598
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Cyber-physical attack vulnerabilities in manufacturing quality control tools

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Albakri, M. I., L. D. Sturm, C. B. Williams, and P. A. Tarazaga. 2017. Impedance-based non-destructive evaluation of additively manufactured parts. Rapid Prototyping Journal 23 (3):589–601. doi:10.1108/RPJ-03-2016-0046.
  • Albright, D., P. Brannan, and W. Christina. 2010. Did Stuxnet take out 1,000 centrifuges at the Natanz enrichment plant? Institute for Science and International Security (ISIS). http://isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/.
  • Allen, T. T., Z. Sui, and K. Akbari. 2018. Exploratory text data analysis for quality hypothesis generation. Quality Engineering 30 (4):701–12. doi:10.1080/08982112.2018.1481216.
  • Alwan, L. C., and H. V. Roberts. 1995. The problem of misplaced control limits. Journal of the Royal Statistical Society. Series C (Applied Statistics) 44 (3):269–78. doi:10.2307/2986036.
  • Antony, J., and T. Taner. 2003. A conceptual framework for the effective implementation of statsitical process control. Business Process Management Journal 9 (4):473–89. doi:10.1108/14637150310484526.
  • Belikovetsky, S., Y. A. Solewicz, M. Yampolskiy, J. Toh, and Y. Elovici. 2019. Digital audio signature for 3D printing integrity. IEEE Transactions on Information Forensics and Security 14 (5):1127–41. doi:10.1109/TIFS.2018.2851584.
  • Benneyan, J. 2009. Misuse of XmR quality control charts for common single parameter probability distributions. In 2009 International Conference on Computers & Industrial Engineering, Troyes, France, 1291–1296. doi:10.1109/ICCIE.2009.5223767.
  • Bird, D., and B. G. Dale. 1994. The misuse and abuse of SPC: A case study examination. International Journal of Vehicle Design 15 (1–2):99–107. doi:10.1504/IJVD.1994.061908.
  • Brandman, J. E. 2017. A physical hash for preventing and detecting cyber- physical attacks in additive manufacturing systems. Master of Science thesis (in Mechanical Engineering). Blacksburg, VA: Virginia Tech.
  • Cai, D. Q., M. Xie, and T. N. Goh. 2001. SPC in an automated manufacturing environment. International Journal of Computer Integrated Manufacturing 14 (2):206–11. doi:10.1080/09511920150216323.
  • Cárdenas, A., S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. 2009. Challenges for securing cyber physical systems. Workshop on Future Directions in Cyber-Physical Systems Security. Newark, NJ: DHS.
  • Cárdenas, A. A., S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. 2011. Attacks against process control systems: Risk assessment, detection, and response. In 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS ‘11), Hong Kong, 355–366.
  • Caulcutt, R. 1995. The rights and wrongs of control charts. Applied Statistics 44 (3):279–88. doi:10.2307/2986037.
  • Chhetri, S. R., A. Canedo, and M. A. Al Faruque. 2016. KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. International Conference on Computer Aided Design (ICCAD ‘16). Austin, TX, USA: IEEE/ACM. doi:10.1145/2966986.2967050.
  • DeSmit, Z., A. E. Elhabashy, L. J. Wells, and J. A. Camelio. 2017. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. Journal of Manufacturing Systems 43:339–51. doi:10.1016/j.jmsy.2017.03.004.
  • Elhabashy, A. E., L. J. Wells, and J. A. Camelio. 2019. Cyber-physical security research efforts in manufacturing—A literature review. Procedia Manufacturing 34:921–31. doi:10.1016/j.promfg.2019.06.115.
  • Elhabashy, A. E., L. J. Wells, J. A. Camelio, and W. H. Woodall. 2019. A cyber-physical attack taxonomy for production systems: A quality control perspective. Journal of Intelligent Manufacturing 30 (6):2489–504. doi:10.1007/s10845-018-1408-9.
  • Ermer, D. S., and G. M. Hurtis. 1995. Advanced SPC for higher-quality electronic card manufacturing. Quality Engineering 8 (2):283–99. doi:10.1080/08982119508904627.
  • Gao, Y., B. Li, W. Wang, W. Xu, C. Zhou, and Z. Jin. 2018. Watching and safeguarding your 3D printer: Online process monitoring against cyber-physical attacks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2 (3):1–27. doi:10.1145/3264918.
  • Holmes, D., and A. E. Mergen. 2011. Analysis of the use of ratios for process management and decision-making. Total Quality Management & Business Excellence 22 (7):787–94. doi:10.1080/14783363.2011.593875.
  • Holmes, D., and A. E. Mergen. 2012. Control limits versus acceptance limits—Which limits are appropriate for your task? In Northeast Decision Sciences Institute 41st Annual Meeting. Newport, Rhode Island.
  • Hoyles, C., A. Bakker, P. Kent, and R. Noss. 2007. Attributing meanings to representations of data: The case of statistical process control. Mathematical Thinking and Learning 9 (4):331–60. doi:10.1080/10986060701533326.
  • Huberts, L. C. E., M. Schoonhoven, R. Goedhart, M. D. Diko, and R. J. M. M. Does. 2018. The performance of control charts for large non-normally distributed datasets. Quality and Reliability Engineering International 34 (6):979–96. doi:10.1002/qre.2287.
  • Komolafe, T., W. Tian, G. T. Purdy, M. Albakri, P. Tarazaga, and J. Camelio. 2019. Repeatable part authentication using impedance based analysis for side-channel monitoring. Journal of Manufacturing Systems 51:42–51. doi:10.1016/j.jmsy.2019.01.007.
  • Lee, R. M., M. J. Assante, and T. Conway. 2014. German steel mill cyber attack, in industrial control systems. ICS Defense Use Case (DUC): SANS Institute on Industrial Control System (ICS) Security. https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf
  • Lucas, J. M., and M. S. Saccucci. 1990. Exponentially weighted moving average control schemes: Properties and enhancements. Technometrics 32 (1):27. doi:10.2307/1269835.
  • Maragah, H. D., and W. H. Woodall. 1992. The effect of autocorrelation on the retrospective X-chart. Journal of Statistical Computation and Simulation 40 (1-2):29–42. doi:10.1080/00949659208811363.
  • McCoy, T., R. Yearout, and S. Patch. 2004. Misrepresenting quality data through incorrect statistical applications—A statistical quality control (SQC) case study. International Journal of Industrial Engineering: Theory, Applications and Practice 11 (1):66–73.
  • Montgomery, D. C. 2009. Introduction to statistical quality control. 6th ed. New York: Wiley.
  • Moore, S. B., J. Gatlin, S. Belikovetsky, M. Yampolskiy, W. E. King, and Y. Elovici. 2017. Power consumption-based detection of sabotage attacks in additive manufacturing. ArXiv Preprint ArXiv:1709.01822.
  • Reis, M. M., E. P. Paladini, S. Khator, and W. A. Sommer. 2006. Artificial intelligence approach to support statistical quality control teaching. Computers & Education 47 (4):448–64. doi:10.1016/j.compedu.2004.10.016.
  • Shafae, M. S., L. J. Wells, and G. T. Purdy. 2019. Defending against product-oriented cyber-physical attacks on machining systems. The International Journal of Advanced Manufacturing Technology 105 (9):3851–22. doi:10.1007/s00170-019-03805-z.
  • Sparks, R. S., and J. B. F. Field. 2000. Using Deming’s funnel experiment to demonstrate effects of violating assumptions underlying Shewhart’s control charts. The American Statistician 54 (4):291–302. doi:10.2307/2685781.
  • Sturm, L. D., M. Albakri, C. B. Williams, and P. Tarazaga. 2016. In situ detection of build defects in additive manufacturing via impedance-based monitoring. Proceedings of the 27th Annual International Solid Freeform Fabrication Symposium—An Additive Manufacturing Conference, Austin, TX.
  • Sturm, L. D., C. B. Williams, J. A. Camelio, J. White, and R. Parker. 2017. Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the. STL file with human subjects. Journal of Manufacturing Systems 44:154–64. doi:10.1016/j.jmsy.2017.05.007.
  • Tseitlin, A. 2013. The antifragile organization. Communications of the ACM 56 (8):40–4. doi:10.1145/2492007.2492022.
  • Vincent, H., L. Wells, P. Tarazaga, and J. Camelio. 2015. Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing 1:77–85. doi:10.1016/j.promfg.2015.09.065.
  • Warner, D. J., C. E. Lindsay, and C. L. Sansom. 1993. The use and misuse of statistical process control in GaAs MMIC manufacture. In 15th Annual Gallium Arsenide Integrated Circuit (GaAs IC) Symposium, Technical Digest 1993, San Jose, CA: IEEE, 131–3. doi:10.1109/GAAS.1993.394485.
  • Wells, L. J., J. A. Camelio, C. B. Williams, and J. White. 2014. Cyber-physical security challenges in manufacturing systems. Manufacturing Letters 2 (2):74–7. doi:10.1016/j.mfglet.2014.01.005.
  • Wood, M. 1995. Three suggestions for improving control charting procedures. International Journal of Quality & Reliability Management 12 (5):61–74. doi:10.1108/02656719510090009.
  • Wood, M., and D. Preece. 1992. Using quality measurements: Practice, problems and possibilities. International Journal of Quality & Reliability Management 9 (7):42–53. doi:10.1108/02656719210020423.
  • Wu, M., and Y. B. Moon. 2019. Intrusion detection system for cyber- manufacturing system. Journal of Manufacturing Science and Engineering 141 (3):31007–9. doi:10.1115/1.4042053.
  • Wu, M., Z. Song, and Y. B. Moon. 2019. Detecting cyber-physical attacks in cybermanufacturing systems with machine learning methods. Journal of Intelligent Manufacturing 30 (3):1111–23. doi:10.1007/s10845-017-1315-5.
  • Yampolskiy, M., P. Horvath, X. D. Koutsoukos, Y. Xue, and J. Sztipanovits. 2013. Taxonomy for description of cross-domain attacks on CPS. In Proceedings of the 2Nd ACM International Conference on High Confidence Networked Systems, HiCoNS ‘13. New York, NY: ACM, 135–42. doi:10.1145/2461446.2461465.
  • Yu, S., A. V. Malawade, S. R. Chhetri, and M. A. A. Faruque. 2020. Sabotage attack detection for additive manufacturing systems. IEEE Access. 8:27218–31. doi:10.1109/ACCESS.2020.2971947.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.