scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, an upper bound on the optical depth of Trojans in the HD 209458 system was established, which can be used to guide current and future searches of similar systems by upcoming missions.
Abstract: We have searched Microvariability and Oscillations of STars (MOST) satellite photometry obtained in 2004, 2005, and 2007 of the solar-type star HD 209458 for Trojan asteroid swarms dynamically coupled with the system's transiting "hot Jupiter" HD 209458b. Observations of the presence and nature of asteroids around other stars would provide unique constraints on migration models of exoplanetary systems. Our results set an upper limit on the optical depth of Trojans in the HD 209458 system that can be used to guide current and future searches of similar systems by upcoming missions. Using cross-correlation methods with artificial signals implanted in the data, we find that our detection limit corresponds to a relative Trojan transit depth of 1\times10-4, equivalent to ~1 lunar mass of asteroids, assuming power-law Trojan size distributions similar to Jupiter's Trojans in our solar system. We confirm with dynamical interpretations that some asteroids could have migrated inward with the planet to its current orbit at 0.045 AU, and that the Yarkovsky effect is ineffective at eliminating objects of > 1 m in size. However, using numerical models of collisional evolution we find that, due to high relative speeds in this confined Trojan environment, collisions destroy the vast majority of the asteroids in <10 Myr. Our modeling indicates that the best candidates to search for exoTrojan swarms in 1:1 mean resonance orbits with "hot Jupiters" are young systems (ages of about 1 Myr or less). Years of Kepler satellite monitoring of such a system could detect an asteroid swarm with a predicted transit depth of 3\times10-7.

16 citations

Patent
31 Oct 2012
TL;DR: In this article, a detection method of rebound type Trojan, which comprises the steps of real timely monitoring a network packet of a current system, real timely obtaining an association list of network connection and progress of the current system; carrying out analysis and matching on the network packet, and obtaining a questionable connection list from the analysis result.
Abstract: The invention discloses a detection method of rebound type Trojan, which comprises the steps of: real timely monitoring a network packet of a current system; real timely obtaining an association list of network connection and progress of the current system; carrying out analysis and matching on the network packet, and obtaining a questionable connection list from the analysis result, wherein the analyzed and matched network packet type comprises a DNS (domain name service) request, FTP (file transfer protocol) connection and IP (internet protocol) connection; analyzing the progress to obtain a questionable progress list; and carrying out correlation analysis on the questionable connection list and the questionable progress list and disposing. The invention also discloses a detection system of the rebound type Trojan. According to the invention, known and unknown control type Trojans are firstly found by associating the system process state and network characteristic matching, and the connection of a control end can be cut off and malicious code is removed at the first time, so that the purpose of protecting host safety is achieved.

16 citations

Journal ArticleDOI
TL;DR: In this article, an asymptotic solution for the cylindrical coordinates of Trojan asteroids is derived by using a three-variable expansion method in the elliptic restricted three-body problem.
Abstract: An asymptotic solution for the cylindrical coordinates of Trojan asteroids is derived by using a three-variable expansion method in the elliptic restricted three-body problem. The perturbations of the orbital elements are obtained from this solution by applying the formulas of the two-body problem. The main perturbations of the mean motion are studied in detail.

16 citations

Journal Article
TL;DR: In this paper, the authors present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provably-secure side-channel analysis protected implementation, and the Trojan is triggered, the malicious design exhibits exploitable sidechannel leakage leading to successful key recovery attacks.
Abstract: Hardware Trojans have gained high attention in academia, industry and by government agencies. The effective detection mechanisms and countermeasures against such malicious designs are only possible when there is a deep understanding of how hardware Trojans can be built in practice. In this work, we present a mechanism which shows how easily a stealthy hardware Trojan can be inserted in a provably-secure side-channel analysis protected implementation. Once the Trojan is triggered, the malicious design exhibits exploitable side-channel leakage leading to successful key recovery attacks. Such a Trojan does not add or remove any logic (even a single gate) to the design which makes it very hard to detect. In ASIC platforms, it is indeed inserted by subtle manipulations at the sub-transistor level to modify the parameters of a few transistors. The same is applicable on FPGA applications by changing the routing of particular signals, leading to null resource utilization overhead. The underlying concept is based on a secure masked hardware implementation which does not exhibit any detectable leakage. However, by running the device at a particular clock frequency one of the requirements of the underlying masking scheme is not fulfilled anymore, i.e., the Trojan is triggered, and the device’s side-channel leakage can be exploited.

16 citations

Journal Article

16 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168