Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing.
Tyler CulticeHimanshu ThapliyalPublished in: CoRR (2023)
Keyphrases
- countermeasures
- security flaws
- security risks
- security vulnerabilities
- security mechanisms
- information security
- buffer overflow
- attack scenarios
- high speed
- data corruption
- web services
- manufacturing systems
- quality control
- manufacturing process
- denial of service
- security breaches
- authentication scheme
- low cost
- manufacturing processes
- security issues
- security protocols
- intrusion detection
- malicious attacks
- security threats
- manufacturing industry
- information systems
- attack detection
- production planning
- dos attacks
- security measures
- security problems
- watermarking scheme
- smart card
- network traffic
- data mining
- attack graphs
- wireless sensor networks
- resource constrained