scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Book ChapterDOI
TL;DR: In this article, the root mean square (rms) of the orbital elements and the proper elements of the asteroids were compared with the corresponding proper elements for each time interval, and it was shown that the variations of the proper element e p in different time intervals are correlated with corresponding rms(e); this is not the case for sin I p with rms (i) with Rms(i)
Abstract: The orbits of 13 Trojan asteroids have been calculated numerically in the model of the outer solar system for a time interval of 100 million years For these asteroids (1997) determined Lyapunov times less than 100000 years and introduced the notion “asteroids in stable chaotic motion” We studied the dynamical behavior of these Trojan asteroids (except the asteroid Thersites which escaped after 26 million years) within 11 time intervals — ie subintervals of the whole time — by means of: (1) a numerical frequency analysis (2) the root mean square (rms) of the orbital elements and (3) the proper elements For each time interval we compared the root mean squares of the orbital elements (a, e and i) with the corresponding proper element It turned out that the variations of the proper elements e p in the different time intervals are correlated with the corresponding rms(e); this is not the case for sin I p with rms(i)

15 citations

Proceedings ArticleDOI
04 Dec 2014
TL;DR: This paper proposes to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage, which exploits non-zero aliasing probability of LBIST.
Abstract: As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.

15 citations

Journal ArticleDOI
TL;DR: Two important threat models are referred to and the detection and mitigation techniques against these types of attacks on neural networks which has been proposed recently are focused on.

15 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168