Topic
Trojan
About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the root mean square (rms) of the orbital elements and the proper elements of the asteroids were compared with the corresponding proper elements for each time interval, and it was shown that the variations of the proper element e p in different time intervals are correlated with corresponding rms(e); this is not the case for sin I p with rms (i) with Rms(i)
Abstract: The orbits of 13 Trojan asteroids have been calculated numerically in the model of the outer solar system for a time interval of 100 million years For these asteroids (1997) determined Lyapunov times less than 100000 years and introduced the notion “asteroids in stable chaotic motion” We studied the dynamical behavior of these Trojan asteroids (except the asteroid Thersites which escaped after 26 million years) within 11 time intervals — ie subintervals of the whole time — by means of: (1) a numerical frequency analysis (2) the root mean square (rms) of the orbital elements and (3) the proper elements For each time interval we compared the root mean squares of the orbital elements (a, e and i) with the corresponding proper element It turned out that the variations of the proper elements e p in the different time intervals are correlated with the corresponding rms(e); this is not the case for sin I p with rms(i)
15 citations
••
04 Dec 2014TL;DR: This paper proposes to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage, which exploits non-zero aliasing probability of LBIST.
Abstract: As demonstrated by the recent attack on Intel's Ivy Bridge processor, the traditional Logic Built-In Self-Test (LBIST) methods do not provide adequate protection of SoC against malicious modifications known as hardware Trojans. In this paper, we introduce a simple but efficient countermeasure against hardware Trojans which exploits non-zero aliasing probability of LBIST. We propose to generate LBIST test patterns based on a configurable key which is decided and programed into the circuit after the manufacturing stage. Since the key and hence expected LBIST signature are unknown at the manufacturing stage, an attack based on selecting suitable values for the Trojan which result in the same signature as a fault-free circuit signature becomes infeasible.
15 citations
•
15 citations
••
TL;DR: Two important threat models are referred to and the detection and mitigation techniques against these types of attacks on neural networks which has been proposed recently are focused on.
15 citations