Table of Contents
|
Critical Infrastructure Protection XVI Jason Staggs, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
National cyber resilience and roles for public and private sector stakeholders Neal Ziring |
3-46 |
Are european security policies ready for advanced metering systems with cloud back-ends? Oyvind Toftegaard, Janne Hagen, Bernhard Hämmerli |
47-69 |
Industrial Control Systems Security
|
Importance of cyber security analysis in the operational technology system lifecycle Laura Tinnel, Ulf Lindqvist |
73-101 |
Trusted virtualization-based programmable logic controller resilience using a backfit approach James Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier Watkins |
103-117 |
Additive Manufacturing Systems
|
Attack-defense modeling of material extrusion additive manufacturing systems Alyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor, Joel Dawson, Mason Rice, Sujeet Shenoi |
121-153 |
Manipulation of G-code toolpath files in 3D printers: attacks and mitigations Elizabeth Kurkowski, Alyxandra Van Stockum, Joel Dawson, Curtis Taylor, Tricia Schulz, Sujeet Shenoi |
155-174 |
Detecting part anomalies induced by cyber attacks on a powder bed fusion additive manufacturing system Elizabeth Kurkowski, Mason Rice, Sujeet Shenoi |
175-203 |
Low-magnitude infill structure manipulation attacks on fused filament fabrication 3d printers Vaibhav Sharma, Radhika Barua, Rob Prins, Irfan Ahmed, Muhammad Haris Rais, Muhammad Ahsan |
205-232 |
Infrastructure Device Security
|
Leveraging confidential computing to enable secure information sharing Samuel Chadwick, Scott Graham, James Dean, Matthew Dallmeyer |
235-252 |
Evaluating the use of boot image encryption on the Talos II architecture Calvin Muramoto, Scott Graham, Stephen Dunlap |
253-273 |
Telecommunications Systems Security
|
Securing infiniband traffic with Bluefield-2 data processing units Noah Diamond, Scott Graham, Gilbert Clark |
277-300 |