default search action
Mark Yampolskiy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. CODASPY 2024: 211-220 - [i12]Aleksandr Dolgavin, Mark Yampolskiy, Moti Yung:
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files. CoRR abs/2404.05106 (2024) - 2023
- [j13]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Secur. Priv. 21(6): 64-75 (2023) - [i11]Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. CoRR abs/2305.00639 (2023) - [i10]Priyanka Prakash Surve, Oleg Brodt, Mark Yampolskiy, Yuval Elovici, Asaf Shabtai:
SoK: Security Below the OS - A Security Analysis of UEFI. CoRR abs/2311.03809 (2023) - 2022
- [c34]Theo Zinner, Grant Parker, Nima Shamsaei, Wayne E. King, Mark Yampolskiy:
Spooky Manufacturing: Probabilistic Sabotage Attack in Metal AM using Shielding Gas Flow Control. AMSec@CCS 2022: 15-24 - [c33]Mark Yampolskiy, Moti Yung:
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security. CCS 2022: 3557-3558 - [c32]Grant Parker, Eric W. MacDonald, Theo Zinner, Mark Yampolskiy:
3D-Mold'ed In-Security: Mapping Out Security of Indirect Additive Manufacturing. CPSS@AsiaCCS 2022: 53-61 - [c31]Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. ISC 2022: 40-52 - [e2]Mark Yampolskiy, Moti Yung:
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, Los Angeles, CA, USA, 11 November 2022. ACM 2022, ISBN 978-1-4503-9883-1 [contents] - [i9]Mark Yampolskiy, Paul Bates, Mohsen Seifi, Nima Shamsaei:
State of Security Awareness in the AM Industry: 2020 Survey. CoRR abs/2209.03073 (2022) - 2021
- [c30]Mark Yampolskiy, Jacob Gatlin, Moti Yung:
Myths and Misconceptions in Additive Manufacturing Security: Deficiencies of the CIA Triad. AMSec@CCS 2021: 3-9 - [c29]Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. RAID 2021: 135-147 - [c28]Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Anthony Skjellum, Moti Yung:
What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files. RAID 2021: 266-281 - [e1]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents]
2010 – 2019
- 2019
- [j12]Lynne Graves, Joshua Lubell, Wayne E. King, Mark Yampolskiy:
Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives. IEEE Access 7: 103833-103853 (2019) - [j11]Jacob Gatlin, Sofia Belikovetsky, Samuel Bennett Moore, Yosef A. Solewicz, Yuval Elovici, Mark Yampolskiy:
Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures. IEEE Access 7: 133421-133432 (2019) - [j10]Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy:
Optimal sabotage attack on composite material parts. Int. J. Crit. Infrastructure Prot. 26 (2019) - [j9]Sofia Belikovetsky, Yosef A. Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. IEEE Trans. Inf. Forensics Secur. 14(5): 1127-1141 (2019) - [c27]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. HICSS 2019: 1-10 - [i8]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. CoRR abs/1901.07507 (2019) - 2018
- [j8]Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, Kim-Kwang Raymond Choo:
Identifying 3D printer residual data via open-source documentation. Comput. Secur. 75: 10-23 (2018) - [c26]Adam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
CAN Authorization Using Message Priority Bit-Level Access Control. ICDIS 2018: 1-8 - [c25]Joel A. Dawson, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard:
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis. ICDIS 2018: 159-167 - [c24]Lynne Graves, Mark Yampolskiy, Wayne E. King, Sofia Belikovetsky, Yuval Elovici:
Liability Exposure when 3D-Printed Parts Fall from the Sky. Critical Infrastructure Protection 2018: 39-64 - [i7]Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy:
Optimal Sabotage Attack on Composite Material Parts. CoRR abs/1810.03010 (2018) - 2017
- [c23]Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici:
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. ARES 2017: 78:1-78:10 - [c22]Samuel Bennett Moore, William Bradley Glisson, Mark Yampolskiy:
Implications of Malicious 3D Printer Firmware. HICSS 2017: 1-10 - [c21]Mark Yampolskiy, Wayne E. King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici:
Evaluation of Additive and Subtractive Manufacturing from the Security Perspective. Critical Infrastructure Protection 2017: 23-44 - [c20]Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici:
dr0wned - Cyber-Physical Attack with Additive Manufacturing. WOOT 2017 - [i6]Sofia Belikovetsky, Yosef A. Solewicz, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing. CoRR abs/1705.06454 (2017) - [i5]Gregory Pope, Mark Yampolskiy:
A Hazard Analysis Technique for Additive Manufacturing. CoRR abs/1706.00497 (2017) - [i4]Samuel Bennett Moore, Jacob Gatlin, Sofia Belikovetsky, Mark Yampolskiy, Wayne E. King, Yuval Elovici:
Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing. CoRR abs/1709.01822 (2017) - 2016
- [j7]Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A. Overfelt, Kenneth R. Sloan, Alec Yasinsac:
Using 3D printers as weapons. Int. J. Crit. Infrastructure Prot. 14: 58-71 (2016) - [c19]Samuel Bennett Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey Todd McDonald, Todd R. Andel:
Buffer overflow attack's power consumption signatures. SSPREW@ACSAC 2016: 6:1-6:7 - [c18]Adam J. Brown, Mark Yampolskiy, Jacob Gatlin, Todd R. Andel:
Legal Aspects of Protecting Intellectual Property in Additive Manufacturing. Critical Infrastructure Protection 2016: 63-79 - [i3]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Towards Security of Additive Layer Manufacturing. CoRR abs/1602.07536 (2016) - [i2]Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Yuval Elovici:
dr0wned - Cyber-Physical Attack with Additive Manufacturing. CoRR abs/1609.00133 (2016) - 2015
- [j6]Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
A language for describing attacks on cyber-physical systems. Int. J. Crit. Infrastructure Prot. 8: 40-52 (2015) - [j5]Péter Horváth, Mark Yampolskiy, Xenofon D. Koutsoukos:
Efficient Evaluation of Wireless Real-Time Control Networks. Sensors 15(2): 4134-4153 (2015) - [c17]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. CISR 2015: 1:1-1:8 - [c16]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ:
A System to Recognize Intruders in Controller Area Network (CAN). ICS-CSR 2015 - [c15]Cordell C. Davidson, Joel A. Dawson, Paul Carsten, Mark Yampolskiy, Todd R. Andel:
Investigating the Applicability of a Moving Target Defense for SCADA systems. ICS-CSR 2015 - [c14]Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac:
Security Challenges of Additive Manufacturing with Metals and Alloys. Critical Infrastructure Protection 2015: 169-183 - 2014
- [c13]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. PPREW@ACSAC 2014: 7:1-7:9 - [c12]Mark Yampolskiy, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos, Péter Horváth, Heath J. LeBlanc, Janos Sztipanovits:
Resilient distributed consensus for tree topology. HiCoNS 2014: 41-48 - 2013
- [c11]Antonella Galizia, Mark Yampolskiy, Michael Schiffers, Alfonso Quarati, Andrea Clematis:
Modeling Energy Savings for Job Migration in Grid Environments. AINA Workshops 2013: 1565-1570 - [c10]Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
Taxonomy for description of cross-domain attacks on CPS. HiCoNS 2013: 135-142 - [c9]Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:
Reliability Analysis of Wireless Real-Time Control Networks. ICCCN 2013: 1-7 - [c8]Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos:
Low-complexity multicarrier physical layer for wireless real-time control networks. ICCPS 2013: 257 - 2012
- [j4]Mark Yampolskiy, Wolfgang Hommel, Feng Liu, Ralf König, Martin G. Metzker, Michael Schiffers:
Link repair in managed multi-domain connections with end-to-end quality guarantees. Int. J. Netw. Manag. 22(6): 494-507 (2012) - [c7]Feng Liu, Patricia Marcu, David Schmitz, Mark Yampolskiy:
Rethinking Multi-Layer Multi-Domain Network Monitoring. DFN-Forum Kommunikationstechnologien 2012: 11-24 - 2011
- [j3]Vitalian A. Danciu, Dieter Kranzlmüller, Martin G. Metzker, Mark Yampolskiy:
A Border-friendly, Non-overlay Mechanism for Inter-domain QoS Support in the Internet. J. Comput. Inf. Technol. 19(4): 223-229 (2011) - [c6]Andreas Hanemann, Wolfgang Fritz, Mark Yampolskiy:
Dedizierte Wellenlängenverbindungen als reguläres Dienstangebot der europäischen Forschungsnetze. DFN-Forum Kommunikationstechnologien 2011: 147 - [c5]Antonella Galizia, Alfonso Quarati, Michael Schiffers, Mark Yampolskiy:
Influences between Performance Based Scheduling and Service Level Agreements. Euro-Par Workshops (2) 2011: 96-105 - [i1]Patricia Marcu, David Schmitz, Wolfgang Fritz, Mark Yampolskiy, Wolfgang Hommel:
Integrated monitoring of multi-domain backbone connections -- Operational experience in the LHC optical private network. CoRR abs/1101.3896 (2011) - 2010
- [j2]Matthias K. Hamm, Silvia Knittl, Patricia Marcu, Mark Yampolskiy:
Modellierung interorganisationaler IT-Service-Managementprozesse. Prax. Inf.verarb. Kommun. 33(4): 291-301 (2010) - [c4]Mark Yampolskiy, Wolfgang Hommel, Patricia Marcu, Matthias K. Hamm:
An Information Model for the Provisioning of Network Connections Enabling Customer-Specific End-to-End QoS Guarantees. IEEE SCC 2010: 138-145
2000 – 2009
- 2009
- [b1]Mark Yampolskiy:
Maßnahmen zur Sicherung von E2E-QoS bei verketteten Diensten. Ludwig Maximilians University Munich, 2009, ISBN 978-3-86853-431-3, pp. 1-497 - 2008
- [j1]Matthias K. Hamm, Mark Yampolskiy:
IT Service Management verketteter Dienste in Multi-Domain Umgebungen. Modellierung und Teilaspekte. Prax. Inf.verarb. Kommun. 31(2): 82-89 (2008) - [c3]Matthias K. Hamm, Andreas Hanemann, Karin Schauerhammer, Klaus Ullmann, Mark Yampolskiy:
Unterstützung von IT Service Management-Prozessen in Multi-Domain-Umgebungen. DFN-Forum Kommunikationstechnologien 2008: 23-32 - 2007
- [c2]Mark Yampolskiy, Matthias K. Hamm:
Management of Multidomain End-to-End Links; A Federated Approach for the Pan-European Research Network Géant 2. Integrated Network Management 2007: 189-198 - 2005
- [c1]Jan Jürjens, Mark Yampolskiy:
Code security analysis with assertions. ASE 2005: 392-395
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint