Mark Yampolskiy
Mark Yampolskiy
Verified email at - Homepage
Cited by
Cited by
Taxonomy for description of cross-domain attacks on CPS
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
Proceedings of the 2nd ACM international conference on High confidence†…, 2013
dr0wned–{Cyber-Physical} Attack with Additive Manufacturing
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
Security of additive manufacturing: Attack taxonomy and survey
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ...
Additive Manufacturing 21, 431-457, 2018
Using 3D printers as weapons
M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, ...
International Journal of Critical Infrastructure Protection 14, 58-71, 2016
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
A language for describing attacks on cyber-physical systems
M Yampolskiy, P HorvŠth, XD Koutsoukos, Y Xue, J Sztipanovits
International Journal of Critical Infrastructure Protection 8, 40-52, 2015
Digital audio signature for 3D printing integrity
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici
ieee transactions on information forensics and security 14 (5), 1127-1141, 2018
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
2012 5th International Symposium on Resilient Control Systems, 55-62, 2012
Implications of malicious 3D printer firmware
SB Moore, WB Glisson, M Yampolskiy
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Security challenges of additive manufacturing with metals and alloys
M Yampolskiy, L Schutzle, U Vaidya, A Yasinsac
International Conference on Critical Infrastructure Protection, 169-183, 2015
Detecting sabotage attacks in additive manufacturing using actuator power signatures
J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy
IEEE Access 7, 133421-133432, 2019
Vulnerability analysis of desktop 3D printer software
S Moore, P Armstrong, T McDonald, M Yampolskiy
2016 Resilience Week (RWS), 46-51, 2016
How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective
A Slaughter, M Yampolskiy, M Matthews, WE King, G Guss, Y Elovici
Proceedings of the 12th International Conference on Availability†…, 2017
Management of multidomain end-to-end links-a federated approach for the pan-european research network geant 2
M Yampolskiy, MK Hamm
2007 10th IFIP/IEEE International Symposium on Integrated Network Management†…, 2007
Characteristic aspects of additive manufacturing security from security awareness perspectives
LMG Graves, J Lubell, W King, M Yampolskiy
IEEE Access 7, 103833-103853, 2019
A hazard analysis technique for additive manufacturing
G Pope, M Yampolskiy
arXiv preprint arXiv:1706.00497, 2017
Evaluation of additive and subtractive manufacturing from the security perspective
M Yampolskiy, W King, G Pope, S Belikovetsky, Y Elovici
International Conference on Critical Infrastructure Protection, 23-44, 2017
Legal aspects of protecting intellectual property in additive manufacturing
A Brown, M Yampolskiy, J Gatlin, T Andel
International Conference on Critical Infrastructure Protection, 63-79, 2016
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS†…, 2018
The system can't perform the operation now. Try again later.
Articles 1–20