AM is being used to manufacture 3D objects with a variety of materials for a broad range of applications, from plastic prototypes in the early stages of R&D up to functional metal parts in safety-critical systems such jet engines. Due to its high degree of computerization, AM is well-suited to be an integral part of the ongoing Fourth Industrial Revolution, a.k.a. Industry 4.0, which foresees tight integration and automation of various computer-controlled manufacturing systems. AM is often controlled over a network connection, relies on a variety of third-party programs, and operates based on digital designs. All this exposes AM to variety of cyber- and cyber-physical attacks.
The need to secure physical and cyber-physical systems which rely on 3D-printed parts gives rise to a corresponding need to understand potential attacks via AM systems, and to develop countermeasures that will enable attack prevention, detection, and investigation. So far, three major security threat categories have been identified for AM: theft of technical data (often referred to as violation of Intellectual Property, IP), sabotage of AM, and manufacturing of illegal objects. AM Security is the highly multi-disciplinary field of research that addresses these threats.
The aim of this Workshop is to present recent advances in AM Security, including both offensive and defensive approaches. This workshop further welcomes publications in closely related fields, such as Industry 4.0 Security and Supply Chain Security.
The topics of interest include the following:
- Compromises of AM systems and manufacturing environment
- Security threats and attacks in the AM context
- Approaches to prevent attacks on or with AM
- Approaches to detect ongoing attacks on or with AM
- Digital Investigation and forensics in the AM context
- Legal aspects of attacks on or with AM
- Misuse of AM in illegal, terroristic, or nuclear proliferation activities
- Comparative analysis of AM vs. CPS, IoT, Industry 4.0, etc. Securities
- Taxonomies of attacks or defense measures in the AM context
- Surveys of AM Security literature
- Surveys of AM Security posture in industry and agencies
- AM Security-related standardization needs and efforts