including both offensive and defensive approaches. This workshop further welcomes publications in closely related fields, such as Industry 4.0 Security and Supply Chain Security.

The topics of interest include the following:

The workshop will include several technical sessions, one invited keynote presentation and two panels by some of the leading experts in the field.


Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized; papers not properly anonymized may be rejected without review.

All submitted papers will be evaluated based on their relevance to the workshop scope, novelty, merits, quality of execution, and presentation. Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs. Authors who have questions about whether their paper is in scope are encouraged to ask the PC chairs in advance.

We are accepting both Full and Short Papers. All submissions must be a PDF file in double-column ACM format (see, with a simpler version at, no more than 12 pages long excluding the bibliography, well-marked appendices, and supplementary material. Short, high-quality papers are also encouraged and will be considered. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review.

Submissions are to be made to the submission web site at

Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop. Accepted papers will be published as online proceedings through the ACM Digital Library.

Important Dates

Program Chairs

Program Commitee



Tentative Program

All times listed below are rough estimates.


Welcome Remarks

PC Chairs 


Keynote: TBD


Accepted Papers, 1st Session


Panel 1: "Lessons learned in CPS Security"

Alvaro Cárdenas (University of California – Santa Cruz, US)
Helge Janicke (Cyber Security CRS – Joondalup, Australia)
Awais Rashid   (University of Bristol, UK)
Nils Ole Tippenhauer (CISPA – Saarbrücken, Germany)


Lunch Break


Accepted Papers, 2nd Session


Panel 2: "AM Security: Same Problem Space - Different Perspectives"

Partitipants TBD


Closing Remarks

PC Chairs