{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T04:19:34Z","timestamp":1729138774474,"version":"3.27.0"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607216","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"179-194","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of the 3MF Data Format"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3182-4059","authenticated-orcid":false,"given":"Jost","family":"Rossel","sequence":"first","affiliation":[{"name":"Paderborn University, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9208-9281","authenticated-orcid":false,"given":"Vladislav","family":"Mladenov","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3593-7720","authenticated-orcid":false,"given":"Juraj","family":"Somorovsky","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"unstructured":"3MF Consortium. 2020. 3MF Consortium Members. https:\/\/3mf.io\/membership\/","key":"e_1_3_2_1_5_1"},{"unstructured":"3MF Consortium. 2021. Enabling the Full Potential of 3D Printing with the 3MF File Format. https:\/\/3mf.io\/wp-content\/uploads\/sites\/106\/2021\/02\/3MF_Overview_Website_PPT-Updated-July-2020.pptx","key":"e_1_3_2_1_8_1"},{"unstructured":"3MF Consortium. 2021. Lib3mf. https:\/\/github.com\/3MFConsortium\/lib3mf","key":"e_1_3_2_1_9_1"},{"unstructured":"Additive-X. 2021. What File Formats Are Used In 3D Printing?https:\/\/www.additive-x.com\/blog\/file-formats-used-3d-printing\/","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/ICCPS.2016.7479068"},{"volume-title":"This PDF is a JPEG","year":"2014","author":"Albertini Ange","unstructured":"Ange Albertini. 2014. This PDF is a JPEG; or, This Proof of Concept is a Picture of Cats. PoC 11 GTFO 0x03 3 (2014), 8\u20139. https:\/\/www.alchemistowl.org\/pocorgtfo\/pocorgtfo03.pdf","key":"e_1_3_2_1_12_1"},{"unstructured":"America Makes & ANSI Additive Manufacturing Standardization\u00a0Collaborative (AMSC). 2018. Standardization Roadmap for Additive Manufacturing (VERSION 2.0). https:\/\/share.ansi.org\/Shared%20Documents\/Standards%20Activities\/AMSC\/AMSC_Roadmap_June_2018.pdf","key":"e_1_3_2_1_13_1"},{"unstructured":"Caroline\u00a0R. Arms Carl Fleischhauer Kate Murray Marcus Nappier and Liz Holdzkom. 2019. STL (STereoLithography) File Format Family. https:\/\/www.loc.gov\/preservation\/digital\/formats\/fdd\/fdd000504.shtml","key":"e_1_3_2_1_14_1"},{"unstructured":"Caroline\u00a0R. Arms Carl Fleischhauer Kate Murray Marcus Nappier and Liz Holdzkom. 2020. Wavefront OBJ File Format. https:\/\/www.loc.gov\/preservation\/digital\/formats\/fdd\/fdd000507.shtml#history","key":"e_1_3_2_1_15_1"},{"unstructured":"Prusa\u00a0Research a.s.2021. PrusaSlicer. https:\/\/github.com\/prusa3d\/PrusaSlicer","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.14722\/ndss.2019.23412"},{"unstructured":"Autodesk Inc.2021. Fusion 360 Personal. https:\/\/www.autodesk.com\/products\/fusion-360\/personal","key":"e_1_3_2_1_18_1"},{"unstructured":"Autodesk Inc.2022. MeshMixer. https:\/\/www.meshmixer.com\/","key":"e_1_3_2_1_19_1"},{"unstructured":"AyrA. 2022. ZipBomb. https:\/\/github.com\/AyrA\/ZipBomb","key":"e_1_3_2_1_20_1"},{"volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","year":"2017","author":"Belikovetsky Sofia","unstructured":"Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, and Yuval Elovici. 2017. Dr0wned \u2013 Cyber-Physical Attack with Additive Manufacturing. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/belikovetsky","key":"e_1_3_2_1_21_1"},{"unstructured":"Blender Foundation. 2021. Blender.Org - Home of the Blender Project - Free and Open 3D Creation Software. https:\/\/www.blender.org\/","key":"e_1_3_2_1_22_1"},{"unstructured":"Paul Bourke. 1999. STL. http:\/\/paulbourke.net\/dataformats\/stl\/","key":"e_1_3_2_1_23_1"},{"unstructured":"R.\u00a0Nial Bradshaw. 2019. First metallic 3D printed part installed on F-22. https:\/\/www.hill.af.mil\/News\/Article-Display\/Article\/1734175\/first-metallic-3d-printed-part-installed-on-f-22\/","key":"e_1_3_2_1_24_1"},{"unstructured":"CHITUBOX. 2022. CHITUBOX Pro. https:\/\/www.chitubox.com\/en\/chitubox-pro","key":"e_1_3_2_1_25_1"},{"unstructured":"Craftunique ltd.2021. CraftWare Pro. https:\/\/craftbot.com\/software","key":"e_1_3_2_1_26_1"},{"volume-title":"Format","author":"DIN Standards Committee Machine Tools. 1983.","unstructured":"DIN Standards Committee Machine Tools. 1983. DIN 66025-1\u2014Numerical Control of Machines, Format; General Requirements. https:\/\/www.din.de\/en\/getting-involved\/standards-committees\/nwm\/publications\/wdc-beuth:din21:1012276","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/TIFS.2016.2578285"},{"volume-title":"3D Printer File Formats: Most Common Ones","year":"2021","author":"Douglas Ken","unstructured":"Ken Douglas. 2021. 3D Printer File Formats: Most Common Ones in 2021. https:\/\/all3dp.com\/2\/3d-file-format-3d-model-types\/","key":"e_1_3_2_1_29_1"},{"unstructured":"David Fifield. 2019. A Better Zip Bomb. https:\/\/www.bamsoftware.com\/hacks\/zipbomb\/","key":"e_1_3_2_1_30_1"},{"volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","year":"2020","author":"Fioraldi Andrea","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++ : Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi","key":"e_1_3_2_1_31_1"},{"unstructured":"Joseph Flynt. 2019. Common 3D Printing File Formats: Which Is the Best?https:\/\/3dinsider.com\/3d-printing-file-formats\/","key":"e_1_3_2_1_32_1"},{"unstructured":"Fortune Business Insights. 2022. 3D Printing Market Size Share & COVID-19 Impact Analysis By Component (Hardware Software Services) By Technology (FDM SLS SLA DMLS\/SLM Polyjet Multi Jet Fusion DLP Binder Jetting EBM CLIP\/CDLP SDL LOM) By Application (Prototyping Production Proof of Concept Others) By End-User (Automotive Aerospace and Defense Healthcare Architecture and Construction Consumer Products Education Others) and Regional Forecast 2022\u20132029. https:\/\/www.fortunebusinessinsights.com\/industry-reports\/3d-printing-market-101902","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.14722\/ndss.2019.23263"},{"volume-title":"Proceedings of the Solid Freeform Fabrication Symposium, Vol.\u00a03. Citeseer, Texas ScholarWorks","year":"2009","author":"Hiller D","unstructured":"Jonathan\u00a0D Hiller and Hod Lipson. 2009. STL 2.0: A Proposal for a Universal Multi-Material Additive Manufacturing File Format. In Proceedings of the Solid Freeform Fabrication Symposium, Vol.\u00a03. Citeseer, Texas ScholarWorks, Austin, Texas, USA, 266\u2013278.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2976749.2978323"},{"unstructured":"Hot-World GmbH & Co. KG. 2022. Repetier Host. https:\/\/www.repetier.com\/","key":"e_1_3_2_1_37_1"},{"unstructured":"Internet Assigned Numbers Authority (IANA). 2021. Media Types. https:\/\/www.iana.org\/assignments\/media-types\/media-types.xhtml","key":"e_1_3_2_1_38_1"},{"unstructured":"Devin Johnson. 2019. 3MF: The File Format for the Future of 3D Printing. https:\/\/hawkridgesys.com\/blog\/3mf-the-file-format-for-the-future-of-3d-printing","key":"e_1_3_2_1_39_1"},{"unstructured":"Amit Klein. 2002. Multiple vendors XML parser (and SOAP\/WebServices server) Denial of Service attack using DTD. https:\/\/cwe.mitre.org\/data\/definitions\/776.html","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1007\/s10664-018-9600-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2508859.2516685"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.14722\/ndss.2021.24117"},{"unstructured":"Mango3D. 2021. LycheeSlicer. https:\/\/mango3d.io\/downloads\/","key":"e_1_3_2_1_44_1"},{"volume-title":"PDF Mirage: Content Masking Attack Against Information-Based Online Services. In 26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Markwood Ian","unstructured":"Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu. 2017. PDF Mirage: Content Masking Attack Against Information-Based Online Services. In 26th USENIX Security Symposium (USENIX Security 17), (Vancouver, BC). 833\u2013847.","key":"e_1_3_2_1_45_1"},{"unstructured":"Marlin. 2021. MarlinFirmware. https:\/\/github.com\/MarlinFirmware\/Marlin","key":"e_1_3_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/SPW50608.2020.00035"},{"unstructured":"McLaren. 2017. McLaren Deploys Stratasys Additive Manufacturing to Improve 2017 Car Performance. https:\/\/www.mclaren.com\/racing\/partners\/stratasys\/mclaren-deploys-stratasys-additive-manufacturing-improve-2017-car-performance\/","key":"e_1_3_2_1_48_1"},{"unstructured":"Merill. 2022. SuperSlicer. https:\/\/github.com\/supermerill\/SuperSlicer","key":"e_1_3_2_1_49_1"},{"unstructured":"Microsoft Corporation. 2011. .NET Framework Class Library for Silverlight. https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/silverlight\/dotnet-windows-silverlight\/bb538974(v=vs.95)","key":"e_1_3_2_1_50_1"},{"unstructured":"Microsoft Corporation. 2021. 3D Builder. https:\/\/www.microsoft.com\/en-us\/p\/3d-builder\/9wzdncrfj3t6","key":"e_1_3_2_1_51_1"},{"unstructured":"Microsoft Corporation. 2021. 3D Viewer. https:\/\/www.microsoft.com\/en-us\/p\/3d-viewer\/9nblggh42ths","key":"e_1_3_2_1_52_1"},{"unstructured":"Microsoft Corporation. 2021. Paint 3D. https:\/\/www.microsoft.com\/en-us\/p\/paint-3d\/9nblggh5fv99","key":"e_1_3_2_1_53_1"},{"unstructured":"Microsoft Corporation. 2022. Office 365. https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-office","key":"e_1_3_2_1_54_1"},{"unstructured":"Microsoft Corporation. 2022. WinAppDriver. https:\/\/github.com\/microsoft\/WinAppDriver","key":"e_1_3_2_1_55_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1109\/RWEEK.2016.7573305"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.24251\/HICSS.2017.735"},{"volume-title":"And Segment Forecasts, 2023","year":"2023","author":"Intelligence Mordor","unstructured":"Mordor Intelligence. 2023. 3D Printing Market Size, Share & Trends Analysis Report By Component (Hardware, Software, Services), By Printer Type, By Technology, By Software, By Application, By Vertical, By Region, And Segment Forecasts, 2023 \u2013 2030. https:\/\/www.grandviewresearch.com\/industry-analysis\/3d-printing-industry-analysis","key":"e_1_3_2_1_58_1"},{"unstructured":"Timothy\u00a0D Morgan and Omar\u00a0Al Ibrahim. 2014. XML Schema DTD and Entity Attacks. https:\/\/vsecurity.com\/\/download\/papers\/XMLDTDEntityAttacks.pdf","key":"e_1_3_2_1_59_1"},{"volume-title":"Office Document Security and Privacy. In 14th USENIX Workshop on Offensive Technologies (WOOT 20)","year":"2020","author":"M\u00fcller Jens","unstructured":"Jens M\u00fcller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, and J\u00f6rg Schwenk. 2020. Office Document Security and Privacy. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/muller","key":"e_1_3_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.14722\/ndss.2021.23109"},{"unstructured":"NCH Software Inc.2022. MeshMagic Free 3D Modeling Software. https:\/\/www.nchsoftware.com\/meshmagic3d\/index.html","key":"e_1_3_2_1_62_1"},{"volume-title":"In the Compression Hornet\u2019s Nest: A Security Study of Data Compression in Network Services. In 24th USENIX Security Symposium (USENIX Security 15)","year":"2015","author":"Pellegrino Giancarlo","unstructured":"Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, and Neeraj Suri. 2015. In the Compression Hornet\u2019s Nest: A Security Study of Data Compression in Network Services. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 801\u2013816. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/pellegrino","key":"e_1_3_2_1_63_1"},{"unstructured":"PKWARE Inc.2020. APPNOTE.TXT -.ZIP File Format Specification 6.2.0. https:\/\/pkware.cachefly.net\/webdocs\/APPNOTE\/APPNOTE-6.2.0.txt","key":"e_1_3_2_1_64_1"},{"unstructured":"Raise 3D Technologies Inc.2021. ideaMaker. https:\/\/www.raise3d.com\/ideamaker\/","key":"e_1_3_2_1_65_1"},{"unstructured":"replicatorg. 2020. ReplicatorG. https:\/\/github.com\/replicatorg\/ReplicatorG","key":"e_1_3_2_1_66_1"},{"volume-title":"Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures. In 31st USENIX Security Symposium (USENIX\u201922)","year":"2022","author":"Rohlmann Simon","unstructured":"Simon Rohlmann, Christian Mainka, Vladislav Mladenov, and J\u00f6rg Schwenk. 2022. Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures. In 31st USENIX Security Symposium (USENIX\u201922). Ruhr University Bochum, USENIX, Boston, MA. https:\/\/www.usenix.org\/system\/files\/sec22fall_rohlmann.pdf","key":"e_1_3_2_1_67_1"},{"volume-title":"OOXML Signatures. In 32st USENIX Security Symposium (USENIX\u201923)","year":"2023","author":"Rohlmann Simon","unstructured":"Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and J\u00f6rg Schwenk. 2023. Every Signature is Broken: On the Insecurity of Microsoft Office\u2019s OOXML Signatures. In 32st USENIX Security Symposium (USENIX\u201923). Ruhr University Bochum, USENIX, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/rohlmann","key":"e_1_3_2_1_68_1"},{"unstructured":"Simplify3D. 2021. Simplify3D. https:\/\/www.simplify3d.com\/","key":"e_1_3_2_1_69_1"},{"unstructured":"Slic3r. 2021. Slic3r. https:\/\/github.com\/slic3r\/Slic3r","key":"e_1_3_2_1_70_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/2976749.2978300"},{"unstructured":"Christopher Sp\u00e4th Christian Mainka and Vladislav Mladenov. 2016. DTD Cheat Sheet. https:\/\/web-in-security.blogspot.com\/2016\/03\/xxe-cheat-sheet.html","key":"e_1_3_2_1_72_1"},{"volume-title":"SoK: XML Parser Vulnerabilities. In USENIX Workshop on Offensive Technologies (WOOT). https:\/\/www.usenix.org\/system\/files\/conference\/woot16\/woot16-paper-spath.pdf","year":"2016","author":"Sp\u00e4th Christopher","unstructured":"Christopher Sp\u00e4th, Christian Mainka, Vladislav Mladenov, and J\u00f6rg Schwenk. 2016. SoK: XML Parser Vulnerabilities. In USENIX Workshop on Offensive Technologies (WOOT). https:\/\/www.usenix.org\/system\/files\/conference\/woot16\/woot16-paper-spath.pdf","key":"e_1_3_2_1_73_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/3460319.3464814"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.1016\/j.jmsy.2017.05.007"},{"volume-title":"ISO\/IEC JTC 1\/SC 34 Document description and processing languages","year":"2012","author":"Technical Committee","unstructured":"Technical Committee: ISO\/IEC JTC 1\/SC 34 Document description and processing languages. 2012. ISO\/IEC 29500-2:2012\u2014Information Technology\u2014Document Description and Processing Languages\u2014Office Open XML File Formats\u2014Part 2: Open Packaging Conventions. https:\/\/www.iso.org\/cms\/render\/live\/en\/sites\/isoorg\/contents\/data\/standard\/06\/17\/61796.html","key":"e_1_3_2_1_76_1"},{"volume-title":"ISO\/TC 184\/SC 1 Physical device control","year":"2009","author":"Technical Committee","unstructured":"Technical Committee: ISO\/TC 184\/SC 1 Physical device control. 2009. ISO 6983-1:2009\u2014Automation Systems and Integration\u2014Numerical Control of Machines\u2014Program Format and Definitions of Address Words\u2014Part 1: Data Format for Positioning, Line Motion and Contouring Control Systems. https:\/\/www.iso.org\/standard\/34608.html","key":"e_1_3_2_1_77_1"},{"volume-title":"ISO\/TC 261 Additive manufacturing","year":"2020","author":"Technical Committee","unstructured":"Technical Committee: ISO\/TC 261 Additive manufacturing. 2020. ISO\/ASTM 52915:2020\u2014Specification for Additive Manufacturing File Format (AMF) Version 1.2. https:\/\/www.iso.org\/standard\/74640.html","key":"e_1_3_2_1_78_1"},{"unstructured":"Ultimaker BV. 2021. Cura. https:\/\/github.com\/Ultimaker\/Cura","key":"e_1_3_2_1_79_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_80_1","DOI":"10.7717\/peerj.453"},{"volume-title":"Superion: Grammar-Aware Greybox Fuzzing. 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","year":"2018","author":"Wang Junjie","unstructured":"Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2018. Superion: Grammar-Aware Greybox Fuzzing. 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE) (2018), 724\u2013735.","key":"e_1_3_2_1_81_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_82_1","DOI":"10.1109\/TIP.2003.819861"},{"volume-title":"early","year":"1990","author":"Technologies Wavefront","unstructured":"Wavefront Technologies. early 1990s. The Advanced Visualizer\u2014Appendix B1. Object Files (.Obj). http:\/\/fegemo.github.io\/cefet-cg\/attachments\/obj-spec.pdf","key":"e_1_3_2_1_83_1"},{"unstructured":"Wikipedia. 2021. Additive Manufacturing File Format. https:\/\/en.wikipedia.org\/w\/index.php?title=Additive_manufacturing_file_format&oldid=1006536882","key":"e_1_3_2_1_84_1"},{"unstructured":"Wikipedia. 2021. Comparison of Computer-Aided Design Software. https:\/\/en.wikipedia.org\/w\/index.php?title=Comparison_of_computer-aided_design_software&oldid=1020737550","key":"e_1_3_2_1_85_1"},{"volume-title":"Extensible Markup Language (XML) 1.0","year":"2008","author":"World Wide Web Consortium","unstructured":"World Wide Web Consortium. 2008. Extensible Markup Language (XML) 1.0 (Fifth Edition). https:\/\/www.w3.org\/TR\/2008\/REC-xml-20081126\/","key":"e_1_3_2_1_86_1"},{"unstructured":"World Wide Web Consortium. 2010. W3C XML Linking Language (XLink) 1.1. http:\/\/www.w3.org\/TR\/xlink11\/","key":"e_1_3_2_1_87_1"},{"unstructured":"World Wide Web Consortium. 2012. W3C XML Schema Definition Language (XSD) 1.1 Part 1: Structures. https:\/\/www.w3.org\/TR\/xmlschema11-1\/","key":"e_1_3_2_1_88_1"},{"unstructured":"World Wide Web Consortium. 2012. W3C XML Schema Definition Language (XSD) 1.1 Part 2: Datatypes. https:\/\/www.w3.org\/TR\/xmlschema11-2\/","key":"e_1_3_2_1_89_1"},{"unstructured":"World Wide Web Consortium. 2016. W3C XML Inclusions (XInclude) 1.1. https:\/\/www.w3.org\/TR\/xinclude-11\/","key":"e_1_3_2_1_90_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_91_1","DOI":"10.1016\/j.addma.2018.03.015"},{"unstructured":"Timur Yunusov and Alexey Osipov. 2013. XML Out-Of\u2010Band Data Retrieval. https:\/\/media.blackhat.com\/eu-13\/briefings\/Osipov\/bh-eu-13-XML-data-osipov-slides.pdf","key":"e_1_3_2_1_92_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_93_1","DOI":"10.1007\/s11837-016-1937-7"},{"unstructured":"Zhejiang Flashforge 3D technology Co. LTD. 2021. FlashPrint 5. https:\/\/flashforge-usa.com\/pages\/download","key":"e_1_3_2_1_94_1"},{"unstructured":"Zortrax S.A.2021. Z-SUITE. https:\/\/zortrax.com\/software\/","key":"e_1_3_2_1_95_1"}],"event":{"acronym":"RAID 2023","name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:35:40Z","timestamp":1729074940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":89,"alternative-id":["10.1145\/3607199.3607216","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607216","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}