Skip to content
University of Maryland LibrariesDigital Repository at the University of Maryland
    • Login
    View Item 
    •   DRUM
    • Applied Research Laboratory for Intelligence and Security (ARLIS)
    • Applied Research Laboratory for Intelligence and Security (ARLIS) Research Works
    • View Item
    •   DRUM
    • Applied Research Laboratory for Intelligence and Security (ARLIS)
    • Applied Research Laboratory for Intelligence and Security (ARLIS) Research Works
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Compromised Additive Manufacturing Supply Chain Workshop Report

    Thumbnail
    View/Open
    AM Compromise Workshop Report - Final.pdf (200.5Kb)
    No. of downloads: 18

    Date
    2021-06-16
    Author
    Sandborn, Peter
    Lucyshyn, William
    Boyd, Marcus
    Das, Diganta
    Akhavantaheri, Hirbod
    Hedberg, Thomas Jr
    Citation
    https://mchess.umd.edu/mchess-compromised-additive-manufacturing-supply-chain-workshop
    DRUM DOI
    https://doi.org/10.13016/4hlu-wdbd
    Metadata
    Show full item record
    Abstract
    The potential widespread adoption of additive manufacturing (AM) technology represents a marked shift in the production value chain. This shift represents a transition from value residing within the physical parts and structures, built from traditional designs and fabricated using conventional manufacturing to systems and components produced via additive manufacturing processes, wherein the value resides in the digital technical designs themselves, e.g., technical data packages (TDPs). While the ability to produce parts and structures anywhere there are appropriate facilities and personnel provides great flexibility in the production process, the increasing reliance on digital data creates new challenges and complications (and new opportunities for malicious actors). Breaches of the data systems exchanging proprietary technical data packages enable anyone with access to the data and the appropriate equipment, to manufacture copies of the proprietary parts or structures and steal the intellectual property associated with the data package. Moreover, with the advent of affordable laser scanners, parts can be more readily reverse engineered to replicate the geometry (form & fit), but not necessarily function. These compromised parts could, in turn, be introduced into the supply chain, either for financial gain or other malicious purposes, without the requisite production controls (materials and processes), testing, evaluation, and qualification, leading to potential safety and liability issues. This Workshop focused on the unique issues posed by compromised AM parts and components and how they can be mitigated.
    URI
    http://hdl.handle.net/1903/29058
    Collections
    • Applied Research Laboratory for Intelligence and Security (ARLIS) Research Works

    DRUM is brought to you by the University of Maryland Libraries
    University of Maryland, College Park, MD 20742-7011 (301)314-1328.
    Please send us your comments.
    Web Accessibility
     

     

    Browse

    All of DRUMCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister
    Pages
    About DRUMAbout Download Statistics

    DRUM is brought to you by the University of Maryland Libraries
    University of Maryland, College Park, MD 20742-7011 (301)314-1328.
    Please send us your comments.
    Web Accessibility