PDF] Power Consumption-based Detection of Sabotage Attacks in

Por um escritor misterioso
Last updated 23 dezembro 2024
PDF] Power Consumption-based Detection of Sabotage Attacks in
This work proposes a novel approach for detecting sabotage attacks in additive Manufacturing, based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputation loss. To address this threat, we propose a novel approach for detecting sabotage attacks. Our approach is based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. The proposed approach has numerous advantages: (i) it is non-invasive in a time-critical process, (ii) it can be retrofitted in legacy systems, and (iii) it is airgapped from the computerized components of the AM process, preventing simultaneous compromise. Evaluation on a desktop 3D Printer detects all attacks involving a modification of X or Y motor movement, with false positives at 0%.
PDF] Power Consumption-based Detection of Sabotage Attacks in
Computers, Free Full-Text
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
PDF] Power Consumption-based Detection of Sabotage Attacks in
JCP, Free Full-Text
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF) Sabotage Attack Detection for Additive Manufacturing Systems
PDF] Power Consumption-based Detection of Sabotage Attacks in
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
PDF] Power Consumption-based Detection of Sabotage Attacks in
The Project Gutenberg eBook of Simple Sabotage Field Manual, by Office of Strategic Services
PDF] Power Consumption-based Detection of Sabotage Attacks in
Frontiers Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF] Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF) Sabotage Attack Detection for Additive Manufacturing Systems
PDF] Power Consumption-based Detection of Sabotage Attacks in
PDF) A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things
PDF] Power Consumption-based Detection of Sabotage Attacks in
Sabotage - Wikipedia
PDF] Power Consumption-based Detection of Sabotage Attacks in
Light sec for utilities and critical infrastructure white paper

© 2014-2024 faktorgumruk.com. All rights reserved.