Login / Signup
Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files.
Caleb Beckwith
Harsh Sankar Naicker
Svara Mehta
Viba R. Udupa
Nghia Tri Nim
Varun Gadre
Hammond Pearce
Gary Mac
Nikhil Gupta
Published in:
CoRR (2021)
Keyphrases
</>
detecting malicious
malicious code
detect malicious
malicious activities
source code
databases
automatic detection
file system
database
metadata
text files
static analysis
malicious behavior
data entry
manufacturing processes
file formats
quality control
manufacturing systems
neural network
real time