Mark Yampolskiy

Orcid: 0000-0003-4626-2754

According to our database1, Mark Yampolskiy authored at least 56 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

SoK: Security Below the OS - A Security Analysis of UEFI.
CoRR, 2023

2022
State of Security Awareness in the AM Industry: 2020 Survey.
CoRR, 2022

Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Proceedings of the Information Security - 25th International Conference, 2022

3D-Mold'ed In-Security: Mapping Out Security of Indirect Additive Manufacturing.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

Spooky Manufacturing: Probabilistic Sabotage Attack in Metal AM using Shielding Gas Flow Control.
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022

AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad.
Proceedings of the AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021

2019
Digital Audio Signature for 3D Printing Integrity.
IEEE Trans. Inf. Forensics Secur., 2019

Optimal sabotage attack on composite material parts.
Int. J. Crit. Infrastructure Prot., 2019

Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives.
IEEE Access, 2019

Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
IEEE Access, 2019

Investigating 3D Printer Residual Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Identifying 3D printer residual data via open-source documentation.
Comput. Secur., 2018

Liability Exposure when 3D-Printed Parts Fall from the Sky.
Proceedings of the Critical Infrastructure Protection XII, 2018

Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

CAN Authorization Using Message Priority Bit-Level Access Control.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing.
CoRR, 2017

A Hazard Analysis Technique for Additive Manufacturing.
CoRR, 2017

Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Evaluation of Additive and Subtractive Manufacturing from the Security Perspective.
Proceedings of the Critical Infrastructure Protection XI, 2017

Implications of Malicious 3D Printer Firmware.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Using 3D printers as weapons.
Int. J. Crit. Infrastructure Prot., 2016

Towards Security of Additive Layer Manufacturing.
CoRR, 2016

dr0wned - Cyber-Physical Attack with Additive Manufacturing.
CoRR, 2016

Legal Aspects of Protecting Intellectual Property in Additive Manufacturing.
Proceedings of the Critical Infrastructure Protection X, 2016

Buffer overflow attack's power consumption signatures.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Efficient Evaluation of Wireless Real-Time Control Networks.
Sensors, 2015

A language for describing attacks on cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015

Security Challenges of Additive Manufacturing with Metals and Alloys.
Proceedings of the Critical Infrastructure Protection IX, 2015

Investigating the Applicability of a Moving Target Defense for SCADA systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

A System to Recognize Intruders in Controller Area Network (CAN).
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Resilient distributed consensus for tree topology.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
Low-complexity multicarrier physical layer for wireless real-time control networks.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

Reliability Analysis of Wireless Real-Time Control Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Taxonomy for description of cross-domain attacks on CPS.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013

Modeling Energy Savings for Job Migration in Grid Environments.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Link repair in managed multi-domain connections with end-to-end quality guarantees.
Int. J. Netw. Manag., 2012

Rethinking Multi-Layer Multi-Domain Network Monitoring.
Proceedings of the 5. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 2012

2011
Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network
CoRR, 2011

A Border-friendly, Non-overlay Mechanism for Inter-domain QoS Support in the Internet.
J. Comput. Inf. Technol., 2011

Influences between Performance Based Scheduling and Service Level Agreements.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

Dedizierte Wellenlängenverbindungen als reguläres Dienstangebot der europäischen Forschungsnetze.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

2010
Modellierung interorganisationaler IT-Service-Managementprozesse.
Prax. Inf.verarb. Kommun., 2010

An Information Model for the Provisioning of Network Connections Enabling Customer-Specific End-to-End QoS Guarantees.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Maßnahmen zur Sicherung von E2E-QoS bei verketteten Diensten.
PhD thesis, 2009

2008
IT Service Management verketteter Dienste in Multi-Domain Umgebungen. Modellierung und Teilaspekte.
Prax. Inf.verarb. Kommun., 2008

Unterstützung von IT Service Management-Prozessen in Multi-Domain-Umgebungen.
Proceedings of the 1. DFN-Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, 28.05., 2008

2007
Management of Multidomain End-to-End Links; A Federated Approach for the Pan-European Research Network Géant 2.
Proceedings of the Integrated Network Management, 2007

2005
Code security analysis with assertions.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005


  Loading...