3. Consortium, Core Specification and Reference Guide, Version 1.1, p.2015, 2016.

M. Faruque, S. Chhetri, A. Canedo, and J. Wan, Acoustic Side-Channel Attacks on Additive Manufacturing Systems, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), 2016.
DOI : 10.1109/ICCPS.2016.7479068

M. Faruque, S. Chhetri, S. Faezi, and A. Canedo, Forensics of Thermal Side-Channels in Additive Manufacturing Systems, 2016.

A. Society, . Testing, and I. /. Materials, Standard Specification for Additive Manufacturing File Format (AMF), Version 1, pp.52915-52931, 2016.

H. Atkinson and S. Davies, Fundamental aspects of hot isostatic pressing: An overview, Metallurgical and Materials Transactions A, vol.107, issue.1???2, pp.2981-3000, 2000.
DOI : 10.1016/0921-5093(89)90379-1

S. Belikovetsky, M. Yampolskiy, J. Toh, J. Gatlin, and Y. Elovici, Proceedings of the Eleventh USENIX Workshop on Offensive Technologies, 2017.

N. Bilton, The rise of 3-D printed guns, The New York Times, 2014.

J. Blackman, The 1st Amendment, 2nd Amendment and 3D printed guns, Tennessee Law Review, vol.81, issue.3, pp.479-538, 2014.

A. Brown, M. Yampolskiy, J. Gatlin, and T. Andel, Legal Aspects of Protecting Intellectual Property in Additive Manufacturing, pp.63-79, 2016.
DOI : 10.1007/978-3-319-26567-4_11

URL : https://hal.archives-ouvertes.fr/hal-01614864

A. Cardenas, S. Amin, and S. Sastry, Secure Control: Towards Survivable Cyber-Physical Systems, 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp.495-500, 2008.
DOI : 10.1109/ICDCS.Workshops.2008.40

K. Chan, M. Koike, R. Mason, and T. Okabe, Fatigue Life of Titanium Alloys Fabricated by Additive Layer Manufacturing Techniques for Dental Implants, Metallurgical and Materials Transactions A, vol.28, issue.5, pp.1010-1022, 2013.
DOI : 10.4012/dmj.28.587

S. Chhetri, A. Canedo, and M. Faruque, KCAD, Proceedings of the 35th International Conference on Computer-Aided Design, ICCAD '16, 2016.
DOI : 10.1201/9781420027730

Q. Do, B. Martini, and K. Choo, A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers, IEEE Transactions on Information Forensics and Security, vol.11, issue.10, pp.2174-2186, 2016.
DOI : 10.1109/TIFS.2016.2578285

, ANSI/EIA RS-274-D-1980: Interchangeable Variable Block Data Format for Positioning, Contouring and Contouring/Positioning Numerically Controlled Machines, Electronic Industries Association, 1980.

N. Falliere, L. O. Murchu, E. Chien, and W. , , 2011.

W. Frazier, Metal Additive Manufacturing: A Review, Journal of Materials Engineering and Performance, vol.35, issue.2, pp.1917-1928, 2014.
DOI : 10.1007/s11663-004-0104-7

D. Helbing, Globally networked risks and how to respond, Nature, vol.333, issue.7447, pp.51-59, 2013.
DOI : 10.1126/science.1205068

J. Hiller and H. Lipson, 0: A proposal for a universal multi-material additive manufacturing file format, Proceedings of the Solid Freeform Fabrication Symposium, pp.266-278, 2009.

A. Hojjati, A. Adhikari, K. Struckmann, E. Chou, T. Nguyen et al., Leave Your Phone at the Door, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.883-894, 2016.
DOI : 10.1145/1609956.1609959

T. Holbrook and L. Osborn, Digital Patent Infringement in an Era of 3D Printing, SSRN Electronic Journal, vol.48, issue.4, pp.1319-1385, 2015.
DOI : 10.2139/ssrn.2483550

, The Role of (Super) Powders in SLM (www.insidemetaladditivemanufacturing.com/blog/the-roleof-super-powders-in-slm ), 2014.

J. Johnson, Print, lock and load: 3-D printers, creation of guns and the potential threat to Fourth Amendment rights, Journal of Law, Technology and Policy, vol.2013, issue.2, pp.337-361, 2013.

M. Krotofil, A. Cardenas, J. Larsen, and D. Gollmann, Vulnerabilities of cyber-physical systems to stale data???Determining the optimal time to launch attacks, International Journal of Critical Infrastructure Protection, vol.7, issue.4, pp.213-232, 2014.
DOI : 10.1016/j.ijcip.2014.10.003

E. Lee, Cyber Physical Systems: Design Challenges, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp.363-369, 2008.
DOI : 10.1109/ISORC.2008.25

H. Lipson, The basics (Part 1), 3D Printing and Additive Manufacturing, pp.85-87, 2014.

B. Macq, P. Alface, and M. Montanola, Applicability of watermarking for intellectual property rights protection in a 3D printing scenario, Proceedings of the 20th International Conference on 3D Web Technology, Web3D '15, pp.89-95, 2015.
DOI : 10.1007/978-3-540-73092-7_5

K. Mcmullen, Worlds collide when 3D printers reach the public: Modeling a digital gun control law after the Digital Millennium Copyright Act, Michigan State Law Review, vol.2044, issue.1, pp.187-225, 2014.

S. Moore, P. Armstrong, T. Mcdonald, and M. Yampolskiy, Vulnerability analysis of desktop 3D printer software, 2016 Resilience Week (RWS), pp.46-51, 2016.
DOI : 10.1109/RWEEK.2016.7573305

S. Moore, W. Glisson, and M. Yampolskiy, Implications of Malicious 3D Printer Firmware, Proceedings of the 50th Hawaii International Conference on System Sciences (2017), pp.6089-6098, 2017.
DOI : 10.24251/HICSS.2017.735

A. Muller and S. Karevska, How Will 3D Printing Make Your Company the Strongest Link in the Value Chain? EY's Global 3D Printing Report, 2016.

G. Pope, STPA for additive manufacturing, presented at the Systems Theoretic Accident Model and Processes Workshop, 2016.

S. Rinaldi, J. Peerenboom, and T. Kelly, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Systems Magazine, vol.21, issue.6, pp.11-25, 2001.
DOI : 10.1109/37.969131

C. Song, F. Lin, Z. Ba, K. Ren, C. Zhou et al., My Smartphone Knows What You Print, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.895-907, 2016.
DOI : 10.1109/ICASSP.2013.6639033

A. Sternstein, Things can go kaboom when a defense contractor's 3-D printer gets hacked, 2014.

L. Sturm, C. Williams, J. Camelio, J. White, and R. Parker, Cyberphysical vulnerabilities in additive manufacturing systems, Proceedings of the Twenty-Fifth International Solid Freeform Fabrication Symposium, pp.951-963, 2014.

M. Swearingen, S. Brunasso, J. Weiss, and D. Huber, What you need to know (and don't) about the Aurora vulnerability, 2013.

D. Tirone and J. Gilley, 3D printing: A new threat to gun control and security policy? The Conversation (theconversation.com/ 3d-printing-a-new-threat-to-gun-control-and-security-policy- 61416), 2016.

J. Tran, The law and 3D printing, John Marshall Journal of Information Technology and Privacy Law, vol.31, issue.4, pp.505-520, 2015.

H. Turner, J. White, J. Camelio, C. Williams, B. Amos et al., Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks?, IEEE Security & Privacy, vol.13, issue.3, pp.40-47, 2015.
DOI : 10.1109/MSP.2015.60

U. S. , Department of Homeland Security, Critical Infrastructure Sectorswww.dhs.gov/critical-infrastructure-sectors, p.2017

W. Associates and W. Report, , 2016.

C. Xiao, Security attack on 3D printing, presented at the xFocus Information Security Conference, 2013.

Z. Xu and Q. Zhu, Cross-layer secure cyber-physical control system design for networked 3D printers, Proceedings of the American Control Conference, pp.1191-1196, 2016.

M. Yampolskiy, T. Andel, J. Mcdonald, W. Glisson, and A. Yasinsac, Intellectual Property Protection in Additive Layer Manufacturing, Proceedings of the 4th Program Protection and Reverse Engineering Workshop on 4th Program Protection and Reverse Engineering Workshop, PPREW-4, 2014.
DOI : 10.1145/2461446.2461465

M. Yampolskiy, T. Andel, J. Mcdonald, W. Glisson, and A. Yasinsac, Towards security of additive layer manufacturing, presented at the Thirtieth Annual Computer Security Applications Conference, 2014.

M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, and J. Sztipanovits, Taxonomy for descriptions of cross-domain attacks on CPSs, Proceedings of the Second ACM International Conference on High Confidence Networked Systems, pp.135-142, 2013.

M. Yampolskiy, P. Horvath, X. Koutsoukos, Y. Xue, and J. Sztipanovits, A language for describing attacks on cyber-physical systems, International Journal of Critical Infrastructure Protection, vol.8, pp.40-52, 2015.
DOI : 10.1016/j.ijcip.2014.09.003

M. Yampolskiy, L. Schutzle, U. Vaidya, and A. Yasinsac, Security Challenges of Additive Manufacturing with Metals and Alloys, pp.169-183, 2015.
DOI : 10.1007/978-3-319-26567-4_11

URL : https://hal.archives-ouvertes.fr/hal-01431001

M. Yampolskiy, A. Skjellum, M. Kretzschmar, R. Overfelt, K. Sloan et al., Using 3D printers as weapons, International Journal of Critical Infrastructure Protection, vol.14, pp.58-71, 2016.
DOI : 10.1016/j.ijcip.2015.12.004

S. Zeltmann, N. Gupta, N. Tsoutsos, M. Maniatakos, J. Rajendran et al., Manufacturing and Security Challenges in 3D Printing, JOM, vol.43, issue.7, pp.1872-1881, 2016.
DOI : 10.1109/MC.2010.299