Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations.
Elizabeth KurkowskiAlyxandra Van StockumJoel DawsonCurtis TaylorTricia SchulzSujeet ShenoiPublished in: Critical Infrastructure Protection (2022)
Keyphrases
- malicious code
- countermeasures
- source code
- sql injection
- detecting malicious
- watermarking algorithm
- text files
- data entry
- malicious attacks
- file system
- source files
- black and white
- java card
- traffic analysis
- file transfer
- attack detection
- terrorist attacks
- security risks
- metadata
- legacy systems
- watermarking scheme
- web applications
- digital images
- website