scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present a new model that constrains optimal search areas, and imaging cadences for narrow and wide field survey telescopes including the Gaia satellite for the most efficient use of telescope time to maximize the probability of detecting additional Earth Trojans.
Abstract: Trojan asteroids are minor planets that share the orbit of a planet about the Sun and librate around the L4 or L5 Lagrangian points of stability. They are important solar-system fossils because they carry information on early Solar system formation, when collisions between bodies were more frequent. Discovery and study of terrestrial planet Trojans will help constrain models for the distribution of bodies and interactions in the inner Solar system. Since the discovery of the first outer planet Trojan in 1906, several thousand Jupiter Trojans have been found. Of the terrestrial planets, there are four known Mars Trojans, and one Earth Trojan has been recently discovered. We present a new model that constrains optimal search areas, and imaging cadences for narrow and wide-field survey telescopes including the Gaia satellite for the most efficient use of telescope time to maximize the probability of detecting additional Earth Trojans.

15 citations

Journal ArticleDOI
TL;DR: In this article, the formation and evolution of the highly inclined orbit of Neptune Trojan 2005 TN 53 was explored with numerical simulations, and a possible mechanism for the origin of the high-inclination Neptune Trojans as captured into the Trojan-type orbits by an initially eccentric Neptune during its eccentricity damping and rapid inward migration, then migrating to the present locations locked in Neptune's 1:1 mean motion resonance.
Abstract: Aims. We explore the formation and evolution of the highly inclined orbit of Neptune Trojan 2005 TN 53 . Methods. With numerical simulations, we investigated a possible mechanism for the origin of the high-inclination Neptune Trojans as captured into the Trojan-type orbits by an initially eccentric Neptune during its eccentricity damping and rapid inward migration, then migrating to the present locations locked in Neptune's 1:1 mean motion resonance. Results. Two 2005 TN 53 -type Trojans out of our 2000 test particles were produced with inclinations above 20°, moving on tadpole orbits librating around Neptune's leading Lagrange point.

15 citations

Proceedings ArticleDOI
17 Jun 2011
TL;DR: Experimental results with a 64-bit Data Encryption Standard (DES) cipher circuit show that Trojans which are 2 orders of magnitude smaller than the DES circuit can be detected by using statistic signal processing techniques.
Abstract: Because of globalization of the semiconductor industry, the IC fabrication is increasingly outsourced. This poses a significant risk for integrated circuits (ICs) used for security critical applications. Attackers can maliciously alter the ICs during fabrication in untrusted foundries. In the case of ICs bought externally, they may have hidden functions that users would never know. These malicious alterations and hidden functions are also referred to as “Hardware Trojan”. It is extremely difficult to discover such Trojan circuits using conventional testing strategies. In this paper, we propose a nondestructive, power analysis based Trojan detection approach which is able to detect Trojan circuits in the presence of large noise. The approach is validated using 90nm FPGA (Xilinx Spartan-3E) chips. Experimental results with a 64-bit Data Encryption Standard (DES) cipher circuit show that Trojans which are 2 orders of magnitude smaller than the DES circuit can be detected by using statistic signal processing techniques.

15 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: The phases of the chip production life-cycle are reviewed and opportunities for trojan insertion are discussed and a matrix describing the relationships between these attributes is defined which can be used to identify hardware trojans.
Abstract: This paper considers the classification of hardware trojans in semiconductor chips. The phases of the chip production life-cycle are reviewed and opportunities for trojan insertion are discussed. Trojans are classified using a comprehensive attribute taxonomy based on eight categories. A matrix describing the relationships between these attributes is defined which can be used to identify hardware trojans.

15 citations

Proceedings ArticleDOI
14 Mar 2016
TL;DR: A general model for creating a covert Trojan communication channel between SoC components is presented, applicable to any topology and protocol, and circuitry allowing information to flow covertly by altering existing bus signals only when they are unspecified is created.
Abstract: The security, functionality, and performance of the on-chip bus system is critical in an SoC design. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in unspecified functionality. Unlike existing Trojans which aim to disrupt normal bus behavior and are often designed for a specific protocol and topology, we present a general model for creating a covert Trojan communication channel between SoC components. From our channel model, which is applicable to any topology and protocol, one can create circuitry allowing information to flow covertly by altering existing bus signals only when they are unspecified. We give the specifics of this circuitry for AMBA AXI4, then create a system comprised of several master and slave units connected by an AXI4-Lite interconnect to quantify the overhead of the Trojan channel and illustrate the ability of our Trojans to evade a suite of protocol compliance checking assertions from ARM.

15 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168