Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files.
Caleb BeckwithHarsh Sankar NaickerSvara MehtaViba R. UdupaNghia Tri NimVarun GadreHammond PearceGary MacNikhil GuptaPublished in: IEEE Embed. Syst. Lett. (2022)
Keyphrases
- detecting malicious
- malicious code
- detect malicious
- source code
- static analysis
- text files
- malicious behavior
- manufacturing processes
- malicious activities
- source files
- malicious users
- manufacturing environment
- real time
- image editing
- reverse engineering
- automatic detection
- databases
- semiconductor manufacturing
- code examples
- legacy systems
- file formats
- production planning
- quality control
- anomaly detection