skip to main content
10.1145/3243734.3243735acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

PrinTracker: Fingerprinting 3D Printers using Commodity Scanners

Published:15 October 2018Publication History

ABSTRACT

As 3D printing technology begins to outpace traditional manufacturing, malicious users increasingly have sought to leverage this widely accessible platform to produce unlawful tools for criminal activities. Therefore, it is of paramount importance to identify the origin of unlawful 3D printed products using digital forensics. Traditional countermeasures, including information embedding or watermarking, rely on supervised manufacturing process and are impractical for identifying the origin of 3D printed tools in criminal applications. We argue that 3D printers possess unique fingerprints, which arise from hardware imperfections during the manufacturing process, causing discrepancies in the line formation of printed physical objects. These variations appear repeatedly and result in unique textures that can serve as a viable fingerprint on associated 3D printed products. To address the challenge of traditional forensics in identifying unlawful 3D printed products, we present PrinTracker, the 3D printer identification system, which can precisely trace the physical object to its source 3D printer based on their fingerprint. Results indicate that PrinTracker provides a high accuracy using 14 different 3D printers. Under unfavorable conditions (e.g. restricted sample area, location and process), the PrinTracker can still achieve an acceptable accuracy of 92%. Furthermore, we examine the effectiveness, robustness, reliability and vulnerabilities of the PrinTracker in multiple real-world scenarios.

Skip Supplemental Material Section

Supplemental Material

p1306-rathore.mp4

mp4

387.3 MB

References

  1. Y Abdallah and R Yousef. 2015. Augmentation of X-Rays Images using Pixel Intensity Values Adjustments. International Journal of Science and Research (IJSR), Vol. 4, 2 (2015), 2425--2430.Google ScholarGoogle Scholar
  2. Jerry Ajay, Chen Song, Aditya Singh Rathore, Chi Zhou, and Wenyao Xu. 2017. 3DGates: An Instruction-Level Energy Analysis and Optimization of 3D Printers Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems. ACM, 419--433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. KR Akshatha, AK Karunakar, H Anitha, U Raghavendra, and Dinesh Shetty. 2016. Digital camera identification using PRNU: A feature based approach. Digital Investigation Vol. 19 (2016), 69--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Patrice Rondao Alface and Benoit Macq. 2007. From 3D mesh data hiding to 3D shape blind and robust watermarking: A survey. Transactions on data hiding and multimedia security II. Springer, 91--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Christian Bayens, Garcia L Le T, R Beyah, M Javanmard, and S Zonouz. 2017. See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 1181--1198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sevinc Bayram, H Sencar, Nasir Memon, and Ismail Avcibas. 2005. Source camera identification based on CFA interpolation Image Processing, 2005. ICIP 2005. IEEE International Conference on, Vol. Vol. 3. IEEE, III--69.Google ScholarGoogle Scholar
  7. Sevinc Bayram, Husrev T Sencar, and Nasir Memon. 2008. Classification of digital camera-models based on demosaicing artifacts. digital investigation, Vol. 5, 1 (2008), 49--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Oliver Benedens. 1999. Geometry-based watermarking of 3D models. Technical Report. FRAUNHOFER INST FOR COMPUTER GRAPHICS DARMSTADT (GERMANY) VIRTUAL REALITY DEMONSTRATION CENTRE.Google ScholarGoogle Scholar
  9. Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. 2014. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).Google ScholarGoogle Scholar
  10. Ruud M Bolle, Jonathan H Connell, Sharath Pankanti, Nalini K Ratha, and Andrew W Senior. 2013. Guide to biometrics. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Danton Bryans. 2015. Unlocked and loaded: government censorship of 3D-printed firearms and a proposal for more reasonable regulation of 3D-printed goods. Ind. LJ Vol. 90 (2015), 901.Google ScholarGoogle Scholar
  12. James DR Buchanan, Russell P Cowburn, Ana-Vanessa Jausovec, Dorothee Petit, Peter Seem, Gang Xiong, Del Atkinson, Kate Fenton, Dan A Allwood, and Matthew T Bryan. 2005. Forgery:`fingerprinting' documents and packaging. Nature, Vol. 436, 7050 (2005), 475--475.Google ScholarGoogle ScholarCross RefCross Ref
  13. SL Yinzhi Cao and E Wijmans. 2017. Browser Fingerprinting via OS and Hardware Level Features Proceedings of the 2017 Network & Distributed System Security Symposium, NDSS, Vol. Vol. 17.Google ScholarGoogle Scholar
  14. Lit-Hung Chan, Ngai-Fong Law, and Wan-Chi Siu. 2012. A two dimensional camera identification method based on image sensor noise Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on. IEEE, 1741--1744.Google ScholarGoogle ScholarCross RefCross Ref
  15. Wenyao Xu Chi Zhou Zhanpeng Jin Kui Ren Chen Song, Zhengxiong Li. 2018. My Smartphone Recognizes Genuine QR Codes! Practical Unclonable QR Code via 3D Printing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 2, 3 (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. USENIX Security Symposium. 911--927. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kyong-Tak Cho and Kang G Shin. 2017. Viden: Attacker Identification on In-Vehicle Networks Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1109--1123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J Alex Halderman, and Edward W Felten. 2009. Fingerprinting blank paper using commodity scanners Security and Privacy, 2009 30th IEEE Symposium on. IEEE, 301--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Adam Dachowicz, Siva Chaitanya Chaduvula, Mikhail Atallah, and Jitesh H Panchal. 2017. Microstructure-Based Counterfeit Detection in Metal Part Manufacturing. JOM, Vol. 69, 11 (2017), 2390--2396.Google ScholarGoogle ScholarCross RefCross Ref
  20. Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. 2009. Physical-layer Identification of RFID Devices.. In Usenix Security Symposium. 199--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 441--452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Anupam Das, Nikita Borisov, and Matthew Caesar. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. NDSS.Google ScholarGoogle Scholar
  23. Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, and Srihari Nelakuditi. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS.Google ScholarGoogle Scholar
  24. Maurits Diephuis and Sviatoslav Voloshynovskiy. 2013. Physical object identification based on famos microstructure fingerprinting: comparison of templates versus invariant features Image and Signal Processing and Analysis (ISPA), 2013 8th International Symposium on. IEEE, 119--123.Google ScholarGoogle Scholar
  25. Maurits Diephuis, Sviatoslav Voloshynovskiy, and Taras Holotyak. 2015. Sketchprint: physical object micro-structure identification using mobile phones Signal Processing Conference (EUSIPCO), 2015 23rd European. IEEE, 834--838.Google ScholarGoogle Scholar
  26. Davis Doherty. 2012. Downloading infringement: patent law as a roadblock to the 3D printing revolution. Harv. JL & Tech. Vol. 26 (2012), 353.Google ScholarGoogle Scholar
  27. Alaa Eleyan and Hasan Demirel. 2011. Co-occurrence matrix and its statistical features as a new approach for face recognition. Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 19, 1 (2011), 97--107.Google ScholarGoogle Scholar
  28. Sebastian Eschweiler, Khaled Yakdan, and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. NDSS.Google ScholarGoogle Scholar
  29. Morten W Fagerland, Stian Lydersen, and Petter Laake. 2013. The McNemar test for binary matched-pairs data: mid-p and asymptotic are better than exact conditional. BMC medical research methodology Vol. 13, 1 (2013), 91.Google ScholarGoogle Scholar
  30. David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem A Beyah. 2016. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. NDSS.Google ScholarGoogle Scholar
  31. Blaise Gassend, Dwaine Clarke, Marten Van Dijk, and Srinivas Devadas. 2002. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security. ACM, 148--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Zeno J Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki, and Naoki Saitoh. 2001. Methods for identification of images acquired with digital cameras. Proc. of SPIE, Enabling Technologies for Law Enforcement and Security Vol. 4232 (2001), 505--512.Google ScholarGoogle ScholarCross RefCross Ref
  33. Jorge Guajardo, Sandeep S Kumar, Geert Jan Schrijen, and Pim Tuyls. 2007. FPGA intrinsic PUFs and their use for IP protection CHES, Vol. Vol. 4727. Springer, 63--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Julian Sommerville Hatcher, Frank J Jury, Jac Weller, and Thomas G Samworth. 1997. Firearms investigation, identification and evidence. Univ. Book Agency.Google ScholarGoogle Scholar
  35. David D Hernandez. 2015. Factors affecting dimensional precision of consumer 3D printing. International Journal of Aviation, Aeronautics, and Aerospace, Vol. 2, 4 (2015), 2.Google ScholarGoogle Scholar
  36. Daniel E Holcomb, Wayne P Burleson, and Kevin Fu. 2009. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. Vol. 58, 9 (2009), 1198--1210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. 3D Hubs Digital Manufacturing Trends 2018. https://www.3dhubs.com/trends Accessed: 2018--2--2.Google ScholarGoogle Scholar
  38. Rick Hurd. 2016. Homemade gun in Stanford student's murder-suicide spurs question on 'ghost guns'. (Aug. 2016). https://www.mercurynews.com/2015/08/06/homemade-gun-in-stanford-students-murder-suicide-spurs-question-on-ghost-guns/Google ScholarGoogle Scholar
  39. Beau Jackson, Rushabh Haria, Michael Petch, Katie Armstrong, Michael Molitch-Hou, Alicia Miller, Jenny Shang, Lydia Mahon, and Nick Hall. 2018. AR-15 with 3D Printed Lower Receiver Seized in Oregon. (Jan. 2018). https://3dprintingindustry.com/news/ar-15-with-3d-printed-lower-receiver-seized-in-oregon-52234/Google ScholarGoogle Scholar
  40. Zachary C Kennedy, David E Stephenson, Josef F Christ, Timothy R Pope, Bruce W Arey, Christopher A Barrett, and Marvin G Warner. 2017. Enhanced anti-counterfeiting measures for additive manufacturing: coupling lanthanide nanomaterial chemical signatures with blockchain technology. Journal of Materials Chemistry C Vol. 5, 37 (2017), 9570--9578.Google ScholarGoogle ScholarCross RefCross Ref
  41. Nitin Khanna, Aravind K Mikkilineni, George T-C Chiu, Jan P Allebach, and Edward J Delp. 2008. Survey of Scanner and Printer Forensics at Purdue University. IWCF Vol. 8 (2008), 22--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Sandeep S Kumar, Jorge Guajardo, Roel Maes, Geert-Jan Schrijen, and Pim Tuyls. 2008. The butterfly PUF protecting IP on every FPGA. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. IEEE, 67--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Jae W Lee, Daihyun Lim, Blaise Gassend, G Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In VLSI Circuits, 2004. Digest of Technical Papers. 2004 Symposium on. IEEE, 176--179.Google ScholarGoogle ScholarCross RefCross Ref
  44. Suk-Hawn Lee, Tae-Su Kim, Byung-Ju Kim, Seong-Geun Kwon, Ki-Ryong Kwon, and Kuhn-Il Lee. 2003. 3D polygonal meshes watermarking using normal vector distributions Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on, Vol. Vol. 3. IEEE, III--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Chang-Tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security, Vol. 5, 2 (2010), 280--287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Daihyun Lim, Jae W Lee, Blaise Gassend, G Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2005. Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 13, 10 (2005), 1200--1205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Benoıt Macq, Patrice Rondao Alface, and Mireia Montanola. 2015. Applicability of watermarking for intellectual property rights protection in a 3d printing scenario. In Proceedings of the 20th International Conference on 3D Web Technology. ACM, 89--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Eric Métois, Paul Yarin, Noah Salzman, and Joshua R Smith. 2002. FiberFingerprint identification. In Proc. 3rd Workshop on Automatic Identification. 147--154.Google ScholarGoogle Scholar
  49. Aravind K Mikkilineni, Osman Arslan, Pei-Ju Chiang, Roy M Kumontoy, Jan P Allebach, George T-C Chiu, and Edward J Delp. 2005. Printer forensics using svm techniques. In NIP & Digital Fabrication Conference, Vol. Vol. 2005. Society for Imaging Science and Technology, 223--226.Google ScholarGoogle Scholar
  50. Dieter Muhs, Herbert Wittel, Dieter Jannasch, and Joachim Voßiek. 2003. Roloff/Matek Maschinenelemente. Springer.Google ScholarGoogle Scholar
  51. Ke Nie, Jeon-Hor Chen, J Yu Hon, Yong Chu, Orhan Nalcioglu, and Min-Ying Su. 2008. Quantitative analysis of lesion morphology and texture features for diagnostic prediction in breast MRI. Academic radiology, Vol. 15, 12 (2008), 1513--1525.Google ScholarGoogle ScholarCross RefCross Ref
  52. Marios Papas, Thomas Houit, Derek Nowrouzezahrai, Markus H Gross, and Wojciech Jarosz. 2012. The magic lens: refractive steganography. ACM Trans. Graph., Vol. 31, 6 (2012), 186--1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Hemant Sengar. 2014. VoIP Fraud: Identifying a Wolf in Sheep's Clothing Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 334--345. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Ashlesh Sharma, Lakshminarayanan Subramanian, and Eric A Brewer. 2011. PaperSpeckle: microscopic fingerprinting of paper. Proceedings of the 18th ACM conference on Computer and communications security. ACM, 99--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Robert L Skubic and James W Comb. 2012. Adjustable platform assembly for digital manufacturing system. (April 10. 2012). US Patent 8,153,183.Google ScholarGoogle Scholar
  56. Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, and Wenyao Xu. 2016. My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 895--907. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch Authentication Using Hand Geometry and Behavioral Information Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 357--372.Google ScholarGoogle Scholar
  58. Ying Su, Jeremy Holleman, and Brian Otis. 2007. A 1.6 pJ/bit 96% stable chip-ID generating circuit using process variations Solid-State Circuits Conference, 2007. ISSCC 2007. Digest of Technical Papers. IEEE International. IEEE, 406--611.Google ScholarGoogle Scholar
  59. G Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation Proceedings of the 44th annual design automation conference. ACM, 9--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Daisuke Suzuki and Koichi Shimizu. 2010. The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. CHES, Vol. Vol. 10. Springer, 366--382. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Ashwin Swaminathan, Min Wu, and KJ Ray Liu. 2008. Digital image forensics via intrinsic fingerprints. IEEE transactions on information forensics and security, Vol. 3, 1 (2008), 101--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Richard Szeliski. 2010. Computer vision: algorithms and applications. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Ehsan Toreini, Siamak F Shahandashti, and Feng Hao. 2017. Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. arXiv preprint arXiv:1705.02510 (2017).Google ScholarGoogle Scholar
  64. Jasper L Tran. 2014. The law and 3D printing. J. Marshall J. Info. Tech. & Privacy L. Vol. 31 (2014), 505.Google ScholarGoogle Scholar
  65. Mihran Tuceryan and Anil K Jain. 1993. Texture analysis. Handbook of pattern recognition and computer vision. World Scientific, 235--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Francesca Uccheddu, Massimiliano Corsini, and Mauro Barni. 2004. Wavelet-based blind watermarking of 3D models. In Proceedings of the 2004 workshop on Multimedia and security. ACM, 143--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Ansel Ugural. 2003. Mechanical design: an integrated approach. McGraw-Hill Science/Engineering/Math.Google ScholarGoogle Scholar
  68. Frerik van Beijnum, EG van Putten, KL Van der Molen, and AP Mosk. 2006. Recognition of paper samples by correlation of their speckle patterns. arXiv preprint physics/0610089 (2006).Google ScholarGoogle Scholar
  69. Vincent Van der Leest, Geert-Jan Schrijen, Helena Handschuh, and Pim Tuyls. 2010. Hardware intrinsic security from D flip-flops. In Proceedings of the fifth ACM workshop on Scalable trusted computing. ACM, 53--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Ingrid Verbauwhede and Roel Maes. 2011. Physically unclonable functions: manufacturing variability as an unclonable device identifier Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI. ACM, 455--460. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Svyatoslav Voloshynovskiy, Maurits Diephuis, Taras Holotyak, and Nabil Standardo. 2014. Physical object identification using micro-structure images. (2014).Google ScholarGoogle Scholar
  72. Gerald Walther. 2015. Printing insecurity? The security implications of 3d-printing of weapons. Science and engineering ethics Vol. 21, 6 (2015), 1435--1445.Google ScholarGoogle Scholar
  73. BT Wang. 2014. A temperature analysis control strategy on 3D printing nozzle. Hunan Normal University (2014).Google ScholarGoogle Scholar
  74. Mark Yampolskiy, Todd R Andel, J Todd McDonald, William B Glisson, and Alec Yasinsac. 2014. Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop. ACM, 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. D-S Yan, Z-Q Cao, and G-R Kong. 2003. Analysis of the driving force by friction in a driving structure of FDM. Journal of Beijing University of Chemical Technology(Natural Science Edition), Vol. 30, 3 (2003), 71--73.Google ScholarGoogle Scholar
  76. Xiaofeng Yang, Srini Tridandapani, Jonathan J Beitler, David S Yu, Emi J Yoshida, Walter J Curran, and Tian Liu. 2012. Ultrasound GLCM texture analysis of radiation-induced parotid-gland injury in head-and-neck cancer radiotherapy: An in vivo study of late toxicity. Medical physics, Vol. 39, 9 (2012), 5732--5739.Google ScholarGoogle Scholar
  77. Wenyao Xu Chi Zhou Zhanpeng Jin Yang Gao, Borui Li. 2018. Watching and Safeguarding Your 3D Printer: Online Process Monitoring Against Cyber-Physical Attacks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 2, 3 (2018). Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Soweon Yoon. 2014. Fingerprint recognition: models and applications. Michigan State University.Google ScholarGoogle Scholar
  79. Robert J Young and Peter A Lovell. 2011. Introduction to polymers. CRC press.Google ScholarGoogle Scholar
  80. Longyu Zhang, Haiwei Dong, and Abdulmotaleb El Saddik. 2016. From 3D sensing to printing: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Vol. 12, 2 (2016), 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 429--440. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Baoshi Zhu, Jiankang Wu, and Mohan S Kankanhalli. 2003. Print signatures for document authentication. In Proceedings of the 10th ACM conference on Computer and communications security. ACM, 145--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Sebastian Zimmeck, Jie S Li, Hyungtae Kim, Steven M Bellovin, and Tony Jebara. 2017. A privacy analysis of cross-device tracking. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 1391--1408. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PrinTracker: Fingerprinting 3D Printers using Commodity Scanners

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      October 2018
      2359 pages
      ISBN:9781450356930
      DOI:10.1145/3243734

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '18 Paper Acceptance Rate134of809submissions,17%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader